Information Security Architect
India, Karnātaka, Bangalore

您已成功将工作 URL 复制到剪贴板!

职位详情

就业类型: 

Full-Time

地点:

India, Karnātaka, Bangalore

职位类别:

Information Systems

职位编号:

WD30269761

Johnson Controls制胜行为

我们专注于真正重要的事

我们作为同一个团队共创佳绩

我们对结果负责

我们每天都在进步

职位描述

What you will do

Johnson Controls is looking for an Information Security Architect. The role is part of the Global team, reporting into the Chief Security Architect. Our new colleague will partner closely with technology (Cybersecurity, IT) and business teams to generate new security architectures, technical standards, controls, and processes which protect Johnson Controls systems and data. As part of Security Posture Assessment, the individual will ensure compliance with established architecture direction and standards is followed during deployment. Works with Service Management and Stakeholders to collect functional requirements and ensure the most effective solution is used.

How you will do it

The responsibilities of the Information Security Architect include, but are not limited to:

  • Design and follow-up on the implementation of security reference architectures across the enterprise and in Global Information Security
  • Review system security measures and security processes and recommend enhancements. Ensure that controls, current designs and processes are adequate to protect the sensitive information systems
  • Produce high-quality security architecture specifications, white papers, technical documentation, roadmaps and presentation materials
  • Provide technical input into security related standards, technology roadmaps, support requirements and management infrastructure designs
  • Make recommendations for improvements in network, identity and access & identity management and infrastructure based on current industry standards
  • Stay knowledgeable of current advances in all areas of information technology concerning vulnerabilities, security breaches or malicious attacks
  • Follow the Security Posture Assessment process, which involves research, validation, and evaluation of all new initiatives, with phase gates reviews presented to all stakeholders during the process
    • Design Approval. Approve the finished design, ensuring it follows company policies and procedures
    • Build approval. Validate that the project has implemented a system that conforms to company policies and procedures.
  • Provide team support with validating security controls
  • Identifies relevant risks for third party solutions that are assessed
  • Acts as an internal consultant to business units and Infrastructure IT
  • Provides management with accurate and complete status information

What we look for

Required

 The successful candidate will be a passionate information security professional with the ability to communicate to different business and Project managers. The candidate will be able to execute the Information Security architecture management strategy defined by leaders. The candidate will demonstrate drive, intelligence, maturity, and energy and will be a proven team leader and security strategist. 

  • A minimum bachelor’s degree in computer engineering, computer security or computer science discipline or equivalent experience
  • 5-8 years of information security related experience working with teams in security operations, incident analysis, developing applications, and security applications. 
  • Experience using security architecture frameworks (SABSA, TOGAF etc.) and tools (Archi, Visio) to create and manage designs
  • Advanced understanding of tools and techniques used by attackers to gain entry into corporate networks, including common IT system flaws and vulnerabilities
  • Demonstrated knowledge on threat landscapes and threat modelling, security threat and vulnerability management, and security monitoring
  • Broad technical experience in several security disciplines including endpoint and platform (Unix/Linux/Windows, mobile) controls, encryption/tokenization, identity and access management, PKI, data protection, Cloud Security (AWS, GCP, Azure), network security (web proxies, reverse proxies, load balancing, IDS/IPS, firewall, wireless, and remote connectivity) and security tooling integration in complex environments
  • Knowledge of network security architecture, understanding of the TCP/IP protocol, and remote access security techniques/products.
  • Expert ability to analyze and identify risks in network and system designs and communicate with key stakeholders to address the risk and drive a solution
  • Demonstrated experience in communicating complex security concepts, both verbally and in writing, to a variety of audiences 
  • Candidate must be able to react quickly, decisively, and deliberately in high stress situations 
  • Highly motivated individual with the ability to self-start, prioritize, multi-task and work in a global team setting
  • Ability to create and maintain good business relationships with counter parts, customers, and external entities to achieve the security operations management goals
  • Ability to maintain a high level of discretion and personal integrity in the exercise of duties, including the ability to professionally address confidential matters
  • Familiarity of regulatory compliance requirements (PCI-DSS, HIPAA, FISMA, SOX)
  • Familiarity in National Institute of Standards and Technology (NIST) as they apply to FISMA 

 Desired Certifications (but not required): 

  • Certified Information Systems Security Professional (CISSP) 
  • Certified Information Systems Security Professional - Information Systems Security Architecture Professional (CISSP-ISSAP)
  • Certified Information Security Manager (CISM)
  • Certified Information Systems Auditor (CISA)
  • Certified Ethical Hacker (CEH)
  • Cisco Certified Network Associate Security (CCNA Security)
  • Cisco Certified Network Associate (CCNA)
  • Cisco Certified Network Professional Security (CCNP Security)
  • Cisco Certified Network Professional (CCNP)
  • Server Platform Certifications (Microsoft, Linux)

随时了解新的工作机会

订阅职位提醒,接收您所在地区精选的职位空缺,并随时了解江森自控的最新职业机会。

订阅