To begin the application process, please enter your email address.
Company Contact Info
11115 Ash Street
Leawood, KS 66211
- Brenda Geisler
Sorry, we cannot save or unsave this job right now.
Report this Job
Saving Your Job Alert
Job Alert Saved!
Could not save Job Alert!
You have too many Job Alerts!
This email address has reached the maximum of 5 email alerts. To create a new alert, you will need to log into your email and unsubscribe from at least one.
Email Send Failed!
Security Data Architect
TriCom Technical Services • Leawood, KS
Posted 2 months ago
Design the Information Security Architecture for technology-based business solutions by applying industry best practices.
Review information security metric reports and provide recommendations for strategic direction based on report data.
Provide architectural input on organizational data protection and data loss prevention strategies.
Own the delivery of secure data solutions teams; remain deeply involved in data protection capability delivery.
Work closely across multi-disciplinary teams as a domain expert in data security architecture standard methodologies.
Create data security roadmaps in cooperation to achieve both short- and long-term, complex business requirements.
Serve as liaison to data teams in Security and IT, supporting technology architecture, security advisement and security audit teams.
Certified Information Systems Security Professional (CISSP) certification or Master’s Degree in Information Security & Assurance from an accredited college or university.
5+ years of security architecture experience in a large, highly regulated enterprise.
Must understand the seven layers of the OSI security model.
Must understand data security concepts.
Must have both security architecture and data architecture knowledge/background.
Ability to build secure architecture patterns and provide prescriptive guidance on how to secure the data, while at rest and in transit, for both on-premises and public cloud systems.
Knowledge of information security standards and controls (e.g., NIST, ISO 27001/27002, etc.), rules, and regulations related to information security and data confidentiality, as well as desktop, server, application, database, and network security principles for risk identification and analysis.
Knowledge and experience utilizing data protection concepts including encryption, obfuscation, entitlement, access control, user management, user and application authentication and authorization, security monitoring, and others.
Demonstrated experience implementing tools and systems for enterprise-level DLP, DAM, Encryption/Tokenization, and Data Discovery.
Ability to differentiate when and where to apply encryption, tokenization, masking, and other data security controls.
Understanding of the capabilities of database security products, as well as experience deploying those technologies in enterprise environments.