Your Role and Responsibilities
We’re looking for a Security Architect to join the IBM webMethods security team. Responsibilities will include:
- Develop a complete understanding of webmethod products and technology
- Align organizational security strategy with overall business strategy
- Identify and comminate current and emerging security threats
- Design security architecture elements to mitigate security threats
- Perform or supervise vulnerability testing, risk analyses and security assessments
- Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
- Provide guidance to security team
- Effectively collaborate with corporate security teams and application development teams
- Responds to, and investigates, security incidents and provides thorough post-event analyses
- Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
- Evaluate and recommend security tools and best practices
- Updates job knowledge by tracking and understanding emerging security practices and standards, participating in educational opportunities, reading professional publications, and participating in professional organizations
Required Technical and Professional Expertise
• Strong working knowledge with Windows, and Linux operating systems
• Java/J2EE, API/web services, scripting languages and a relational database
• Thorough knowledge of relevant industry security standards including ISO27001, NIST and SOC
• Thorough understanding of AWS and Azure architecture
• Thorough knowledge of Kubernetes security standards
• Advanced understanding of security protocols, cryptography, and security
• Great communication and interpersonal skills
• Strong communication and interpersonal skills
Preferred Technical and Professional Expertise
- Obtained cyber security certification like CISSP, CISA and CISM
- Obtained AWS/Azure Security certification
- Risk assessment procedures, policy formation, role-based authorization methodologies, authentication technologies and security attack pathologies