Job responsibilities
- Advises cross-functional teams on technology selections and decisions to achieve target state cybersecurity on improvements to current cybersecurity parameters
- Develops multi-year roadmaps aligned with business and architecture strategy and priorities
- Creates complex and scalable coding frameworks on the public cloud for new system design patterns and process templates
- Develops secure and high-quality production code and reviews and debugs code written by others
- Serves as the function’s go-to subject matter expert and drives thought leadership within the product line
- Contributes to the development of technical methods in cybersecurity in line with the latest product development methodologies
- Creates durable, reusable software frameworks that improves velocity and quality of output across teams and functions
- Champions and implements best practices across development teams and products
- Participates in the firm’s culture of diversity, equity, inclusion, and respect
Required qualifications, capabilities, and skills
- Formal training or certification on cybersecurity architecture concepts and 10+ years applied experience
- Hands-on practical experience in cybersecurity architecture that can be applied and reused across businesses, functions, and systems
- Fluent in one or more programming languages
- Deep knowledge of one or more software or applications
- Advanced knowledge of cybersecurity architecture, applications, and technical processes with considerable, in-depth knowledge in one or more technical disciplines (e.g., public cloud, artificial intelligence, machine learning, mobile, etc.)
- Experience applying expertise and new methods to determine solutions for complex architecture problems in one or more technical disciplines
- Ability to present and effectively communicate with senior leaders and executives
- Understanding of the business and knowledgeable of latest risk, Data Security and Encryption trends in the internal and external environments
- Experience in designing and implementing complex cloud architectures and cloud-native services
- Understanding of applied cryptography, key management, encryption at-rest and in-transit use-cases and requirements
- Experience leading a product as a product owner or product manager and ability to provide guidance on business use-cases and requirements for Data Security solutions
Preferred qualifications, capabilities, and skills
- Experience with Payment HSMs and PCI
- Understanding of Hardware Security Modules design and experience deploying and operating HSM-based solutions