Finding the best job has never been easier
Share
Your key responsibilities
This position is a leading role in designing, developing and implementing all aspects of security for complex global applications based on Microsoft Azure technology and generally the Microsoft technology stack. The role is very much an individual contributor capable of supporting multiple project teams. In other words, it is not a program management or oversight role, but one that requires detailed participation in the design, implementation and certification of security controls across the multiple projects/applications. This requires knowledge of various IT system architecture and Cloud technology, as well as supporting technology such as IAM, network security, firewalls, user account management, audit and logging, and other security concepts as outlined in ISO27001, OWASP and related security standards. Also should have knowledge of 3rd Party security assessments and applicability of SOC1 and SOC2 reports and concepts of vendor risk management.
Skills and attributes for success
Significant working security experience and knowledge in the design, implementation and operation of security controls in one of the following areas:
• Agile & DevOps Methodologies – Experience as a contributing member of a balanced team within an Agile development or DevOps environment.
• Application Security - Experience with the design of security controls for multi-tier business solutions including the design of application-level access and entitlement management, data tenancy and isolation, encryption, and logging. Working familiarity with REST API and microservices architecture.
• Cloud Security –Technical understanding of virtualization, cloud infrastructure, and public cloud offerings and experience designing security configuration and controls within cloud based solutions in Microsoft Azure and Azure PAAS services (SQL, Service Bus, Service Fabric, Data Lake, PowerBI)
• Infrastructure Security – Experience with the integration of common infrastructure security technologies and solutions into business solution architectures including the integration of identity & access management, intrusion detection and prevention, security monitoring, and data encryption solutions.
• Identity and Access Management - Active Directory based Identity and Access Management and Authorization design experience and integration with IDaaS and Federation technologies.
To qualify for the role you must have
Ideally, you’ll also have
Although not required, it is preferred that candidates possess additional working security experience and knowledge in one or more of the following areas:
• Operational Security – Experience with defining operational models and procedures for business solutions including the operation and maintenance of infrastructure and application security controls.
• Information Security Standards – Knowledge of common information security standards such as: ISO 27001/27002, NIST CSF, FEDRAMP, CSA and CIS Controls.
• Cloud security certifications such as AZ-300 Azure Architect Technologies
• Product Management – working with a broader business team on aspects of security that affect all phases from concept to design to implementation and then operational support.
These jobs might be a good fit