Sr. Security Architect/Engineer

Atos Boston , MA 02298

Posted 1 week ago

Atos SE (Societas Europaea) is a leader in digital services with pro forma annual revenue of circa 12 billion and circa 100,000 employees in 72 countries. Serving a global client base, the Group provides Consulting & Systems Integration services, Managed Services & BPO, Cloud operations, Big Data & Cyber-security solutions, as well as transactional services through Worldline, the European leader in the payments and transactional services industry. With its deep technology expertise and industry knowledge, the Group works with clients across different business sectors: Defense, Financial Services, Health, Manufacturing, Media, Utilities, Public sector, Retail, Telecommunications, and Transportation.

Atos is focused on business technology that powers progress and helps organizations to create their firm of the future. The Group is the Worldwide Information Technology Partner for the Olympic & Paralympic Games and is listed on the Euronext Paris market. Atos operates under the brands Atos, Atos Consulting, Atos Worldgrid, Bull, Canopy, Unify and Worldline.

Position Title:

Senior Security Engineer/Architect

Location:

Boston, MA

What you'll be doing:

  • The Security Architect is a subject matter expert in Information Security and is responsible for the design, implementation, and effective and efficient maintenance of related technologies. The Security Architect is responsible for leading design, implementation, and troubleshooting efforts and is directly accountable for the results.

Core Responsibilities:

Soft Skills

  • Exceptional communication skills with diverse audiences, including facilitation, negotiation and presentation skills

  • The ability to be the enterprise security subject matter expert who can explain technical topics to those without a technical background

  • Strong critical thinking, analytical skills and attention to detail

  • High quality execution in consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements

  • Strong leadership, project and team-building skills, including the ability to lead teams and drive projects and initiatives in multiple departments, and provide technical guidance to a security team

  • Demonstrated ability to identify risks associated with business processes, operations, information security programs and technology projects

Control Design and Execution

  • Maintain the security of a company's technology environment by planning comprehensive (complex) control design to mitigate threats while balanced with company's risk appetite and provide assurance it works

  • Create solutions that balance business requirements with information and cyber security requirements

  • Assess, establish and monitor countermeasures that protect, detect and/or deter when an unauthorized attempt occurs

  • Must constantly stay current on the latest development with security controls, solutions, frameworks, technology trends and hacking threats and methods

  • Must have/gain a thorough understanding of the company's technology environment, understand the weak points and make recommendations to improve

  • Anticipate the moves and tactics that hackers will use to try and gain unauthorized access

  • Align applicable laws, regulations, standards, frameworks and security with overall business and technology strategy

Project and Operations Management

  • Ability to define a plan, prioritize activities, and identify integration and risk issues

  • Identify scope, duration/time, resource needs and prepare cost estimates

  • Familiar with Agile project management methodology

  • Understanding of DevOps and Security DevOps

Technical Characteristics

  • Intimate knowledge of security solutions to be able to update and upgrade as needed, such as LogRythm, Tenable, Bromium, Tanium, RSA, CyberArk, Bladelogic, Guardium, Veronis, and Websense/ForcePoint Data Leakage Prevention (DLP)

  • Familiar with emerging technology and the effect on designing security controls, such as Blockchain, Artificial Intelligence, Machine Language, Robotics, Mobile, Cloud (public, private and hybrid for Infrastructure as a Service (IAAS, Amazon Web Services (AWS) or Microsoft Azure), Platform as a Service (PAAS), Software as a Service (SAAS)

  • Perform vulnerability testing, risk analyses and security assessments

  • Research security standards, security systems and authentication protocols

  • Understanding of network protocols and ability to develop requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related network devices

  • Design public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures

  • Review and approve installation of firewall, VPN, routers, IDS scanning technologies and servers

  • Test final security structures and control designs to ensure they operated as expected

  • Assist in the response of security-related incidents and provide a thorough post-event analysis

  • Identify and communicate current and emerging security threats

  • Security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks

  • Networking, Windows, UNIX and mainframe

  • Identity and access management (IAM) the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources

  • Understand programming language and technologies to write code, complete programming and performs testing and debugging of applications

  • Java/J2EE, C#, API/web services, scripting languages and a relational database management system (RDBMS) such as MS SQL Server or Oracle.

Industry Frameworks

  • Relevant National Institute of Standards and Technology (NIST) standards.

  • ISO27001 specifications for a framework of policies and procedures that include all legal, physical and technical controls involved in an organization's risk management

  • Control Objectives for Information and Related Technologies (COBIT)

  • Committee of Sponsoring Organizations (COSO) of the Treadway Commission, a joint initiative to combat corporate fraud

Minimum Qualifications:

  • Bachelor's degree or equivalent experience in a related technical field. Master's degree or equivalent preferred.

  • Ten or more (10+) years of related Information Technology with a minimum of six (6+) years of Information Security-specific experience.

  • CISSP preferred.

  • Considered subject matter expert in the area.

  • Strong knowledge of multiple technologies, platforms, and programming languages.

  • Solid understanding of Systems Development Life Cycle models.

  • Strong analytical, problem solving and organizational skills.

  • Demonstrated financial skills.

  • Proven ability to manage complex projects and related resources efficiently and to meet all project objectives.

  • Demonstrated ability to work effectively with employees at all organizational levels through well-honed interpersonal, communication, negotiation, presentation and relationship-building skills.

Preferred Qualifications/Certifications:

  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Security Manager (CISM)
  • Certified Information Systems Auditor (CISA)
  • Information Systems Security Architecture Professional (ISSAP)
  • Information Systems Security Engineering Professional (ISSEP)
  • SANS-related certifications Education requirements can vary, but most require a BA or BS in information security, engineering, mathematics, or related area. A Master's degree in an IT field is a plus, and a Master's in cybersecurity is an even bigger plus.

Industry related certification:

  • Series 99 (required within x months of hire date)

Career site: https://atos.net/en/careers

Facebook: https://www.facebook.com/atos

Twitter: https://twitter.com/atos

LinkedIn: https://www.linkedin.com/company/atos

Youtube: https://youtube.com/atos

#JoinAtosTeam

#AtosCareers

Your Application

If you wish to apply for this position, please click below to complete our online application form and attach your CV in either Word, rtf or text format.

Atos does not discriminate on the basis of race, religion, colour, sex, age, disability or sexual orientation. All recruitment decisions are based solely on qualifications, skills, knowledge and experience and relevant business requirements.

We are committed to making reasonable adjustments to the applications process for people with disabilities.


icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Information Security Architect Network & Cyber Security

Atos

Posted 1 week ago

VIEW JOBS 3/11/2019 12:00:00 AM 2019-06-09T00:00 Atos is a global leader in digital transformation services with pro forma annual revenue of $13.6 billion and 100,000+ employees in 72 countries. We are European n° 1 ranked and a key player worldwide in Cloud, Cybersecurity and High-performance Computing. Atos is also the Worldwide Information Technology Partner for the Olympic & Paralympic Games and is listed on the Euronext Paris market. Other noteworthy brands within the organization include: Atos Worldgrid, Atos Syntel, Bull, Canopy, Unify, Worldline Atos and more! For more information please visit, www.atos.net! Position Title: Security Architect - focusing within the Information Cyber Security space Location: Downtown Boston, MA Position Summary: Atos is currently seeking a Security Architect to join our team as a full-time employee to support one of our top clients based in Boston. General responsibilities: * Research security standards, security systems and authentication protocols * Understanding of network protocols and ability to develop requirements for local area networks (LANs), (WANs), (VPNs), routers, firewalls, and related network devices * Design public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures * Review and approve installation of firewall, VPN, routers, IDS scanning technologies and servers * Understand programming language and technologies to write code, complete programming and performs testing and debugging of applications related to: Java/J2EE, C#, API/web services, scripting languages and a relational database management system (RDBMS) such as MS SQL Server or Oracle. * Test final security structures and control designs to ensure they operated as expected * Assist in the response of security-related incidents and provide a thorough post-event analysis * Identify and communicate current and emerging security threats * Security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks * Networking, Windows, UNIX and mainframe * Identity and access management (IAM) – the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources Minimum Requirements: This role would be a fit for someone with 5-10+ years of experience working in Security Engineering and Architecture role (or related) who has strong communication (verbal and written) and client-facing skills. Basic Requirements: Industry Frameworks * (NIST) Relevant National Institute of Standards and Technology standards. * ISO27001 – specifications for a framework of policies and procedures that include all legal, physical and technical controls involved in an organization's risk management * (COBIT) Control Objectives for Information and Related Technologies * (COSO) Committee of Sponsoring Organizations of the Treadway Commission, a joint initiative to combat corporate fraud Certifications in: * Certified Information Systems Security Professional (CISSP) * Certified Information Security Manager (CISM) * Certified Information Systems Auditor (CISA) * Information Systems Security Architecture Professional (ISSAP) * Information Systems Security Engineering Professional (ISSEP) * SANS-related certifications Education requirements can vary, but most require a BA or BS in information security, engineering, mathematics, or related area. A Master's degree in an IT field is a plus, and a Master's in cybersecurity is an even bigger plus. Industry related certification: * Series 99 (ideally you accuire within 3-6 months of hire date) Your Application: If you wish to apply for this position, please click below to complete our online application form and attach your CV in either Word, rtf or text format. Atos does not discriminate on the basis of race, religion, color, sex, age, disability, veteran status or sexual orientation. All recruitment decisions are based solely on qualifications, skills, knowledge and experience and relevant business requirements. We are committed to making reasonable adjustments to the applications process for people with disabilities. Career site: https://atos.net/en/careers Facebook: https://www.facebook.com/atos Twitter: https://twitter.com/atos LinkedIn: https://www.linkedin.com/company/atos YouTube: https://youtube.com/atos #AtosCareers Atos Boston MA

Sr. Security Architect/Engineer

Atos