1+ months

IT Security Architect

Devry University
Naperville, IL
Apply Now
Apply on the Company Site
  • Jobs Rated
Naperville","Address":{"Line1":null,"Line2":null,"City":"Naperville","State":{"Name":"Illinois","Code":"IL"},"PostalCode":null,"Country":{"Id":"5c6a639b-d85e-490f-844c-af2384265e32","Name":"United States","Code":"USA"}},"DisplayName":false,"DisplayLocationId":false,"DisplayDescription":false,"DisplayAddress":true,"DisplayStreetAddress":false,"Coordinates":{"Longitude":-88.153017771605448,"Latitude":41.770832686222562},"Shapes":null,"SourceOfTruth":1,"IsAvailableForOpportunities":true}],"PostedDate":"2018-10-15T11:22:40.201Z","UpdatedDate":"2018-11-19T16:47:10.402Z","RequisitionNumber":"ITSEC22535","Description":"


The IT Security Architect (ITSA) position is responsible for leading the design and implementation of all IT security solutions and services within DeVry University. The ITSA\u0026rsquo;s job is composed of a variety of activities, including strategic, tactical, and operational activities to develop, manage, and support DeVry\u0026rsquo;s IT security solution portfolio. The ITSA will translate IT risk requirements and constraints across all IT domains and the functional areas of DeVry University and devise the IT security strategy accordingly. The ITSA is expected to provide hands-on tactical delivery of IT Security solutions and appropriately transition operational management of these solutions to the offshore Security Operations Center (SOC) team.

Essential Duties and Responsibilities

The ITSA will act as an empowered representative for all IT and business planning initiatives to ensure that appropriate IT security measures are incorporated into strategic and operational IT plans, and that service expectations are clearly defined. Key responsibilities include collaboration with the CIO, IT leaders and IT solution architects, and functional business stakeholders to understand business initiatives and develop IT Security solutions that satisfy those needs. The ITSA will also be responsible to balance real-world risks with business drivers such as speed, agility, flexibility, budget, and performance. The ITSA will coordinate the development and management of IT security metrics and dashboards with the offshore SOC team for ongoing performance measurement and reporting to the CIO, IT leaders, and the DeVry University, Inc. Board of Trustees. The ITSA will also oversee IT security vendor relationship management and ensure that service levels and vendor obligations are met.

- Drive a security program, all security projects, and all security solutions that address identified IT security risks and business security requirements. Ensure that IT security is factored into the evaluation, selection, installation, and configuration of all IT computing environments, IT applications (SaaS, PaaS, or internal), IT software, and IT hardware.
- Align IT security strategic goals and objectives with decisions regarding IT products and services; partners and suppliers; organization; capabilities; and key business and IT initiatives
- Lead the development and operationalization of an IT Threat Response process. Coordinate testing of the IT Threat Response process.
- Assist in developing budget projections and operational adherence for all IT security objectives.
- Oversee the process to gather, analyze, and assess the current and future threat landscape with the offshore SOC. Provide a realistic overview of risks and threats in the DeVry enterprise environment (i.e. the \u0026ldquo;IT Risk Review\u0026rdquo;).
- Design, coordinate, and oversee IT security testing procedures to verify the security of systems, networks and applications. Coordinate any remediation of identified risks with the SOC and IT domains.
- Ensure SOC adherence to existing IT security policies and procedures to ensure operating efficiency and all regulatory / governance compliance. Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements.
- Provide IT security communication, awareness and training for DeVry audiences, which may range from senior business leaders to regional staff.
- Assist as an escalation point in any critical IT security-related incidents. Drive resolution of IT security breaches with the SOC.
- Assist with IT or Business audits as required.
- Completes other duties as assigned.

Requirements and Qualifications

-Bachelor\u0026rsquo;s Degree in computer science or related field, Master\u0026rsquo;s preferred.
-A minimum of 10 years of overall IT experience with at least 5 years of progressive, enterprise-level IT security roles

-Relevant IT security certifications desired including any of the following:
\u0026nbsp; \u0026nbsp; - Certified Information Systems Security Professional (CISSP)
\u0026nbsp; \u0026nbsp; - Certified Cloud Security Professional (CCSP)- GSEC / GCIH / GCIA: GIAC Security Certifications
\u0026nbsp; \u0026nbsp; - Certified Expert Cyber Architect (CECA)
\u0026nbsp; \u0026nbsp; - Certified Ethical Hacker (CEH), etc\u0026hellip;

-Significant hands-on experience in the following IT security areas using the listed or equivalent IT security solutions:
\u0026nbsp; \u0026nbsp; \u0026nbsp;- Data Loss Prevention (DLP) solutions such as McAfee HDLP / NDLP
\u0026nbsp; \u0026nbsp; \u0026nbsp;- PC / Endpoint Security solutions such as McAfee Endpoint Security
\u0026nbsp; \u0026nbsp; \u0026nbsp;- Network IPS \u0026 URL Filtering solutions such as Cisco Firepower
\u0026nbsp; \u0026nbsp; \u0026nbsp;- DNS \u0026 IP Layer security solutions such as Cisco Umbrella
\u0026nbsp; \u0026nbsp; \u0026nbsp;- Security, Information, and Event Management (SIEM) solutions such as Splunk
\u0026nbsp; \u0026nbsp; \u0026nbsp;- Vulnerability Scanner management solutions such as Rapid 7 Nexpose
\u0026nbsp; \u0026nbsp; \u0026nbsp;- Certificate Migration and Management solutions such as Venafi TrustAuthority
\u0026nbsp; \u0026nbsp; \u0026nbsp;- Certificate Key Authority solutions such as Comodo Certificate Authority
\u0026nbsp; \u0026nbsp; \u0026nbsp;- Password Vault and Session Management solutions such as CyberArk
\u0026nbsp; \u0026nbsp; \u0026nbsp;- Threat Intelligence platforms such as TruSTAR
\u0026nbsp; \u0026nbsp; \u0026nbsp;- Phishing \u0026 Security Awareness solutions such as KnowBe4
\u0026nbsp; \u0026nbsp; \u0026nbsp;- Data Encryption solutions such as IBM Guardium

- Enterprise Payment Card Industry (PCI) compliance and security standards experience
- Proven experience assessing, designing, and implementing IT security solutions in the enterprise
- Experience developing and maintaining IT security policies, procedures, standards and guidelines
- Proficiency in performing risk, business impact, control and vulnerability assessments, and in defining treatment strategies.
- Experience in system technology security testing (vulnerability scanning and penetration testing).
- Experience in application technology security testing
- Experience across IT infrastructure domains and application development technologies, having a competent understanding and knowledge of project management, software development lifecycle methodologies, and ITIL Service Management methodologies
- Experience participating in medium to large, cross-functional teams and projects, with onshore and offshore resources
- Proven ability to communicate professionally across all corporate levels, from associate to CIO.
- Advanced written and oral communication skills along with excellent presentation skills.
- Exceptional organization, problem solving, and analytical skills.
- Experience influencing senior / executive level management and stakeholders.
- Detailed and process oriented with demonstrated capabilities in design and requirements analysis.
- Proven ability to lead and work autonomously
- Desire to make a difference and to challenge the organization for new ways of doing business and simplifying the IT solution portfolio.
- Ability to mentor and indirectly develop staff.
- Experience working in multiple Information Technology environments preferred.

We are proud to be an EEO employer M/F/D/V. We maintain a drug-free workplace and perform pre-employment substance abuse testing. Thank you for applying for this outstanding opportunity today.

Jobs Rated Reports for Information Security Analyst

Posted: 2018-10-17 Expires: 2018-12-22

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

IT Security Architect

Devry University
Naperville, IL

Join us to start saving your Favorite Jobs!

Sign In Create Account
Information Security Analyst
8th2018 - Information Security Analyst
Overall Rating: 8/220
Median Salary: $92,600

Work Environment
Very Low
Very Good