This range is provided by GCS. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more.
I am seeking an experienced Cyber Security Solutions Architect to lead the design, implementation, and management of cutting-edge security solutions across enterprise environments. The ideal candidate will bring deep expertise in proxy design, privileged access management (PAM), network detection & response (NDR), endpoint detection & response (EDR), and identity & access management (IAM), with a proven track record in large-scale cybersecurity architecture.
Key Responsibilities:
* Serve as the Design Authority for key cybersecurity solutions, including CrowdStrike EDR, SenseOn NDR, and CyberArk PAM.
* Lead the architecture, deployment, and optimization of proxy solutions for enterprise environments, ensuring security, compliance, and performance.
* Oversee MISP (Malware Information Sharing Platform), driving secure data sharing with external partners.
* Manage and optimize CyberCloud, ensuring high availability, compliance, and effective threat detection.
* Collaborate with penetration testers, network security engineers, and security architects to design and implement TSA-compliant security frameworks.
* Lead third-party access management, ensuring secure and compliant external connectivity.
* Provide technical mentorship, guiding teams on cybersecurity best practices, automation, and emerging threats.
Key Skills & Experience:
* Proven experience managing security tools such as CrowdStrike, SenseOn, CyberArk, and MISP.
* Strong knowledge of Windows, Linux, and Citrix environments with experience in application packaging using Microsoft APPV.
* Technical leadership and stakeholder management, with experience leading teams in large corporate environments.
* Ability to troubleshoot, optimize, and enhance security solutions, ensuring resilience, compliance, and efficiency.
* Hands-on experience with firewalling, vulnerability management, malware detection, and cloud security.
* Strong scripting ability (PowerShell) for automation and optimization of security processes.
Preferred Qualifications:
* Certifications in Cyber Security, Network Security, or IAM solutions (e.g., CISSP, CISM, CCSP, or equivalent).
Seniority Level
Mid-Senior level
Employment Type
Full-time
Job Function
Information Technology
Industries
IT System Operations and Maintenance
#J-18808-Ljbffr