What's this role about?
Here's how you'll contribute:
You'll do this by:
Core Skills:
Desired Skills:
How we'd like you to lead:
Advantage Zensar
We are a technology consulting and services company with 11,800+ associates in 33 global locations. More than 130 leading enterprises depend on our expertise to be more disruptive, agile, and competitive. We focus on conceptualizing, designing, engineering, marketing, and managing digital products and experiences for high-growth companies looking to disrupt through innovation and velocity.
Zensar Technologies is an Equal Employment Opportunity (EEO) and Affirmative Action Employer, encouraging diversity in the workplace. Please be assured that we will consider all qualified applicants fairly, regardless of race, creed, color, ancestry, religion, sex, national origin, citizen status, age, sexual orientation, gender identity, disability, marital status, family medical leave status, or protected veterans' status.
Zensar is a place where you are free to express yourself in an environment that values individuality, nurtures development, and is mindful of wellbeing. We put our people and customers at the center of everything that we do. Our core values include:
* Putting people first
* Client-centricity
* Collaboration
Grow. Own. Achieve. Learn. with Zensar: www.youtube.com/watch?v=i2NZsiQqVnU
What you will be doing
This is a good fit for you if you are a mid to senior level Information Security or Cyber Security Professional. As an Information Security Architect, you would hold an influential role. Your key responsibility would be to enhance the security of applications and systems. You would also play a pivotal role in reducing the likelihood of coding, design, or configuration vulnerabilities affecting production environments, thereby mitigating potential security risks.
Your responsibilities will include collaborating with business and technical resources, reviewing project documentation, and referencing security policy to offer recommendations and guidance. You will also have the authority to approve or reject project artifacts from a security perspective, ensuring the highest level of security for the organization's systems, processes, and software applications.
Responsibilities will include:
1. Defining security requirements by evaluating business strategies and requirements; researching information security standards.
2. Providing consulting services and security support to internal business and technology customers.
3. Serving as the lead security liaison on assigned projects.
4. Providing input and recommendations to the development teams related to architecture, design, coding practices, and SDLC elements that could potentially impact the application or solution from a security perspective.
5. Validating controls for Encryption, Access Control, Web Application Vulnerability Detection, OWASP top 10, and other common web application security parameters.
6. Reviewing application architecture and design from an application security and information security perspective ensuring alignment with organization security standards and industry best practices.
7. Serving as a subject matter expert (SME) for performing vendor risk assessments (including Cloud Services) to improve overall vendor risk program.
8. Assisting with the development of secure coding standards.
9. Providing technical expertise on secure software development and support of all associated activities, processes, and tools for protecting technology-based information.
10. Ensuring that development is done in accordance with industry standards for secure development.
11. Facilitating periodic static code analysis utilizing existing standard service offering.
12. Facilitating dynamic and/or manual security testing utilizing existing standard service offering.
13. Reviewing, developing, testing, and implementing security plans, products, and control techniques.
14. Reviewing circumstances surrounding security gaps and designing corrective actions.
15. Maintaining awareness of security and technology trends and sharing that knowledge with others.
16. Evangelizing security policies, standards, and nonfunctional requirements where/when needed.
17. Daily and Weekly Status Reporting - for Work in Process and Planned and issues.
18. Documenting processes, procedures, assessment outputs, and working papers documentation to support existing SDLC and governance requirements.
19. Representing security and IT risks among other company risk departments and committees.
20. Evaluating the effectiveness of awareness and training programs and making recommendations for improvement.
21. Mentoring less-experienced team members and collaborating across Information Technology.
What your background should look like
1. Bachelor's Degree in Computer Science, Information Systems, or other related field, or equivalent work experience.
2. 10-15 years of combined IT and security work experience with a broad range of exposure to systems analysis, application development, systems administration, and over five years of experience designing and deploying security for Business products and services and Enterprise solutions at the enterprise level.
3. Preferred Certification in one or more Information Security relevant areas such as Audit (CISA), Security Management (CISM), Security Professional (CISSP), Cloud Security (CCSP, CCSK, AZ500).
4. Requires in-depth knowledge of security issues, techniques, and implications across all existing computer platforms.
5. Experience with evaluating and implementing security controls as related to Cloud-based services including SaaS, PaaS, IaaS.
6. Strong computer skills to operate effectively with company systems and programs; working knowledge of applicable computer applications used at customer.
7. Working knowledge of network solutions and systems.
8. Good analytical and problem-solving skills.
9. Ability to communicate effectively both orally and in writing.
10. Good interpersonal skills.
11. Ability to prioritize workload and consistently meet deadlines.
12. Strong organizational skills; attention to detail.
13. Ability to lead and provide direction to project/product teams.
14. Strong consultative skills: ability to interface effectively with technical and non-technical leaders.
15. Understands Information Security as it relates to the business and other areas of IT; understands direct impacts and risks.
16. Demonstrated sound understanding of at least 3 of the following control frameworks such as ISO 27001/27002, HITRUST, PCI, NIST, GDPR, and PCI.
17. Business experience in a matrix Organization required.
#J-18808-Ljbffr