Leading the design, development, and implementation of robust cybersecurity solutions. As a cybersecurity architect, you will need to play a pivotal role in ensuring the security and integrity of our systems, applications, and networks. Responsible for creating comprehensive security architecture frameworks, identifying potential vulnerabilities, thread and devising strategies to mitigate risks effectively.
- Security Architecture Design: Develop, maintain and enhance the overall security architecture framework for the organization, aligning it with industry standards, best practices, and regulatory requirements.
- Cloud Security Strategy: Develop and maintain a comprehensive cloud security strategy aligned with business goals, industry standards and regulatory requirements. Ensure security measures are integrated into cloud architecture design and deployment. Implement security controls for cloud services, networks, storage, and applications.
- Solution Development: Design and implement security solutions, including network security, application security, cloud security, encryption mechanisms, identity and access management (IAM), and security protocols.
- Telecommunications Security Strategy: Develop and implement a comprehensive security strategy for telecommunications infrastructure, including networks, systems, and services.
- Identity and Access Management (IAM): Implement robust IAM strategies, including authentication, authorization, and access controls, to manage user identities and permissions within cloud environments.
- Security Controls Implementation: Implement and manage baseline security controls and configurations across various systems, networks, and applications to ensure compliance and minimize vulnerabilities.
- Collaboration and Communication: Work closely with cross-functional teams, including IT, development, operations, Telco and compliance teams, to ensure security considerations are integrated into the development lifecycle and business processes. Communicate security-related concepts to technical and non-technical stakeholders.
- Incident Response and Monitoring: Develop and implement incident response plans, perform security monitoring, and participate in incident handling and resolution processes.
- Emerging Technologies Evaluation: Stay abreast of the latest cybersecurity trends, threats, and technologies. Evaluate and recommend emerging security products and tools to enhance the organization's security posture