Experience : 10 - 25 years
Role Overview :
We are seeking a seasoned Cyber Security Architect with over a decade of
experience to lead and guide our technical teams in implementing robust
security controls across on-premises infrastructure and software
applications. The ideal candidate will collaborate closely with
Corporate Security and other stakeholders to ensure alignment with
enterprise-wide security policies and compliance requirements.
Key Responsibilities :
- Architect and implement security solutions for on-premises
infrastructure and enterprise software applications.
Provide technical leadership and guidance to engineering andoperations teams on security best practices.
Collaborate with Corporate Security to align technicalimplementations with organizational security policies.
Conduct risk assessments, threat modeling, and security architecturereviews.
Define and enforce security controls, including identity and accessmanagement, data protection, and network security.
Support hybrid environments (on-prem + cloud) with scalable andsecure design principles.
Evaluate and integrate AI guardrails and emerging technologies toenhance threat detection and response.
Stay current with evolving cyber threats, vulnerabilities, andregulatory requirements.
Technical Skills (Must have)
Security Architecture & Design
Enterprise security architecture (SABSA, TOGAF)Zero Trust ArchitectureSecure SDLC and DevSecOps integrationThreat modeling (STRIDE, DREAD, PASTA)Infrastructure & Network Security
Firewall configuration and management (Fortinet, Palo Alto)VPN, IDS / IPS, and network segmentationSecure configuration of servers, endpoints, and network devicesNAC (Network Access Control)Monitoring & Incident Response
SIEM platforms (Sentinel, Splunk, QRadar)EDR / XDR solutions (CrowdStrike, Sentinel One, Microsoft Defender)Security orchestration, automation and response (SOAR)Forensics and root cause analysisIdentity & Access Management (IAM)
Role-based access control (RBAC)Privileged access management (PAM)Multi-factor authentication (MFA)Identity governance and lifecycle managementData Protection & Privacy
Encryption standards (AES, RSA, TLS, PKI)Data loss prevention (DLP)Secure key management (HSM, KMS)GDPR, CCPA, and other data privacy regulationsTechnical Skills (Good to have)
AI & Emerging Technologies
AI / ML-based threat detection and anomaly detectionAI guardrails and responsible AI frameworksIntegration of LLMs in SOC workflows (e.g., Copilot for Security)Cloud & Hybrid Security
Cloud security posture management (CSPM)Cloud-native security tools (Azure Defender, AWS GuardDuty, GCPSecurity Command Center)
Identity federation and SSO (SAML, OAuth, OpenID Connect)Container and Kubernetes security