Security architects work to understand strategic priorities, business requirements, technical requirements, issues identification, issue remediation and are called on to develop and articulate robust and innovative security solutions to address these all. Our Security Architects provide subject matter expertise in creating, implementing, and maintaining enterprise security programs.
A Security Architect is a subject matter expert in DevSecOps and/or system administration. The architect fills a critical role in the overall success of a project and are the primary source of security solution design and development. The Security Architect will work in conjunction with larger teams to deliver amazing technology solutions that delivers a secure experience and helps to build the Hybrid Cloud functionality.
The Security Architect is also a subject matter expert in regulatory bodies' cloud requirements, reviewing newly introduced regulations that impact Cloud environments worldwide. The architect must also be able to advise and, in some cases, prototype how to become compliant with these emerging security standards from differing industry regulatory bodies and national regulatory works. Experience with FedRAMP programs and certification a plus.
The Security Architect reviews the Security of Cloud services keeping in mind Data Security, Network Security, Infrastructure Security and Access Control.
The Security Architect Incorporates Security and Privacy by Design in a bottom up fashion in the Cloud Services.
The Security architect, depending on the area of work, perform evaluation and selection of the components, design of hardware, software, process and service components of the solution, assurance of deployment architectures, and guide secure engineering practices in development.Drive and maintain security throughout the entire Software Development Life Cycle of Services.
Oversee Application Security Testing including Static and Dynamic Code scans (SAST/DAST), Vulnerability Assessment and Penetration Testing (VAPT) for completeness.
Conduct Security assessments and threat modelling of Services