Search Jobvertise Jobs
Jobvertise

Security Consultant - Security Architecture
Location:
US-NY-New York
Jobcode:
29a2c88cd91992930752557083b02d76-122020
Email Job | Report Job

Report this job





Incorrect company
Incorrect location
Job is expired
Job may be a scam
Other







Apply Online
or email this job to apply later

Job Title: Security Consultant - Security Architecture

Education Level  : Bachelor's Degree

Experience Level : Level 2





Job Description:The Security Architecture (SecArch) team is part of the Technology & Operations Risk (TOR) organization. The mission of the team is to protect the Firm by ensuring in-scope technologies built internally, products purchased and services used meet security requirements that include the Firm?s Policies, external guidelines, regulatory expectations, and appropriate controls in the areas of information security, secure design, and cyber security.We accomplish this mission via three primary services: architecture consulting, solutions consulting, and design review. The Senior Security Architect is an internal consultant that is working on multiple security architecture engagements across the enterprise as either a single contributor, managing a dispersed team, or participating in a virtual team across business units. The senior security architect works with team members (IT, Business, Suppliers, Stakeholders and Partners) globally to address SecArch?s mission.To be successful as a Senior Security Architect the candidate must have broad technology experience coupled with strong communication, influencing and time management skills.





A Senior Security Architecture Specialist has the following responsibilities:

 -Lead architecture consulting to construct Security Architectures for a business unit or infrastructure Technology team

 -Conduct risk assessment and provide technology risk/requirements to address risks identified.

 Areas covered:

 a) Authentication, Authorization, Auditing

 b) Application Security: Session Security, Vulnerability/Penetration Testing items, Input Validationc) Secure data transport and storage

 -Periodically review security reference architecture (security blueprints) and conduct updates/enhancements to guidance, policies, or other applicable reference materials4

 -Participate in various Operational and Technology Risk governance processes5

 -Lead, where applicable, a role in architecture review committees representing Security Architecture

 Skills and Experience:

 Soft Skills Required:


 -Excellent communication skills: written, oral, presentation, listening

 -Ability to influence through factual reasoning

 -Time management: ability to handle multiple concurrent assessments, plan based deliverable management, strong follow up and tracking

 -Strong focus on delivery when presented with short timelines and increased involvement from senior management

 -Ability to adjust communication of technology risks vs business risks based on the audience

 -Ability to operate in multiple virtual teams, directly manage teams, or ability to operate as a sole-contributor

 Security Architecture Skills Required:

 -In depth knowledge of application, network and platform security vulnerabilities.

 -Ability to explain vulnerabilities to developers

 -Experience in conducting Information Security, Security Architecture, Audit assessments. Presenting the outcomes of the assessment and obtaining buy in.

 -Strong focus on reviewing technical designs and functional requirements to identify areas of Security weakness.The candidate must have working experience in the following application/network security domains:

a) Authentication: SAML, SiteMinder, Kerberos, OpenId

b) Entitlements and identity management

c) Data protection, data leakage prevention and secure data transfer and storage

d) App Security  -validation checking, software attack methodologies

e) Cryptography: encryption and hashing

Desired Skills:

 -Knowledge of standard network model and the risks that present at each layer, the functions of network equipment such as switches, routers, firewalls, proxies, vpn, and load-balancers, and to understand network architecture.

 -The candidate must have working knowledge of the primary operating systems (Unix, Windows, z/OS, Mac OS), the configuration and management of that platform at an enterprise scale, the security risks to that platform, and how to mitigate those risks.

 -Experience in testing tools, at least one of Veracode, Fortify, OunceLabs, AppScan, WebInspect, BurpDevelopment

Even though the SecArch role is not a development role, the candidate must have previous background in programming, design and/or application (link removed) order to be a practical SecArch the candidate must have experience implementing complex applications in an enterprise environment:

 -Working knowledge of programming and scripting languages: Java, JavaScript, C#, C/C++, Perl, Python, Ruby

 -In-depth knowledge of web technologies such as Web Browsers, Web Servers, Web Services

 Other Areas of Expertise Desired:

 -Frameworks, protocols and subsystems: J2EE, .NET, Spring, RPC, SOAP, MQSeries,JMS, RMI, JMX, Hibernate

 -Knowledge of JSP /Servlet/EJB or ASP.NET, HTTP/HTTPS, Cookies, AJAX, JavaScript, Flex / Silverlight

 -Database design and programming experience4

 -Experience of liaising with 3rd Party Entities (exchanges, suppliers, regulators)5

 -Experience in conducting and/or reviewing penetration tests, dynamic vulnerability assessments and static vulnerability assessments6

 -Understanding of geographic regulations and their impact on Security assessments7

 -Previous experience in Financial Services is preferred8

 -CISSP or other industry qualificationExperience working with global organizationsEducational Requirements:

 -Bachelor?s Degree with minimum 7 years relevant work experience in high-paced, enterprise environment


Morgan Stanley

Apply Online
or email this job to apply later


 
Search millions of jobs

Jobseekers
Employers
Company

Jobs by Title | Resumes by Title | Top Job Searches
Privacy | Terms of Use


* Free services are subject to limitations