Connecting...

W1siziisijiwmtyvmduvmtmvmdivmzivmtyvnzuzl3zvbhquanbnil0swyjwiiwidgh1bwiilciyntywedewmfx1mdazyyjdxq

IT Security Architect

Job Title: IT Security Architect
Contract Type: Temporary
Location: Brussels, Brussels
Industry:
IT
Salary: Negotiable
Start Date: 01/09/2016
Reference: 67427-ITBEL-FUS
Contact Name: Fuat Yuksel
Contact Email: Fuat.Yuksel@volt.eu.com
Job Published: August 22, 2016 10:38

Job Description

Volt is Currently looking for an IT Security Architect for a client active in the Banking sector and located in Brussels. The successful candidate will join the IT Security Management - Security Projects and Services team which is part of the Corporate Technology division. The main responsibility for the IT Security Management team is to ensure that the technology infrastructure protects corporate assets from unauthorised access, modification, disclosure and destruction. ITSM SPS is the service owner of the logical security domain and infrastructure through the implementation of security services and infrastructure, risk assessments, requirements setting, and active participation in the project delivery lifecycle, as well as ensuring adequate processes and procedures for the security administration teams.

As part of the ITSM SPS team, the main responsibilities for the candidate are;
-Advice technical team on the control design, implementation and processes necessary to ensure and protect information systems assets. Perform risk assessments and define application and infrastructure-related security requirements for business and IT projects. Advises on high level security design of new infrastructures, systems and/or applications to ensure secure operation within the environment.
- Perform security validation to ensure effective implementation of security controls.

- Defines, implement and ensures the proper functioning of security trust services within his security domain in line with IT security policies. Recommends and advises on new or improved security services to IT security Management
- Review the secure design and implementation of the infrastructure and network infrastructure e.g. Virtualisation, Anti-malware, system protection, DMZ infrastructure, MPLS and VOIP infrastructure, 802.1x….
- Ensure the adequate functioning of security services in the infrastructure protection and network security domain.

- Produces documented security services, technical standards or principles.
- Act as security subject matter expert in a security domain and be the security point of contact for the business and project teams.

Your Profile:
The successful candidate must be a service oriented, organised and independent security professional with at least 5 years+ solid experience in the security domain.

The candidate must be a team player who communicates in an open, respectful and constructive way with his customers and peers, both verbally and in writing. The candidate will take ownership and ensure that organisational quality standards are met.
The candidate must be a very good communicator in English, both verbal and written, and able to discuss and defend the security interests with individuals and groups of senior business people as well as deep technical IT experts.

The candidate must have proven experience in security risk assessments, development of functional security requirements, process design and management reporting. Experience in security design, architecture and project management is a strong advantage.

Technical skills of the candidate must include any combination of:
1) Sound security design principles, based on confidentiality, integrity and availability requirements and other ISO27002 security principles;
2) Networking & Firewalls: several years of experience in building up sufficient background knowledge with regard to network principles and protocols used in WAN and LAN's, DMZ, Internet security, Remote access, network segregation
3) Senior level knowledge and experience with network security technologies including firewalls, web application firewalls, IDS/IPS systems, VPN, security assessments, and centralized logging. Understanding of industry best practices as it relates to security on network architecture.
4) Unix and Windows System security and assurance - Application security knowledge is a plus;
5) Authentication and access controls Security services (Authentication and authorisation schemes, Role-based access controls, Single sign-on, PKI...);


Preferred professional certifications are CISSP, GIAC, TOGAF, ISO 27001 LA/LI. Product network security certification e.g. Windows, Unix, Cisco or Checkpoint Certified Security Professional (CCSP, CCNP) are an asset