Senior Security Architect

For Those Who Work At Home, OH

Apply now Apply later

Location:

For Those Who Work At Home - Various, Ohio 44144

Use skills, experience and talent to help Key grow an effective information security program by analyzing, assessing, and helping mitigate security issues. Plan, research, and design security architecture for IT systems. Develop, review, and approve installation requirements for application and infrastructure designs and implementations.

Applicant must be able to demonstrate the ability to:

  • Incorporate security requirements necessary to protect the organization’s mission and business processes in all aspects of enterprise architecture including reference models, solution architectures, as well as in the systems supporting those missions and business processes.
  • Translate technology constraints and environmental conditions (e.g., law and regulation) into system and security designs and processes.

Applicant must have strong technical background across a wide range of security disciplines and solutions and must have excellent communication, presentation, writing, and customer interface skills.

Essential job Functions

Abilities

  • Advise the security management on a range of security-related issues. 
  • Serve as the primary liaison between the Lines of Business, Enterprise Architecture and Information Security teams and enable their alignment.
  • Coordinate with system owners, common control providers, and security engineers on the implementation of security controls.

Knowledge of:

  • Authentication, authorization, and access control methods. 
  • Application security frameworks, designs and controls.
  • Cloud, endpoint, network communication, and encryption methods, protocols, principles and concepts.   
  • Cyber defense and vulnerability assessment tools and their capabilities. 
  • Enterprise information security architecture. 
  • Awareness of new and emerging information technology (IT) and cybersecurity technologies. 
  • Cryptography, encryption key management concepts and current and emerging data encryption capabilities. 
  • Information classification program and procedures for information compromise. 
  • Integrating the organization’s goals and objectives into the architecture and translating operational requirements into protection needs.
  • Frameworks and methodologies for enterprise security architecture and service management.

Skills:

  • Designing countermeasures to identified security risks.
  • Determining how a security system should work and how changes in conditions, operations, or the environment will affect these outcomes.
  • Identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations.

Tasks:

  • Define and document security requirements for business solutions throughout their acquisition lifecycle to enable a security and privacy posture that is consistent with the organization's information security risk tolerances utilizing pre-existing or planned framework of cybersecurity controls and services.
  • Perform security reviews, identify gaps in security architecture, and develop a security risk management plans.
  • Identify critical infrastructure systems with information communication technology that were designed without system security considerations.
  • Update job knowledge by tracking and understanding emerging security practices and standards, participating in educational opportunities, reading professional publications, and participating in professional organizations.

Required Qualifications

  • Bachelor’s degree or equivalent work experience.
  • Strong understanding of security threats and knowledge of financial industry.
  • Experience in risk-based analysis and decision-making skills.
  • Proven ability to identify and implement process improvement opportunities.
  • Results oriented, a team player, and self-starter with ability to work with general direction.
  • Ability to manage competing priorities.

Preferred Qualifications

Professional security certification desired (CISSP, CISM, CISA, etc.).

Cloud computing design, architecture and controls preferred.

Key has implemented a role-based Mobile by Design approach to our employee workspaces, dedicating space to those whose roles require specific workspaces, while providing flexible options for roles which are less dependent on assigned workspaces and can be performed effectively in a mobile environment.  As a result, this role may be mobile or home based, which means you may work either at a home office or in a Key facility to perform your job duties. 

COMPENSATION AND BENEFITS

This position is eligible to earn a base salary in the range of $135,000.00 to $172,000.00 annually depending on job-related factors such as level of experience. Compensation for this role also includes eligibility for short-term incentive compensation and deferred incentive compensation subject to individual and company performance.

Please click here for a list of benefits for which this position is eligible.

Key has implemented a role-based Mobile by Design approach to our employee workspaces, dedicating space to those whose roles require specific workspaces, while providing flexible options for roles which are less dependent on assigned workspaces and can be performed effectively in a mobile environment. As a result, this role may be Mobile or Home-based, which means you may work primarily either at a home office or in a Key facility to perform your job duties.

Job Posting Expiration Date: 09/04/2024

KeyCorp is an Equal Opportunity and Affirmative Action Employer committed to building a diverse, equitable and inclusive culture. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status or other protected category.

 

Qualified individuals with disabilities or disabled veterans who are unable or limited in their ability to apply on this site may request reasonable accommodations by emailing HR_Compliance@keybank.com.


#LI-Remote

Apply now Apply later
  • Share this job via
  • 𝕏
  • or
Job stats:  0  0  0
Category: Architecture Jobs

Tags: Application security CISA CISM CISSP Cloud Cryptography Cyber defense Encryption Privacy Risk management STEM

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.