Data Security Architect
Cleveland, OH, United States
Sherwin-Williams
Discover the possibilities of Sherwin-Williams® paint with over 1700 paint colors. Get paint color tips, project ideas & product advice for DIY and Pros.The Data Security Architect will collaborate with security architects, technical leads, and other partners to design optimal data security technology capabilities that are secure, efficient, scalable, resilient, and adaptable to the organization's changing needs. This role provides architecture support, mentoring, and training to increase the maturity of our data security architecture practices and accelerate value creation.
The Data Security Architect will synchronize with the Data Security, Privacy, and Enterprise Data & Insights teams to ensure data flows of sensitive information are documented and recommend controls to ensure this data is adequately secured. The Data Security Architect facilitates threat modeling of services and applications to understand the risk and data associated with the service or application.
The Data Security Architect is expected to provide transformational guidance, tactical advice, and technical expertise in architecture deliverables related to securing data. This position will identify opportunities for processes and technical controls to mature data security access capabilities such as data loss prevention, encryption, data classification, and data handling across the information lifecycle.
The Data Security Architect is a thought leader who reviews current security measures and recommends enhancements to support the security strategy and enable the business. This role will engage with various partners to translate business objectives into security capabilities. The Data Security Architect will define target architectures and partner with the solution delivery teams to ensure that the business benefit is realized.
Responsibilities:
- Security architecture consulting on monthly security governance and DT P1/P2 projects
- Support design decisions during security solution development and deployment
- Lead proof of value (PoV) assessment on potential security tools
- Review business processes from a security perspective and identify solutions to manage risk
- Research and provide guidance on cyber policies and standards
- Map cyber technical capabilities to the supported business capabilities
- Support reference architectures library (i.e., design requirements)
- Support reusable security patterns library (i.e., consumable security services)
- Support capability library
- Assist with roadmaps to mature security services
- Assist with compensating controls
- Evaluate tool optimization and identify opportunities to improve efficiency and effectiveness
- Build relationships and work closely with partners such as Data Security and other security service families, DT Infrastructure & Operations, Application Development, IT Risk Management, Compliance, and Internal Audit
- Partner with the Global Transformation Office and Enterprise Data & Insights team to align security data architecture with the enterprise data strategy
Additional Responsibilities
- Guide decisions on security capabilities and design
- Align security services to address the highest risks and support business objectives
- Support evaluation criteria for security technology proof of value
- Establish and maintain current state and target state architectures
- Advocate and promote architecture principles and design requirements
- Monitor emerging products, technologies, and best practices to improve security maturity
- Promote the use of industry and SW security standards.
- Mentor security engineers and analysts
This position is not eligible for sponsorship for work authorization now or in the future, including conversion to H1-B visa.
This position has a hybrid work schedule with three days in the office and the option for working remotely two days.
Job duties include contact with other employees and access confidential and proprietary information and/or other items of value, and such access may be supervised or unsupervised. The Company therefore has determined that a review of criminal history is necessary to protect the business and its operations and reputation and is necessary to protect the safety of the Company’s staff, employees, and business relationships.
Formal Education
Required
- Bachelor’s degree (or foreign equivalent) in a Computer Science, Computer Engineering, or Information Technology field of study (e.g., Information Technology, Electronics and Instrumentation Engineering, Computer Systems Management, Mathematics) or equivalent experience.
Preferred
- Master’s degree in Computer Science, Cyber Security, Information Technology, Risk Management, or related field; or equivalent experience
- Experience with security architecture frameworks such as SABSA
- Certifications: CISSP, CISA, or CRISC
- TOGAF, CEAP, CISSP, CIA, CDCP, CCSP, CEH, CompTIA, Cloud Architecture (AWS/Azure/Google) or similar certifications a plus.
- CSM, SAFe, ITIL, APQC, or similar training/certifications a plus.
Knowledge and Experience
Required Qualifications:
- 12+ years of experience in Information Security IT, IT risk management, or Information Technology (IT)
- 8+ years designing and implementing complex security, audit and compliance systems
- Experience conducting proof-of-concepts, developing prototypes, or building reference models.
- Experience working in the Manufacturing or Consumer Products industry
- Ability to understand complex technical concepts and translate them for a non-technical audience
Preferred Qualifications
- 5+ years of hands-on experience applying systems thinking to create documentation, technical models, reference architecture, whitepapers, and presentations for use by all levels of management, functional, and technical staff.
- Experience developing and governing architecture standards and principles
- Experience with common technology control and risk management frameworks like NIST CSF, NIST PF, ISO 27000 series, SOC 2, and compliance regimes like Sarbanes Oxley, GDPR, CCPA, etc.
- Experience in developing security, audit, and compliance architectures for large-scale, high-risk, strategic projects/products
- Experience in securing Cloud Platforms
- 2 years’ experience with data loss prevention (DLP) technologies
- 5 years’ experience on data security, data management, or related data projects.
- Experience designing practical security, compliance and audit strategies and communicating the vision to a community of stakeholders
- Experience applying international constraints and context to enterprise architecture
- Experience in applying systems and design thinking methodology to architecture practices
Personal Attributes
- Strong commitment to inclusion and diversity
- Excellent communication, presentation, and interpersonal skills
- Ability to concisely present ideas and security risks to both technical and business audiences
- Effective change agent
- Strong analytical, conceptual, and problem-solving abilities
- Ability to interact with a broad cross-section of personnel to advocate and influence security measures
- Excellent customer service orientation.
- Ability to observe business, understand pain points and recommend innovative & transformation solutions with strong ROI
- Promotes collaboration and continuous improvement
- Up to 10% travel as required (domestic and international).
- Work hours outside the standard office 7.5-hour workday may be required.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: AWS Azure CCPA CCSP CEH CIA CISA CISSP Cloud Compliance CompTIA Computer Science CRISC Encryption GDPR Governance ISO 27000 ITIL Mathematics NIST Privacy Risk management Security strategy SOC SOC 2 Strategy TOGAF
Perks/benefits: Career development Health care
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.