Technology Architect

Bengaluru-EPIP Industrial Area

Broadridge

Broadridge, a global Fintech leader helping clients capitalize on what’s next with communications, technology, data and intelligence solutions.

View all jobs at Broadridge

Apply now Apply later

At Broadridge, we've built a culture where the highest goal is to empower others to accomplish more. If you’re passionate about developing your career, while helping others along the way, come join the Broadridge team.

Roles and Responsibilities: 

  • Lead the integration of newly acquired entities, ensuring the adoption of Broadridge security standards and processes. 

  • Develop and nurture collaborative relationships with business and development teams to align security objectives with business priorities, ensuring mutual benefit and effective prioritization. 

  • Provide strategic direction and technical guidance to application teams to implement effective security controls and measures. 

  • Analyze the distributed application architectures of newly acquired entities to facilitate the implementation of robust security measures during integration into Broadridge environment. 

  • Identify and evaluate security vulnerabilities in applications from newly integrated entities, analyze associated risks, and provide guidance on remediation strategies, prioritizing efforts based on alignment with business objectives. 

  • Ensure that security practices and policies comply with organizational standards and regulatory requirements. 

  • Provide technical guidance and support to application teams, ensuring strict adherence to security standards and promoting the seamless integration of security measures and controls throughout the Software Development Life Cycle (SDLC). 

  • Collaborate closely with stakeholders to ensure the completeness and accuracy of information security exception requests, aligning them with predetermined criteria and established risk tolerance levels. 

  • Regularly communicate with management and stakeholders, presenting detailed reports and updates on vulnerabilities, ongoing remediation efforts, and the status and trends of exception requests 

  • Conduct ongoing security research to stay abreast of current security challenges, identifying new opportunities for security integration and automation to enhance overall security posture. 

  • Provide training and awareness on vulnerability risk management practices to technical teams and business stakeholders. 

 

Requirements: 

  • Bachelor’s degree in computer science, Information Security, or a related field. Good to have advanced degree or relevant certifications (e.g., CISSP, CISM). 

  • Minimum 12 years of demonstrated expertise in application security, coupled with proficiency in development. 

  • Strong understanding of distributed application architecture, including underlying security measures and best practices. 

  • Strong understanding of application security concepts, vulnerabilities, and attack vectors. 

  • Robust Information Security technical skills and knowledge to identify, research, and understand security control gaps and program compliance issues. 

  • Exceptional ability to communicate security concepts, threats, controls, and mitigation/remediation strategies to diverse audiences, including those unfamiliar with such topics. 

  • Proven track record in information security vulnerability assessment, remediation, and security governance. 

  • Familiarity with Security Policies, Procedures, Audit, and Compliance requirements. 

  • Expert understanding of code syntax and semantics of at least one object-oriented programming language. 

  • Possess an analytical mindset with the ability to prioritize and assess risks related to vulnerabilities and exception requests. 

  • Proven ability to work independently, prioritize tasks, and manage multiple projects simultaneously in a fast-paced environment, ensuring timely and efficient completion of objectives. 

  • Strong understanding of distributed application architecture, including underlying security measures and best practices. 

 

Soft Skills: 

  • Excellent communication and interpersonal skills, adept at articulating technical concepts to non-technical stakeholders. 

  • Capable of effectively collaborating with cross-functional teams and building consensus is essential. 

  • Commitment to continuous learning and staying updated on industry developments and emerging technologies. 

 

Good to have: 

  • Knowledge of security frameworks, standards, and benchmarks. 

  • Familiarity with cloud security concepts, cloud services, and cloud security controls, specifically within the AWS ecosystem. 


Broadridge associates helped us envision our Connected Workplace - a work model that allows associates around the globe, dependent upon their role responsibilities, take advantage of the benefits of both on-site and off-site work to support our clients, one another, and the communities where we live and work. Our Connected Workplace is grounded in the concept of FACS: Flexible, Accountable, Connected, and Supported, which is our commitment to our associates. FACS supports our strong culture and allows us to achieve business goals while supporting meaningful work-life integration for our associates.

We are dedicated to fostering a diverse, equitable, and inclusive environment and committed to providing a workplace that empowers associates to be authentic and bring their best to work. We believe that associates can only do their best when they feel safe, understood, and valued, and we work diligently and collaboratively to ensure Broadridge is a company—and ultimately a community—that recognizes and celebrates diversity in all its dimensions.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0
Category: Architecture Jobs

Tags: Application security Automation AWS CISM CISSP Cloud Compliance Computer Science Governance Risk management SDLC Vulnerabilities

Perks/benefits: Career development

Region: Asia/Pacific
Country: India

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.