IT Security Architect
Remote - Illinois
Marmon Holdings
Come join a team where People make the difference! As a part of Marmon Holdings, Inc., a highly decentralized organization, we rely heavily on people with the aptitude, attitude, and entrepreneurial spirit to drive our success, and we're committed to attracting and retaining top talent.
We are looking for an experienced IT Security Architect with strong business acumen and hands-on technical prowess in cybersecurity, to provide leadership, business intelligence and data security insights and processes to constantly improve our position against cyber security threats and create an environment for data integrity across the global portfolio of Marmon Water companies. In this crucial role, you will ensure the security and integrity of the organization's information technology systems, networks, and data. You will report to the Group Director of IT to develop and implement security policies and procedures, conduct risk assessments, manage security technologies, monitor security events, manage security incidents, train employees, and stay up to date with the latest security trends and technologies.The IT Security Architect is critical in protecting the organization's valuable assets from cyber threats. The successful candidate will have strong technical skills, experience in IT security management, excellent communication and analytical skills, and a willingness to stay up to date with the latest security trends and technologies.
Marmon Water Inc. is one of eleven groups within Marmon Holdings, Inc (www.marmon.com) and a global leader in water treatment with a portfolio of operating companies who together provide innovative water treatment solutions across residential, commercial, and industrial applications.
What You’ll Do
- Implement security policies and procedures to protect the organization's IT infrastructure and data.
- Ensures compliance with Marmon IT-30 Security and Operations policies (based on current CIS standards), PCI-DSSs, ISO 27001, GDPR, CCPA, NIST, ITAR, and other regional security / privacy regulations.
- Conduct risk assessments to identify potential threats and vulnerabilities and develop mitigation strategies.
- Manage security technologies like firewalls, antivirus software, intrusion detection systems, and other security tools.
- Monitor security events to detect and investigate potential security breaches or threats.
- Manage security incidents, including containment, investigation, and recovery.
- Train employees on IT security best practices and raise awareness about cyber threats.
- Partners with supply chain and commercial teams on third party risk management.
- Partners with software/hardware engineering teams on improving security of manufactured products.
- Stay up to date with the latest security trends and technologies and evaluate how they may affect the organization's security posture.
- Coordinate security activities with Marmon Corporate and other Marmon group IT teams.
- Collaborate with other IT teams to ensure the organization's IT infrastructure is secure and compliant with industry standards and regulations.
- Participate in audits and assessments to evaluate the effectiveness of the organization's security program.
- Prepare reports and presentations for management to communicate security posture and risks.
Who You Are
- Trustworthy: Truthful and honorable under all circumstances while flawlessly faithful to mission, vision and values without a personal agenda. Follows through on commitments, without fail. Communicates transparently, even in the face of criticism. Inspires a high-trust environment.
- High Integrity: Never fails to make decisions in the long-term best interest of the company. Embodies a consistent 'the buck stops' here mentality.
- Strong Work Ethics: Recognizes situations that warrant initiative and moves forward without hesitation. Acts as a role model for healthy work/life balance where all demands are met.
- Inspirational: Clearly communicates a vision and clear sense of purpose that others want to follow. An ability to command engaged attention and is consistently encouraging. Creates an enthusiastic buy-in to strategies and initiatives. Moves others to set high standards for themselves and their teams.
- Courageous: Challenges current thinking to understand new possibilities. Willing to recommend unpopular decisions and take unwavering action to achieve results.
- Communicative: Extraordinarily skilled when speaking, writing, and presenting. Sets a standard for listening, and coaches others to do the same.
Skills/Experience We’re Looking For
- Bachelor's or degree in Computer Science, Information Technology, or a Bachelor’s degree and job experience in security, and information technology.
- Relevant industry certifications such as Network Security, Sec+, DR, CISSP, CISM, or CISA
- At least five years of experience in IT security, and experience in providing desktop/network support
- Strong knowledge of security technologies, such as firewalls, antivirus software, intrusion detection systems, offensive pen testing, defensive pen testing, and other security tools.
- Experience in implementing Zero Trust architecture
- Familiarity with industry standards and regulations such as ISO 27001, CCPA, GDPR, and CIS
- Experience in developing and implementing security policies and procedures.
- Excellent communication skills, including communicating technical information to non-technical stakeholders.
- Ability to work independently and in a team environment.
- Strong analytical and problem-solving skills.
- Ability to maintain confidentiality and work with sensitive information.
- Willingness to work outside normal business hours when required.
Following receipt of a conditional offer of employment, candidates will be required to complete additional job-related screening processes as permitted or required by applicable law.
We are an equal opportunity employer, and all applicants will be considered for employment without attention to their membership in any protected class. If you require any reasonable accommodation to complete your application or any part of the recruiting process, please email your request to careers@marmon.com, and please be sure to include the title and the location of the position for which you are applying.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Antivirus Audits Business Intelligence CCPA CISA CISM CISSP Compliance Computer Science Firewalls GDPR Industrial Intrusion detection ISO 27001 IT infrastructure Network security NIST Pentesting Privacy Risk assessment Risk management Vulnerabilities Zero Trust
Perks/benefits: Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.