Security Architect
Wabash Bldg-Chgo, IL, United States
Full Time Senior-level / Expert USD 137K - 233K
Northern Trust
Guided by founding principles of service, expertise and integrity, our experts help the world’s most successful individuals, families and institutions achieve their goals.About Northern Trust:
Northern Trust, a Fortune 500 company, is a globally recognized, award-winning financial institution that has been in continuous operation since 1889.
Northern Trust is proud to provide innovative financial services and guidance to the world’s most successful individuals, families, and institutions by remaining true to our enduring principles of service, expertise, and integrity. With more than 130 years of financial experience and over 22,000 partners, we serve the world’s most sophisticated clients using leading technology and exceptional service.
Major Duties:
1. Works with business units and technical security teams to design and implement security solutions while ensuring alignment with the organization's overall business objectives and risk tolerance
2. Develop security blueprints and security architecture diagrams for new/current systems and applications, considering factors like data protection, access controls, network segmentation, Artificial Intelligence (AI)
3. Develop and implement threat modeling frameworks to proactively identify security risks and in business applications, infrastructure, and business processes
4. Identifying potential security risks within the business, evaluating their impact, and proposing appropriate mitigation strategies
5. Understanding how security incidents could affect business operations and prioritizing security measures based on criticality
6. Contributes to the Security Incident Response team and communicates incidents to senior management in Information Technology and Cyber Risk Management
7. Seasoned multi-disciplinary expert with extensive technical and / or business knowledge and functional expertise
8. Assists in monitoring and evaluating the effectiveness of the enterprise's information security safeguards to ensure they provide the intended level of protection
9. Carries out complex initiatives involving multiple disciplines and/or ambiguous issues
10. Displays a balanced, cross-functional perspective, liaising with the business to improve efficiency, effectiveness, and productivity
11. Helps establish overall enterprise information security architecture by aligning business processes, IT software and hardware, local and wide area networks, people, operations, and projects with the organization's overall security strategy
12. Evaluates proposals to determine if proposed security solutions effectively address business requirements
13. Identifies alternative functional security strategies to address organizational IT security concerns
14. Interprets and/or approves security requirements relative to the capabilities of new information technologies
15. Leads and aligns IT security priorities with the businesses’ mission and vision
16. Manages the monitoring of external threat intelligence data sources to maintain enterprise situational awareness
Knowledge:
- Knowledge of Information Assurance principles
- Knowledge of incident response and handling methodologies
- Knowledge of industry-standard and organizationally accepted analysis principles and methods
- Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies
- Knowledge of network architecture concepts including topology, protocols, and components
- Knowledge of network management principles, models, and tools
- Knowledge of network security architecture, including the application of Defense-In-Depth principles
- Knowledge of network traffic analysis methods
- Knowledge of new and emerging IT and information security technologies
- Knowledge of Open System Interconnection model
- Knowledge of penetration testing tools and techniques (e.g., metasploit, neosploit, etc.)
- Knowledge of server administration and systems engineering theories, concepts, and methods
- Knowledge of server and client operating systems
- Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems
- Knowledge of what constitutes a threat to a network
- Knowledge of information security program management and project management principles and techniques
Experience:
A College or University degree and/or relevant proven work experience in the area of Information Security is required. Industry certification such as CISSP, CISM, CISA, GIAC is preferred.
Salary Range:
$137,400 - 233,600 USDSalary range is a good faith estimate of base pay. Northern Trust provides a comprehensive benefits package including retirement benefits (401k and pension), health and welfare benefits (medical, dental, vision, spending accounts and disability), paid time off, parental and caregiver leave, life & accident insurance, and other voluntary and well-being benefits. Northern Trust also provides a discretionary bonus program that may include an equity component.
Working with Us:
As a Northern Trust partner, greater achievements await. You will be part of a flexible and collaborative work culture in an organization where financial strength and stability is an asset that emboldens us to explore new ideas.
Movement within the organization is encouraged, senior leaders are accessible, and you can take pride in working for a company committed to assisting the communities we serve! Join a workplace with a greater purpose.
We’d love to learn more about how your interests and experience could be a fit with one of the world’s most admired and sustainable companies! Build your career with us and apply today. #MadeForGreater
Reasonable accommodation
Northern Trust is committed to working with and providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation for any part of the employment process, please email our HR Service Center at MyHRHelp@ntrs.com.
We hope you’re excited about the role and the opportunity to work with us. We value an inclusive workplace and understand flexibility means different things to different people.
Apply today and talk to us about your flexible working requirements and together we can achieve greater.
Tags: Artificial Intelligence CISA CISM CISSP GIAC Incident response Intrusion detection Linux Metasploit Monitoring Network security Pentesting Risk management Security strategy Strategy Threat intelligence UNIX Windows
Perks/benefits: Equity / stock options Flex hours Flex vacation Health care Insurance Medical leave Parental leave Salary bonus
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.