Cybersecurity Architect
EG107 - Cairo - Nexus (EG107), Egypt
DXC Technology
DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds.Job Description:
Responsibilities :_
- Assess complex IT environments and map the data flow through systems, applications, and functions
- Assess the current architecture and solution limitations, and define and design system specifications and working parameters for new solutions
- Develop and deploy incident response plans and cybersecurity procedures
- Design, build, implement, and support enterprise-class information security systems
- Plan, research, and design robust security architectures for assigned IT projects
- Perform security assessments, including security program reviews, penetration testing, vulnerability testing, and risk analysis
- Identify IT security design gaps and define proposed changes or enhancements
- Design action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats
- Research, plan, evaluate, and engineer security technology, products, and solutions
- Define and maintain security policies and procedures aligned to industry best practices
- Manage large-scale programs
- Review and recommend security configuration and policies for firewalls, VPN systems, routers, IDS scanning technologies, and servers
- Review and analyze system logs, SIEM tools, and network traffic for unusual or suspicious activity
- Test new security software, tools, and technology to determine their best use within our organization
- Provide security architecture and engineering expertise across company projects and initiatives
- Provide Tier-2 support to cybersecurity staff in response to security-related incidents
- Identify and communicate current and emerging IT security threats
Skills and Experience :_
- Experience in a cybersecurity role
- Experience in security design or technical evaluation
- Experience in security operations management, incident management, and governance
- Experience designing and implementing technical solutions for network security, including firewall, proxy services, VPN/remote access, intrusion detection and prevention, and software-defined network security
- Experience with security protocols including SSL, HTTPS, SSH, PGP, PKI, and/or Kerberos
- Experience with system orchestration and control infrastructure elements, API integration frameworks, Openstack, or similar system control environments
- Experience developing technical evaluation plans and technical reports
- Knowledge of vulnerability scanners and interpreting results
- Knowledge of manual configuration review for different operating systems and database servers based on the CIS benchmarks
- Knowledge of database and operating system security
- Knowledge of common security standards and frameworks
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: APIs Firewalls Governance IDS Incident response Intrusion detection Kerberos Monitoring Network security OpenStack Pentesting PKI Risk analysis Security assessment SIEM SSH VPN
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.