Description
As a security architect, you will be responsible for designing, building, testing, and developing security services within.
The security architect will provide Enterprise information systems with advanced architecture and engineering support.
The Security architect’s responsibility includes reviewing current security measures, recommending enhancements, and identifying areas of weakness.
The architect needs to be able to take lead in pre-studies, develop security services and have project management skills.
Key Responsibilities:
• A thorough understanding of Information technology and IT architecture.
• Planning, researching, and designing security architectures.
• Create and maintain advanced IT security documentation, processes, procedures, and infrastructure.
• Assesses current applications and architecture to ensure current implementations align with industry security guidelines, best practices, and management-approved standards.
• Research, analyze, and recommend security products and services.
• Responsible for maintenance of authentication directories, Microsoft LDAP, IAM/IDAM, Single Sign-On, Configurations, and the User directories.
• Enhances department and organization reputation by accepting ownership for accomplishing new and different requests; exploring opportunities to add value to job accomplishments.
• Subject matter expert in identity and access management architecture and Security architecture
Requirements:
• 10 years of dedicated experience in IT Security, Information Security, Risk management, System/Application integration, and designing and implementing IAM solutions.
• Relevant academic education or experience deemed equivalent.
• Advance knowledge of Security protocols, IAM technologies, and concepts.
• Advanced knowledge of Active Directory, Single-Sign-On (SSO), and Federated Identities.
• Ability to interact with a broad cross-section of personnel to explain and enforce security measures.
• Plans security systems by evaluating technologies, developing requirements for security governance, automated administration, designing public key infrastructures (PKIs), including the use of certification authorities (CAs), digital signatures, and adhering to industry security standards.
• Create system security reports, collecting, analyzing, and summarizing data and trends.
Location: Gothenburg / Hybrid
Start: asap
Duration: 6 months + extension