Search by job, company or skills

Mahindra Satyam

Security Architect

Save
new job description bg glownew job description bg glownew job description bg svg
  • Posted 14 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Tech Mahindra represents the connected world, offering innovative and customer-centric information technology experiences, enabling Enterprises, Associates, and the Society to Rise. It has 150,000+ professionals working for 1000+ Global Customers (including Fortune 500 companies) in 90 Countries. We're part of the esteemed Mahindra group, headquartered in India. Under a new CEO, Tech Mahindra is committed to a transformative journey with Scale @ Speed as our guiding principle.

JD:

Cybersecurity Architect with 10years of experience typically assume senior and strategic roles within an organization. Responsible for designing, implementing, and overseeing the security infrastructure and policies that protect an organization's information systems. His/her roles and responsibilities evolve from a purely technical focus to incorporating management, leadership, and strategic decision-making. Here's a breakdown of key roles and responsibilities:

Security Architecture Design

  • System Design: Develop and design robust security architectures that align with the organization's overall IT strategy, ensuring confidentiality, integrity, and availability of systems and data.
  • Security Frameworks & Standards: Implement industry best practices and security frameworks (e.g., NIST, ISO 27001, CIS) to ensure compliance with regulatory requirements and alignment with business goals.
  • Scalable Solutions: Ensure the security architecture is scalable, resilient, and adaptable to changing business needs and evolving cybersecurity threats.

Security Strategy and Policy Development

  • Security Policies: Develop and enforce security policies, procedures, and guidelines to ensure consistent and effective security practices across the organization.
  • Strategic Planning: Work closely with senior management to establish long-term cybersecurity strategies that support business objectives while protecting sensitive data and systems.
  • Incident Response Strategy: Design and improve incident response plans, ensuring the organization is prepared to respond effectively to security breaches or attacks.

Risk Management and Threat Assessment

  • Risk Assessment: Conduct regular risk assessments and threat modeling to identify vulnerabilities, threats, and security gaps across the organization's IT infrastructure.
  • Security Audits: Perform periodic security audits and penetration tests to evaluate the effectiveness of existing security measures.
  • Vulnerability Management: Prioritize and mitigate security risks and vulnerabilities, developing strategies to reduce the attack surface.

Technology Selection and Integration

  • Tool Evaluation & Selection: Assess and recommend security technologies, tools, and solutions that meet the organization's security requirements (e.g., firewalls, IDS/IPS, SIEM, encryption tools) and AI-led improvement to bring down the tool/license cost.

Integration: Ensure that selected security technologies are properly integrated into the existing IT infrastructure, considering

More Info

Job Type:
Industry:
Function:
Employment Type:

About Company

Job ID: 146399677

Similar Jobs