Cyber Security Architect – Cloud Transformation


Responsibilities:

  • Determine cyber security requirements by evaluating business strategies and requirements, researching information security standards, conducting system security and vulnerability analyses and risk assessments, studying architecture or platform and identifying integration issues
  • Develop and manage cyber security architecture design, framework, roadmap and policy across project teams and IT stakeholders
  • Oversee technological execution of the recommended cyber security related roadmap across project teams and stakeholders
  • Manage cyber security design review of proposed security related solutions across project teams and IT stakeholders
  • Work closely with technology risk management and IT security teams to monitor the company’s cyber security requirement
  • Regularly evaluate security architecture and provide improvement suggestions
  • Offer guidance in cyber security protection and arrange cyber security architecture workshops or briefings
  • Update job knowledge by tracking and understanding emerging security practices and standards, identify the best security architecture solutions to successfully meet the strategic and business needs of the company
  • Perform other duties as assigned by supervisor(s)

Requirements:

  • University degree in information technology, computer science or related discipline
  • Minimum 5 years of relevant experience preferably gained from major financial institutions
  • Experience in designing, executing and supporting cyber security framework and policy development, preferably with exposure in the areas of network security, application security, endpoint security, data security, identity management, database and infrastructure security, container security or cloud security
  • Excellent knowledge of security solution technologies and current cyber security trends
  • Positive attitude and strong commitment to the delivery of quality work
  • Effective communication skills to properly articulate complicated cyber security reports to management and other IT or internal stakeholders
  • Good command of written and spoken English and Chinese, with proficiency in Putonghua an advantage

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s