Jobs Unique & Global

Accelerate Achieved Aspirations

Welcome to our Directory of Jobs

popup cross
Cybersecurity Architect
Full-Time
salary 122,633 S$ / Per Year
category Computer/IT
created 10/28/2024
end dateCloses: 02/28/2025
Email: devrmenon@gmail.com
Job Info
Status: Sourcing
Duration:
Experience: 10 Years
Career Level: Experienced (Non-Manager)
No of Jobs: 6
Posted: 10/28/2024
Apply Before: 02/28/2025
Description

Cybersecurity architects are responsible for designing, developing and implementing the security systems that protect an organization’s information technology (IT) network.

Responsibilities

  • Gaining a total understanding of the organization’s technology and information systems
  • Planning, researching, and designing reliable, powerful, and flexible security architectures for all IT projects
  • Performing vulnerability testing on the completed infrastructure, including risk analyses and security assessments
  • Researching the latest security standards, new security systems, and updated authentication protocols
  • Defining, creating, implementing, and maintaining all needed corporate security policies and procedures, making sure that all employees abide by them
  • Developing requirements for all IT assets including routers, firewalls, local area networks (LANs), wide-area networks (WANs), virtual private networks (VPNs), and any other related network devices
  • Reviewing and approving the installation of all firewalls, VPN, routers, servers, and IDS scanning technologies
  • Preparing cost estimates for all cybersecurity measures and identifying any potential integration issues
  • Designing critical public infrastructures (PKIs), including digital signatures and certification authorities (CA)
  • Testing the organization’s final security structures to make sure they function as planned
  • Providing technical guidance and supervision for security teams
  • Taking charge of any security awareness programs and educational efforts to better prepare non-IT personnel
  • Responding immediately to any security-related incidents (e.g., data breaches, viruses, phishing scams) and providing a complete post-event analysis once there is a resolution
  • Updating and upgrading the organization’s security systems as needed