Sr. Cloud Security Architect

Baylor Scott & White Health

JOB SUMMARY

As a Cloud Security Architect, you will paly a key leadership role in the success of the security operations program by providing guidance on cloud security related issues, including but not limited to technical infrastructure, process, design, assessment, implementation, awareness, and governance. The Sr. Cloud Security Architect will provide leadership, experience, and expertise to project teams on driving the cloud architecture of BSWH to be secure, auditable, and of course, usable by our customers. You will serve as a security subject matter expert as part of an in-house, on-shore, and off-shore security architect team responsible for securing the enterprise information and its systems by determining security requirements across enterprise projects; planning, designing, and documenting security systems; preparing security standards, policies and procedures

ESSENTIAL FUNCTIONS OF THE ROLE

Serve as a key player in the security architect team, responsible for securing enterprise information and systems

Plan, design, and document SaaS, IaaS, security systems

Assist in preparing security standards, policies, and procedures for projects involving SaaS, Iaas, PaaS

Utilize SIEM for monitoring, analyzing, and responding to security events and incidents

Provide technical and operational security expertise to cross-functional teams

Collaborate with on-shore and off-shore teams to implement security requirements across the enterprise

Focus on Cloud and participate in the CASB/ZTN/SASE roadmap and planning with other Sr. Security architects, ensuring compliance with healthcare industry regulations and standards

Serve as a key player in Cyber Intelligence Planning (CI-WRL-004)

Advance the functionality of the SIEM, including correlation across cloud-sourced indexes, ultimately leveraging ML and AI

KNOWLEDGE, SKILLS AND ABILITIES

Systems Analysis

T1035: Determine how threat activity groups employ encryption to support their operations

T1354: Identify system cybersecurity requirements

K0018: Knowledge of encryption algorithms

K0689: Knowledge of network infrastructure principles and practices

K0718: Knowledge of network communications principles and practices

K0915: Knowledge of network architecture principles and practices

K1037: Knowledge of target critical capabilities

K1052: Knowledge of the Tasking, Collection, Processing, Exploration, and Dissemination (TCPED) process

K1101: Knowledge of data modeling and predictive analytics techniques for cybersecurity applications

Knowledge Management

K0674: Knowledge of computer networking protocols

K0680: Knowledge of cybersecurity principles and practices

K0751: Knowledge of system threats

K0752: Knowledge of system vulnerabilities

K0977: Knowledge of intelligence collection management tools and techniques

K1005: Knowledge of data lifecycle management, including data storage, retrieval, and archival

K1100: Knowledge of data governance frameworks and best practices for ensuring data quality and integrity

S0506: Skill in data visualization tools and techniques to communicate complex security concepts

Analyze:

All-Source Analysis

T0718: Identify intelligence gaps and shortfalls

T1020: Determine the operational and safety impacts of cybersecurity lapses

T1657: Develop a diverse program of information materials

T1661: Asses all-source data for intelligence or vulnerability value

K1005: Knowledge of intelligence collection capabilities and applications

K1029: Knowledge of statistical analysis methods and tools for analyzing security event data

S0709: Skill in developing and applying machine learning algorithms to detect cybersecurity threats

S0783: Skill in creating decision support materials using data-driven insights

Oversee and Govern

Strategic Planning and Policy

T1036: Integrate leadership priorities

T1718: Implement changes to planning policies and procedures

T1729: Synchronize intelligence planning activities and operational planning timelines.

T1779: Coordinate strategic planning efforts with internal and external partners.

K0676: Knowledge of cybersecurity laws and regulations

K0734: Knowledge of Risk Management Framework (RMF) requirements

K0983: Knowledge of data privacy laws and their implications on cybersecurity practices.

S0763: Skill in integrity organization objectives with data strategy to enhance decision-making.

Performs other position appropriate duties as required in a competent, professional, and courteous manner

BENEFITS

Our competitive benefits package includes the following

Immediate eligibility for health and welfare benefits

401(k) savings plan with dollar-for-dollar match up to 5%

Tuition Reimbursement

PTO accrual beginning Day 1

Note: Benefits may vary based upon position type and/or level

PREFERRED CERTIFICATIONS

Certified Information System Security Professional (CISSP) certification

Certified Information Security Manager (CISM) certification

CompTIA Advanced Security Practitioner (CASP)

QUALIFICATIONS

EDUCATION – Bachelors or 4 years of work experience above the minimum qualification

EXPERIENCE – 7 Years of Experience

As a health care system committed to improving the health of those we serve, we are asking our employees to model the same behaviours that we promote to our patients. As of January 1, 2012, Baylor Scott & White Health no longer hires individuals who use nicotine products. We are an equal opportunity employer committed to ensuring a diverse workforce. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law.

Show Full Vacancy