Qualcomm Security Architect (TOGAF/CCIE Security) in Hyderabad, India
Security Architect (TOGAF/CCIE Security)
India - Hyderabad
The Information Security and Risk Management team is looking for a strong team player capable of supporting multiple security solutions across the globe and with a deep understanding architecture of security controls
You will hold the following responsibilities:
Security architecture, solutions delivery, principles and emerging technologies - Designing and implementing security solutions. This includes continuous monitoring and making improvements to those solutions, working with an information security team.
Consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements.
Security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks.
Exposure to:computer networking concepts and protocols, and network security methodologies.risk management processes (e.g., methods for assessing and mitigating risk).laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.cyber threats and vulnerabilities.cyber defense and vulnerability assessment tools and their capabilities.cryptography and cryptographic key management conceptsorganization's enterprise information security architecture.cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).new and emerging information technology (IT) and cybersecurity technologies.application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing).
Communicating to diverse audiences
Identify risks associated with business processes, operations, information security programs and technology projects
Exposure to enterprise security and explain technical topics to those without a technical background
Determine how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
Writing test plans.
Designing multi-level security/cross domain solutions.
Using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic).
Translating operational requirements into protection needs (i.e., security controls).
Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Bachelor's degree and 7+ years IT-relevant work experience OR 9+ years IT-relevant work experience without a bachelors degree.
Master's degree in IT-relevant field.
Information Security-Relevant Certifications.
EEO employer: including race, gender, gender identity, sexual orientation, disability & veterans status.