3 Easy Steps

  • 1Search for courses by Study Area, Level and Location
  • 2We deliver you all the matched results
  • 3Choose one or more course providers to contact you
Industry

Distance from location (kms)

Exact 5 10 25 50 100

Posted since

All 2 Days 1 Week 2 Weeks 1 Month

Sort results by

Relevance Date

5

February

Cyber Security Client Engagement Architect

HCL Tech - Melbourne, VIC

IT
Source: uWorkin

JOB DESCRIPTION

Position Overview:

Candidates must have prior experience designing and integrating diverse information technologies, managing complex system interfaces, and developing secure architectures. The successful candidate will work closely with program and account teams and customers to identify and shape near-term and long-term roadmaps, architectures, and requirements. This position will be responsible to lead a high-performing team of Cyber Security professionals and play a significant role in HCL’s efforts to expand its portfolio across the named Client’s Cyber Security landscape.


This person also will participate in briefings, training, and thought leadership activities.


Key Skill Areas:

Enterprise Security Architecture

  • Assessment - to determine the strength of the foundations for security within organizations and to ensure that their vision, strategies, processes, people and technologies are aligned and organized effectively to optimize Cyber Security in support of their business goals.

Design & Implementation 

  • To design and build security into organizations from ‘top to bottom’ so that it can be justified, and from ‘bottom to top’ so that it can be seen to be complete.

Technical Security Architecture

  • Assessment – to determine the strength and appropriateness of technical designs in mitigating relevant Cyber threats.
  • Design & Implementation – to formulate & communicate new architectures and demonstrate their suitability in mitigating relevant Cyber threats.

Security Leadership & Management 

  • Planning, managing and organizing the delivery of Security Architecture to clients.

Security Transformation (and Security in Transformation) 

  • Working in large scale transformation programs, building their capability to assess and design Cyber Security into the different initiatives undertaken by the client.

Communication & Influencing 

  • Working with senior stakeholders, utilizing Security Architecture methods and collateral to influence their decisions.

Desired Experience & Qualifications:

  • 17 or more years of experience with Bachelor's degree required.
  • Master's degree in related field or business administration preferred but not required.
  • A track record of previous Cyber Security consulting experience, working on complex business-facing client problems.
  • Experience of industry standard Architectural Methodologies and Frameworks such as SABSA and TOGAF.
  • Experience of relevant technologies (such as Networks, LANs and WANs, Servers & Hosting, Virtualization, Applications, Identity Management etc.) and how to securely implement them.
  • A sound understanding of how to model threats & risks as well as the controls necessary to mitigate them, on both an organizational and technical level.
  • An understanding of how business strategy, risk, regulation and technical constraints influence organizational responses to cyber security.
  • Excellent communication skills – both oral (for interviews/meetings, presentations) and written (for designing and writing engaging reports which communicate findings succinctly and clearly convey the message in a way which is appropriate for the audience, and rooted in the client’s needs).
  • Experience of business development or sales, including leading bid teams, and experience of writing winning proposals and RFP responses.
  • Cyber Security related qualification(s) such as CISSP, CISM, CREST Technical Security Architect, ISO Lead Auditor etc.
  • An understanding of security methodologies, best practice and industry standards
  • Experience in risk & regulatory frameworks and standards such as NIST 800, ISO 27001, ISF SOGP, PCI-DSS etc.