What does a Solution Architect do?
We asked our colleague Benoit what his typical day looks like.
Description
The role of an INNOCOM ESA is helping our clients translate and implement their security strategy. This is done by developing and maintaining a security strategy plan and roadmap that enables the client to develop and implement security solutions and capabilities that are clearly aligned with business strategy and technology.
They ensure the Enterprise Security Architecture is continuously aligned to the business Strategy, Business Operating Model, and IT strategy.
The INNOCOM ESA will track developments and changes in the digital business of our clients to ensure that these are adequately addressed in security strategy plans and architecture artifacts.
Furthermore, the INNOCOM ESA will conduct security assessments, be actively involved in developing security standards and practices, the design of security capabilities and modeling, play a key role in reviewing security technologies, tools and services, and liaise with enterprise architects, other security architects, and security practitioners to share best practices and insights.
Experience
Excellent oral and written English, Dutch, and/or French communication skills.
At least 5 years’ experience with enterprise security architecture within a corporate environment.
Strong technical experience of developing security architectures that enable digital transformation within a business.
Understanding of key IT disciplines e.g., strategy, governance, software delivery, etc.
Practical experience with architecture service definition and governance including Innovation, IT Strategy, Portfolio Planning, Budget, Solution Architecture.
Experience in using architecture methodologies such as SABSA, Zachman, and/or TOGAF. Methods for risk identification & analysis, models for cyber adversary behavior and security threats.
Good working knowledge of managing security infrastructures—e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), Endpoint protection, Monitoring and Detection, SIEM and log management technology.
Good knowledge of IAM technologies and services.
Good knowledge of Cloud Security Architecture and Technologies.
Good knowledge of Cyber Security (Threat Modeling, Penetration testing, Risk Management, Cyber Defense Operations, Security Governance, Business resilience).
Profile
Open & honest, highly energetic, and intrinsically motivated.
A fast learner, able to absorb new skills and quickly adapt to new contexts.
Capable of building trusted relationships with senior management.
Extremely customer-focused, able to adapt quickly to new environments, connect easily with people and context.
A conceptual, creative, and critical thinker.
Passionate about change and eager to push it forward while managing expectations.
A natural communicator, able to explain complex topics in understandable language to different stakeholders (ability to communicate complex technical issues to non-technical stakeholders).
Able to create impact.
Capable of leading a team.
A team player able to support the learning of others and initiate improvement.
A role model and ‘go-to person’ with high emotional intelligence.
Contact us
and have a chat about joining us,
or apply below?
#J-18808-Ljbffr
demandeur d emploi
recruteur