The Security Lead is responsible for leading the development of information security architectural standards and ensuring technology initiatives are implemented within the framework to make our client’s environments more secure.
The Security Lead is accountable for securing enterprise information by identifying network and application security requirements, planning, implementing and testing security controls and procedures.
Day-to-day, you will:
Build the security practice within the region, working with sales / business development teams, security consultants, and business leaders to develop and build the security practice.
Act as a trusted advisor for Avanade clients, recommending and identifying opportunities to increase and address security considerations.
Work closely with enterprise architects to identify and mitigate risks, perform security reviews, design top tier security practices, and deliver strategic, innovative cloud based security offerings.
Work with practice leaders to implement security components into existing offerings and engagements to increase the value proposition and impact of Avanade offerings.
Support implementation teams on the assessment of the security status of their programs, identifying actions and steps to secure the project across the product lifecycle.
Develop metrics that demonstrate current risk state, indicators of progress, and business alignment for these activities.
The ideal candidate must have a strong foundation across security offerings and the ability to communicate security and risk-related concepts to key stakeholders along with experience with the following:
Architecture and security management for both on-premises and cloud-based environments
Privileged access management technologies
Subject matter expertise & domain knowledge for key frameworks, such as ISO/IEC 27001 or NIST
Creating security framework, SIRRP process and/or forensic handling methods
Knowledge of host hardening, auditing, logging and monitoring, network security, SEIM deployments, security analytics, anomaly detections, PKI
Certifications: CISSP, CISM, Microsoft, or other relevant certifications (preferred)
You likely have a Bachelor’s Degree in computer science, computer engineering, management information systems, information technology, or a similar field. An equivalent combination of education and experience may substitute for a degree.
Requisition ID - 53566