Data Security Architect Architecture - Hopkinton, MA at Geebo

Data Security Architect

Data Security ArchitectOur Cybersecurity Consulting team translates security requirements into working solutionsWe recommend technical tools and then collaborate with clients to configure, deploy and adhere to product security policies and controls.
Join us as an Data Security Architect on our Cybersecurity Consulting team in Austin, Texas, Hopkinton, Massachusetts, Franklin Massachusetts or Nashville, Tennesee to do the best work of your career and make a profound social impact.
What you'll achieveAs a Data Security Architect, you will be responsible for engaging stakeholders with diverse perspectives on needed capabilities and perform research and analysis to provide recommendations to Cybersecurity Leadership.
You will work closely with business partners, peer architects, engineers, consultants and other stakeholders across the enterprise with cross-functional demands to provide Data Security strategies, roadmaps, architectures, and program related items to improve our data security posture across the globe.
You will:
Develop reference architectures for Data Security capabilities to be leveraged by infrastructure and product teamsDevelop and present strategies and roadmaps to stakeholders, including executive management, for Data Security capabilities and technologies such as Data Loss Prevention, Data Encryption/Tokenization/Masking, Endpoint and Network Data Controls, and Data Lifecycle ManagementCreate a trusted partnership with business to understand and document use cases that can be leveraged and are represented in delivered architectural artifactsDrive a comprehensive Data Loss Prevention strategy that covers the global enterprise across all control paradigmsTake the first step towards your dream careerEvery Dell Technologies team member brings something unique to the tableHere's what we are looking for with this role:
Essential Requirements10
years of enterprise experience in Cybersecurity, Data Security, and relevant technologies including knowledge of enterprise hybrid cloud environmentsStrong demonstrable knowledge and experience in the application of Data Security controls with focus on Data Loss Prevention across large and complex environmentsExperience with implementation and maturation of security controls against industry-recognized security frameworks and standards such as NIST CSF, NIST 800-53 and ISO 2700xPractical understanding and experience building/designing/operating data protection technologies to include:
Data Loss Prevention, Cloud Access Security Broker, Content Filtering, Data Access Governance, Encryption/Tokenization/Obfuscation/Masking, Rights Management, Database Security, Email Security, Endpoint Security, User Entity Behavior Analytics (UEBA) and Logging & MonitoringAbility to articulate technical security gaps in terms of business riskDesirable RequirementsBachelor's degree in Computer Science, Cybersecurity, Information Security, Management Information Systems, Information Technology, Engineering, or related fieldSecurity and privacy industry certifications such as CISSP, CISA, CISM, CRISC, etc.
Who we areWe believe that each of us has the power to make an impactThat's why we put our team members at the center of everything we doIf you're looking for an opportunity to grow your career with some of the best minds and most advanced tech in the industry, we're looking for you.
Dell Technologies is a unique family of businesses that helps individuals and organizations transform how they work, live and playJoin us to build a future that works for everyone because Progress Takes All of Us.
Dell Technologies is committed to the principle of equal employment opportunity for all employees and to providing employees with a work environment free of discrimination and harassmentRead the full Equal Employment Opportunity Policy here.
Job ID:
R238774Dell's Flexible & Hybrid Work CultureAt Dell Technologies, we believe our best work is done when flexibility is offered.
We know that freedom and flexibility are crucial to all our employees no matter where you are located and our flexible and hybrid work style allows team members to have the freedom to ideate, be innovative, and drive results their wayTo learn more about our work culture, please visit our locations page.
Recommended Skills Business Informatics Certified Information Security Manager Certified Information Systems Security Professional Cryptography Data Analysis Data Control Apply to this job.
Think you're the perfect candidate? Apply on company site $('.
external-apply-email-saved').
on('click', function (event) window.
ExternalApply = window.
open('/interstitial?jobdid=j3q5nw69mdhx8ysk2wq', 'ExternalApply-j3q5nw69mdhx8ysk2wq'); ); Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.