Director, Security & System Architecture chez 3D Systems
3D Systems · Rock Hill, États-Unis d'Amérique · Onsite
- Senior
- Bureau à Rock Hill
About the Role:
The Director of Security and System Architecture is responsible for the strategic oversight, implementation, and continuous improvement of the organization's cybersecurity architecture and IT infrastructure. This role ensures the confidentiality, integrity, and availability of all technology systems and services across the enterprise. This individual will provide security expertise an all areas of IT Operations, including network architecture, application security, cloud operations, data management, access management, and end user computing. This role requires a strong mix of hand-on technical expertise and process design and program management. The ideal candidate is a strategic thinker with strong technical expertise and a proven track record of leading high-performing security and infrastructure teams.
What’s In It For You!
- Competitive Pay: Our employees are the best part of our company. We want you to feel valued, appreciated, and included. Because of this, we make sure your hard work is recognized.
- Paid Leave (US ONLY): Enjoy time away from work with Company paid holidays and a flexible working schedule through our paid time off (PTO) policy. Yep, you read that correctly. We are a Company that values you and makes sure you take time for yourself.
- 401(k): Prepare for a secure retirement with our 401k plan, which includes an employer matching contribution.
- Comprehensive Health & Wellness Plans: We want to be here for our employees throughout all stages of life, which is why we offer a wide range of resources, information, and support during your career with us.
- Global Team: With our state-of-the-art corporate headquarters in Rock Hill, South Carolina, our global team has a presence across more than 15 countries worldwide. Experience a workplace comprised of talented individuals who are passionate about serving our customers and each other.
- Innovative Culture: Innovation is at the heart of what we do! Since our founding in 1986 by Chuck Hull, the inventor of 3D printing, we have continuously pushed the boundaries of what is possible with additive manufacturing. When you join 3D, you will have the opportunity to work with cutting edge technology in an innovative and collaborative culture!
- Talent Development: At 3D Systems, we invest in talent programs to support employees with opportunities to grow, contribute, develop, and thrive in their careers.
- Connection & Engagement Opportunities: We strive to cultivate an environment where our diverse global workforce can connect and thrive. Our Employee Resource Group program, Employee Recognition program, and 3D Gives Back program, are just a few examples of how you will be empowered to build connections, celebrate wins, and make a meaningful impact.
What We Are Looking For:
Cybersecurity Leadership
- Develop, implement, and manage enterprise-wide cybersecurity strategies, frameworks, policies, and procedures.
- Define and execute a comprehensive technology infrastructure and security roadmap aligned with organizational goals.
- Ensure compliance with industry and regulatory standards (e.g., NIST, ISO 27001, HIPAA, SOC 2, PCI-DSS).
- Partner with business units, development teams, and executive leadership to ensure technology meets current and future needs.
- Collaborate with software development, infrastructure, DevOps, and data teams to ensure secure, scalable, and high-performing systems.
- Evaluate, select, and manage vendors and service providers related to infrastructure and cybersecurity.
- Establish KPIs, metrics, and dashboards to monitor and report on the performance, security, and reliability of IT systems.
- Lead the design, maintenance, and optimization of IT infrastructure, including networks, servers, cloud platforms, and on-premise systems.
- Drive modernization initiatives such as cloud migrations, virtualization, automation, and infrastructure-as-code.
- Ensure high availability, disaster recovery, and business continuity planning and execution.
- Provide technical leadership for team members and peers to deliver secure solutions, tools, and process designs throughout the enterprise.
- Review and validate penetration test findings for validity.
- Validate implementation of recommended security configuration changes identified by penetration test findings.
- Work with business units, IT leaders, compliance teams, and third-party vendors to align technology architecture with organizational needs.
%3Cp style=%22color:black;font-family:Arial;font-size:14.0pt;margin-bottom:7pt;margin-top:0pt;%22%3E%3Cspan style=%22background-color:white;%22%3E%3Cstrong%3EWhat You Will Bring:%3C/strong%3E%3C/span%3E%3C/p%3E%3Cp style=%22font-family:Arial;font-size:11.0pt;margin-bottom:7pt;margin-top:0pt;%22%3E%3Cstrong%3ERequired Experience%3C/strong%3E%3C/p%3E%3Cul style=%22direction:ltr;margin-bottom:0in;margin-top:0in;unicode-bidi:embed;%22 type=%22disc%22%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EBachelor’s degree in Computer Science or related field, or equivalent combination of industry related professional experience and education.%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EExperience with NIST, SOX, HIPAA, CMMC or other information security related frameworks or regulations.%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EExperience owning and managing security tools and applications in a corporate environment.%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EExperience with assessment, development, and implementation of security technologies and processes.%26nbsp;%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EExperience in working with cloud access security brokers (CASBs), and server virtualization solutions%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EAbility to convey technical information to all groups and individuals concisely, clearly, verbally, and in writing to individuals with limited technical expertise.%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EDeep knowledge of enterprise architecture frameworks.%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3ECISSP, CISM, CCSP or other information security related certification(s).%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:8pt;margin-top:0pt;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EA minimum of 5 years’ experience working in IT Security.%3C/span%3E%3C/li%3E%3C/ul%3E%3Cp style=%22font-family:Arial;font-size:11.0pt;margin-bottom:8pt;margin-top:0pt;%22%3E%3Cstrong%3EPreferred Experience%3C/strong%3E%3C/p%3E%3Cul style=%22direction:ltr;margin-bottom:0in;margin-top:0in;unicode-bidi:embed;%22 type=%22disc%22%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EMaster(s) in information security or related field.%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:8pt;margin-top:0pt;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EExperience in information security for a manufacturing environment for international company highly desirable.%3C/span%3E%3C/li%3E%3C/ul%3E%3Cp style=%22font-family:Arial;font-size:11.0pt;margin-bottom:8pt;margin-top:0pt;%22%3E%3Cstrong%3ESpecializations%3C/strong%3E%3C/p%3E%3Cp style=%22font-family:Arial;font-size:11.0pt;margin-bottom:8pt;margin-top:0pt;%22%3ESubject Matter Expert in one or more of the following information security areas:%3C/p%3E%3Cul style=%22direction:ltr;margin-bottom:0in;margin-top:0in;unicode-bidi:embed;%22 type=%22disc%22%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EGovernance, Risk and Compliance%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EInformation Security Tools such as SIEM, IDS/IPS, DLP, IDM, E-commerce%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3ESecurity Architecture%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3ECloud Security%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EData Protection and DLP%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EAccess Management%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EThreat and Vulnerability Management%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EIT Infrastructure%3C/span%3E%3C/li%3E%3Cli style=%22margin-bottom:0;margin-top:0;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3EForensics%3C/span%3E%3C/li%3E%3C/ul%3E%3Cp style=%22font-family:Arial;font-size:11.0pt;margin-bottom:8pt;margin-top:0pt;%22%3E%26nbsp;%3C/p%3E%3Cp style=%22font-family:Arial;font-size:11.0pt;margin-bottom:8pt;margin-top:0pt;%22%3E%3Cstrong%3ETravel%3C/strong%3E%3C/p%3E%3Cul style=%22direction:ltr;margin-bottom:0in;margin-top:0in;unicode-bidi:embed;%22 type=%22disc%22%3E%3Cli style=%22margin-bottom:8pt;margin-top:0pt;vertical-align:middle;%22%3E%3Cspan style=%22font-family:Arial;font-size:11.0pt;%22%3E10% - minimal travel may be required to some locations.%3C/span%3E%3C/li%3E%3C/ul%3E%3Cp style=%22font-family:Arial;font-size:11.0pt;margin-bottom:8pt;margin-left:.375in;margin-top:0pt;%22%3E%26nbsp;%3C/p%3E%3Cp style=%22font-family:Arial;font-size:8.0pt;margin:0in;%22%3E%26nbsp;%3C/p%3E%3Cp style=%22font-family:Arial;font-size:8.0pt;margin:0in;%22%3E#LI-MM1%3C/p%3E Postuler maintenant