Platzhalter Bild

Hybrid Security Architect na 3D Systems

3D Systems · Rock Hill, Stati Uniti d'America · Hybrid

Candidatar-se agora

Security Architect

About the Role: 

The Security Architect is responsible for designing and overseeing the implementation of technologies that reduce cybersecurity risk across the enterprise.  This individual will act as a key technical contributor within the Information Security domain, working in partnership with Infrastructure and IT Operations teams.  The Security Architect will provide security expertise an all areas of IT Operations, including network architecture, application security, cloud operations, data management, access management, and end user computing. This role requires a strong mix of hand-on technical expertise and process design and program management.

 

What’s In It For You! 

    • Competitive Pay: Our employees are the best part of our company. We want you to feel valued, appreciated, and included. Because of this, we make sure your hard work is recognized. 
    • Paid Leave (US ONLY): Enjoy time away from work with Company paid holidays and a flexible working schedule through our paid time off (PTO) policy.  Yep, you read that correctly. We are a Company that values you and makes sure you take time for yourself.  
    • 401(k): Prepare for a secure retirement with our 401k plan, which includes an employer matching contribution.
    • Comprehensive Health & Wellness Plans: We want to be here for our employees throughout all stages of life, which is why we offer a wide range of resources, information, and support during your career with us. 
    • Global Team: With our state-of-the-art corporate headquarters in Rock Hill, South Carolina, our global team has a presence across more than 15 countries worldwide. Experience a workplace comprised of talented individuals who are passionate about serving our customers and each other. 
    • Innovative Culture: Innovation is at the heart of what we do! Since our founding in 1986 by Chuck Hull, the inventor of 3D printing, we have continuously pushed the boundaries of what is possible with additive manufacturing. When you join 3D, you will have the opportunity to work with cutting edge technology in an innovative and collaborative culture! 
    • Talent Development: At 3D Systems, we invest in talent programs to support employees with opportunities to grow, contribute, develop, and thrive in their careers. 
    • Connection & Engagement Opportunities: We strive to cultivate an environment where our diverse global workforce can connect and thrive. Our Employee Resource Group program, Employee Recognition program, and 3D Gives Back program, are just a few examples of how you will be empowered to build connections, celebrate wins, and make a meaningful impact. 

 

What We Are Looking For:

    • Provide technical leadership for team members and peers to deliver secure solutions, tools, and process designs throughout the enterprise.
    • Influence and set tactical security vision and collaborate on development of strategies and goals.
    • Design, develop and implement documents and procedures that support and enforce security standards, policies, training, and procedures to raise the security posture while reducing risk.
    • Design and implement IT security documentation standards for IT engineers and analyst to follow.
    • Creating high-level and low-level designs for enterprise security products.
    • Define and understand the current environment to detect critical security vulnerabilities and risks.
    • Provide feedback on timely remediation of security issues or incidents to management.
    • Update and otherwise maintain existing security solutions (IPS, anti-malware, anti-virus, web filtering, log collection, MFA, anomaly detection, network access control, DLP, etc.).
    • Ensure compliance with all external regulatory compliance programs.
    • Review and validate penetration test findings for validity.
    • Validate implementation of recommended security configuration changes identified by penetration test findings.
    • Effectively communicate security risks to 3D Systems employees, stakeholders, and management.
    • Recommend and influence security vendor selection and business requirements for security tool selection.

%3Cp style=%22margin: 0in; font-family: Arial; font-size: 11.0pt; color: black;%22%3E%3Cspan style=%22font-weight: bold;%22%3E%3C/span%3E%3C/p%3E%0A%3Cp style=%22margin-top: 0pt; margin-bottom: 7pt; font-family: Arial; font-size: 14.0pt; color: black;%22%3E%3Cspan style=%22font-weight: bold; background: white;%22%3EWhat You Will Bring:%3C/span%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli style=%22list-style-type: none;%22%3E%0A%3Cul type=%22disc%22 style=%22direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;%22%3E%0A%3Cli style=%22margin-top: 0; margin-bottom: 0; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3EBachelor%26rsquo;s degree in Computer Science or related field, or equivalent combination of industry related professional experience and education.%3C/span%3E%3C/li%3E%0A%3Cli style=%22margin-top: 0; margin-bottom: 0; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3EExperience with NIST, SOX, HIPAA, CMMC or other information security related frameworks or regulations.%3C/span%3E%3C/li%3E%0A%3Cli style=%22margin-top: 0; margin-bottom: 0; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3EExperience owning and managing security tools and applications in a corporate environment.%3C/span%3E%3C/li%3E%0A%3Cli style=%22margin-top: 0; margin-bottom: 0; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3EExperience with assessment, development, and implementation of security technologies and processes.%26nbsp;%3C/span%3E%3C/li%3E%0A%3Cli style=%22margin-top: 0; margin-bottom: 0; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3EExperience in working with cloud access security brokers (CASBs), and server virtualization solutions.%3C/span%3E%3C/li%3E%0A%3Cli style=%22margin-top: 0; margin-bottom: 0; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3EAbility to convey technical information to all groups and individuals concisely, clearly, verbally, and in writing to individuals with limited technical expertise.%3C/span%3E%3C/li%3E%0A%3Cli style=%22margin-top: 0; margin-bottom: 0; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3ECISSP, CISM, CCSP or other information security related certification(s).%3C/span%3E%3C/li%3E%0A%3Cli style=%22margin-top: 0pt; margin-bottom: 8pt; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3EA minimum of 5 years%26rsquo; experience working in IT Security.%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3C/li%3E%0A%3C/ul%3E%0A%3Cp style=%22margin-left: .375in; margin-top: 0pt; margin-bottom: 8pt; font-family: Arial; font-size: 11.0pt;%22%3E%3Cspan style=%22font-weight: bold;%22%3EPreferred Experience%26nbsp;%3C/span%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli style=%22list-style-type: none;%22%3E%0A%3Cul type=%22disc%22 style=%22direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;%22%3E%0A%3Cli style=%22margin-top: 0pt; margin-bottom: 8pt; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3EExperience in information security in a manufacturing environment for global company highly desirable.%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3C/li%3E%0A%3C/ul%3E%0A%3Cp style=%22margin-left: .375in; margin-top: 0pt; margin-bottom: 8pt; font-family: Arial; font-size: 11.0pt;%22%3E%3Cspan style=%22font-weight: bold;%22%3ESpecializations%3C/span%3E%3C/p%3E%0A%3Cp style=%22margin: 0in; margin-left: .375in; font-family: Arial; font-size: 11.0pt;%22%3ESubject Matter Expert in one or more of the following information security areas:%3C/p%3E%0A%3Cul%3E%0A%3Cli style=%22list-style-type: none;%22%3E%0A%3Cul type=%22disc%22 style=%22direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;%22%3E%0A%3Cli style=%22margin-top: 0; margin-bottom: 0; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3EGovernance, Risk and Compliance%3C/span%3E%3C/li%3E%0A%3Cli style=%22margin-top: 0; margin-bottom: 0; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3EInformation Security Tools such as SIEM, IDS/IPS, DLP, IDM, E-commerce%3C/span%3E%3C/li%3E%0A%3Cli style=%22margin-top: 0; margin-bottom: 0; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3ESecurity Architecture%3C/span%3E%3C/li%3E%0A%3Cli style=%22margin-top: 0; margin-bottom: 0; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3ECloud Security%3C/span%3E%3C/li%3E%0A%3Cli style=%22margin-top: 0; margin-bottom: 0; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3EData Protection and DLP%3C/span%3E%3C/li%3E%0A%3Cli style=%22margin-top: 0; margin-bottom: 0; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3EAccess Management%3C/span%3E%3C/li%3E%0A%3Cli style=%22margin-top: 0; margin-bottom: 0; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3EThreat and Vulnerability Management%3C/span%3E%3C/li%3E%0A%3Cli style=%22margin-top: 0pt; margin-bottom: 8pt; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3EForensics%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3C/li%3E%0A%3C/ul%3E%0A%3Cp style=%22margin-left: .375in; margin-top: 0pt; margin-bottom: 8pt; font-family: Arial; font-size: 11.0pt;%22%3E%3Cspan style=%22font-weight: bold;%22%3ETravel%3C/span%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli style=%22list-style-type: none;%22%3E%0A%3Cul type=%22disc%22 style=%22direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;%22%3E%0A%3Cli style=%22margin-top: 0pt; margin-bottom: 8pt; vertical-align: middle;%22%3E%3Cspan style=%22font-family: Arial; font-size: 11.0pt;%22%3E10% - minimal travel may be required to some locations.%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3C/li%3E%0A%3C/ul%3E%0A%3Cp style=%22margin-left: .375in; margin-top: 0pt; margin-bottom: 8pt; font-family: Arial; font-size: 11.0pt;%22%3E%3Cspan style=%22font-size: 8px;%22%3E%26nbsp;#LI-MM1%3C/span%3E%3C/p%3E
Candidatar-se agora

Outros empregos