Information Security Architect

Posted:
8/14/2024, 5:00:00 PM

Location(s):
Massachusetts, United States ⋅ Florida, United States ⋅ Broomfield, Colorado, United States ⋅ Illinois, United States ⋅ Colorado, United States ⋅ Texas, United States ⋅ South Carolina, United States ⋅ Idaho, United States ⋅ Ohio, United States

Experience Level(s):
Senior

Field(s):
IT & Security

Workplace Type:
Remote

Corporate

At ZOLL, we're passionate about improving patient outcomes and helping save lives. We provide innovative technologies that make a meaningful difference in people's lives. Our medical devices, software and related services are used worldwide to diagnose and treat patients suffering from serious cardiopulmonary and respiratory conditions.

Job Type

Remote

Job Summary

The Information Security Architect is a mid to senior level individual contributor responsible to plan, analyze, design, configure, test, implement, maintain and support ZOLL's computer and network security infrastructure. The Security Architect is responsive to changes in regulations and risk and works proactively to anticipate both regulatory changes as well as changes in the threat landscape. The Security Architect possesses a comprehensive awareness of ZOLL's technology and information needs and leverages that awareness to develop and test security structures to protect the company's systems.

Essential Functions

  • Lead engagement with IT stakeholders, business management, and other strategic partners to support the design, development, and deployment of enterprise Information Security solutions that span multiple technologies and disciplines.
  • Develop Enterprise Architecture principles to align IT security architecture with business strategies to achieve short and long-term goals; builds reference architectures and drives architectural security alignment across the enterprise.
  • Design and implement network intrusion detection (IDS), data loss prevention (DLP), cloud access security broker (CASB), Firewalls, and other relevant solutions to strengthen Information Security posture.
  • Assist in the analysis of security breaches to determine root cause.
  • Research, recommend, and oversee the installation of appropriate tools and/or countermeasures to improve information security posture and reduce risk.
  • Work with software development partners and leaders to maintain and grow a secure software delivery pipeline.
  • Design and implement the necessary Information Security architecture to mitigate threats as they emerge.
  • Participate in and drive the establishment of architecture and development standards to strengthen ZOLL’s Information Security program.
  • Conduct staff training on network and information security procedures and best practices.
  • Align standards, frameworks, and security with overall business and technology strategies.
  • Identify and communicate current and emerging security threats
  • Oversee and maintain the integrity of the current and proposed architectures to assure quality, consistency, and adherence to established standards in the face of political and business pressures.
  • Research and recommend security enhancements and purchases.
  • Define and manage a review process to evaluate project proposals for effectiveness within the ZOLL environment.
  • Promote the sharing of Information Security best practices across the ZOLL environment to reduce costs and improve Information Security posture.
  • Facilitate interaction across all architect roles within the enterprise; work with solution and domain architect(s) to provide a consensus-based enterprise solution that is scalable, adaptable, and in synchronization with ever-changing business needs.
  • Lead the development of policies, standards, and guidelines that direct the selection, development, implementation, and use of information technology within the enterprise.
  • Utilize broad technical leadership that impacts technical direction and exerts influence throughout the organization.
  • Collaborate with the PMO to develop project plans, milestones, and deliverables for enterprise IT initiatives.
  • Adhere to IT Service Management controls including change management, incident management, etc.
  • Create documentation of the technical environment, associated actions, and results.


Required/Preferred Education and Experience

  • Bachelor's Degree preferred
  • 10+ years of industry experience required
  • Experience with software development, cloud architecture, vulnerability management, and risk management disciplines
  • Experience with secure solution design, coding practices and secure SDLC
  • Experience with information security concepts and frameworks (NIST, ISO, HITRUST, COBIT, etc
  • Experience with operating system security models and/or mechanisms
  • Experience in threat modeling and weakness analysis
  • Experience conducting and directing penetration testing and security audits
  • Experience with Threat Intelligence tools
  • Experience with Malware Sandbox
  • Experience with scripting languages
  • Experience implementing multi-factor authentication, single sign-on, identity management or related technologies


Knowledge, Skills and Abilities

  • Advanced understanding of security technologies (e.g. anti-virus, DLP, IDS, firewalls, etc.) including knowledge of best practices and usage in a mid-size enterprise.
  • Advanced knowledge of risk assessment tools, technologies, and methods.
  • Demonstrated ability to plan, research, and develop Information Security policies, standards, and procedures.
  • Extensive knowledge of enterprise security programs including best practices.
  • Extensive knowledge of security operations, architectures, policies, and standards.
  • Extensive knowledge of logging, monitoring, and retention and usage of SIEM technologies
  • Be highly skilled and able to perform threat hunting Automation & Orchestration
  • Excellent knowledge of Firewalls/WAN/WAF/LAN/Endpoint Security
  • Excellent knowledge of security tools such as: Tenable, Nessus, Crowdstrike Falcon, Protocol Analyzers, DLP, NAC, SIEM, IPS/IDS, etc.
  • Knowledge of disaster recovery, computer forensic tools, technologies, and methods.
  • Knowledge of Cloud Services Security specifically Azure and AWS services.
  • Ability to interact with a broad cross-section of personnel to explain and enforce security measures.


Physical Demands

The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job.

  • Standing - Occasionally
  • Walking - Occasionally
  • Sitting - Constantly
  • Talking - Occasionally
  • Hearing - Occasionally
  • Repetitive Motions - Frequently


Compensation for this position is $155K-$170K. Final compensation will be determined by various factors such as a candidate's relevant work experience, skills, certifications, and location.

If you would like to be considered for this role, we are asking that all applicants please apply by the end of the day on Friday, August 30, 2024.

ZOLL is a fast-growing company that operates in more than 140 countries around the world. Our employees are inspired by a commitment to make a difference in patient's lives, and our culture values innovation, self-motivation and an entrepreneurial spirit. Join us in our efforts to improve outcomes for underserved patients suffering from critical cardiopulmonary conditions and help save more lives.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.