Sign up for our
weekly
newsletter
of fresh jobs
JOB SUMMARYAs a Cloud Security Architect, you will paly a key leadership role in the success of the security operations program by providing guidance on cloud security related issues, including but not limited to technical infrastructure, process, design, assessment, implementation, awareness, and governance. The Sr. Cloud Security Architect will provide leadership, experience, and expertise to project teams on driving the cloud architecture of BSWH to be secure, auditable, and of course, usable by our customers. You will serve as a security subject matter expert as part of an in-house, on-shore, and off-shore security architect team responsible for securing the enterprise information and its systems by determining security requirements across enterprise projects; planning, designing, and documenting security systems; preparing security standards, policies and proceduresSALARY: The pay range for this position is $56.86/hour for those with entry-level qualifications up to $101.25/hour for those highly qualified. The specific rate will depend on the successful candidate's specific qualifications and prior experience.ESSENTIAL FUNCTIONS OF THE ROLE- Serve as a key player in the security architect team, responsible for securing enterprise information and systems- Plan, design, and document SaaS, IaaS, security systems- Assist in preparing security standards, policies, and procedures for projects involving SaaS, Iaas, PaaS- Utilize SIEM for monitoring, analyzing, and responding to security events and incidents- Provide technical and operational security expertise to cross-functional teams- Collaborate with on-shore and off-shore teams to implement security requirements across the enterprise- Focus on Cloud and participate in the CASB/ZTN/SASE roadmap and planning with other Sr. Security architects, ensuring compliance with healthcare industry regulations and standards- Serve as a key player in Cyber Intelligence Planning (CI-WRL-004)- Advance the functionality of the SIEM, including correlation across cloud-sourced indexes, ultimately leveraging ML and AIKNOWLEDGE, SKILLS AND ABILITIESSystems Analysis- T1035: Determine how threat activity groups employ encryption to support their operations- T1354: Identify system cybersecurity requirements- K0018: Knowledge of encryption algorithms- K0689: Knowledge of network infrastructure principles and practices- K0718: Knowledge of network communications principles and practices- K0915: Knowledge of network architecture principles and practices- K1037: Knowledge of target critical capabilities- K1052: Knowledge of the Tasking, Collection, Processing, Exploration, and Dissemination (TCPED) process- K1101: Knowledge of data modeling and predictive analytics techniques for cybersecurity applicationsKnowledge Management- K0674: Knowledge of computer networking protocols- K0680: Knowledge of cybersecurity principles and practices- K0751: Knowledge of system threats- K0752: Knowledge of system vulnerabilities- K0977: Knowledge of intelligence collection management tools and techniques- K1005: Knowledge of data lifecycle management, including data storage, retrieval, and archival- K1100: Knowledge of data governance frameworks and best practices for ensuring data quality and integrity- S0506: Skill in data visualization tools and techniques to communicate complex security conceptsAnalyze:All-Source Analysis- T0718: Identify intelligence gaps and shortfalls- T1020: Determine the operational and safety impacts of cybersecurity lapses- T1657: Develop a diverse program of information materials- T1661: Asses all-source data for intelligence or vulnerability value- K1005: Knowledge of intelligence collection capabilities and applications- K1029: Knowledge of statistical analysis methods and tools for analyzing security event data- S0709: Skill in developing and applying machine learning algorithms to detect cybersecurity threats- S0783: Skill in creating decision support materials using data-driven insightsOversee and GovernStrategic Planning and Policy- T1036: Integrate leadership priorities- T1718: Implement changes to planning policies and procedures- T1729: Synchronize intelligence planning activities and operational planning timelines.- T1779: Coordinate strategic planning efforts with internal and external partners.- K0676: Knowledge of cybersecurity laws and regulations- K0734: Knowledge of Risk Management Framework (RMF) requirements- K0983: Knowledge of data privacy laws and their implications on cybersecurity practices.- S0763: Skill in integrity organization objectives with data strategy to enhance decision-making.Performs other position appropriate duties as required in a competent, professional, and courteous mannerBENEFITSOur competitive benefits package includes the following- Immediate eligibility for health and welfare benefits- 401(k) savings plan with dollar-for-dollar match up to 5%- Tuition Reimbursement- PTO accrual beginning Day 1Note: Benefits may vary based upon position type and/or levelPREFERRED CERTIFICATIONS- Certified Information System Security Professional (CISSP) certification- Certified Information Security Manager (CISM) certification- CompTIA Advanced Security Practitioner (CASP+)MINIMUM QUALIFICATIONS- EDUCATION - Bachelor's or 4 years of work experience above the minimum qualification- EXPERIENCE - 7 Years of ExperienceAs a health care system committed to improving the health of those we serve, we are asking our employees to model the same behaviours that we promote to our patients. As of January 1, 2012, Baylor Scott & White Health no longer hires individuals who use nicotine products. We are an equal opportunity employer committed to ensuring a diverse workforce. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law.