Enterprise Security Architect - Estes Express Line

  • 5 Mar 2024 9:34 AM
    Message # 13324883
    James Walters (Administrator)

    Enterprise Security Architect - Estes Express Line

    Job description

    In our dynamic and fast-paced environment, we are seeking a visionary Enterprise Security Architect to push the boundaries of innovation, fortifying our digital ecosystem against emerging threats. As an industry leader, Estes Express is committed to shaping the future, and we recognize the pivotal role of a creative and forward-thinking Enterprise Security Architect in achieving this vision. As an Enterprise Security Architect at Estes Express you will be at the forefront of transforming how we safeguard our digital ecosystem. This role isn't just about traditional security practices; it's an opportunity to innovate, experiment, and lead the charge in architecting security solutions that resonate with the speed and excellence of our industry-leading organization. We are not just pioneers; we are revolutionaries in trucking and transportation, setting the standard for modernization and thought leadership. Our commitment to pushing boundaries extends beyond our products and services, reaching into the heart of our digital infrastructure.

    • Develop and maintain an enterprise-wide security architecture strategy aligned with business goals and objectives.

    • Design and implement security solutions that address Estes’ information security requirements.

    • Evaluate and recommend new security technologies and tools to enhance the overall security posture. Stay current on emerging information security technologies and industry best practices.

    • Collaborate with executive leadership to ensure alignment of security initiatives with overall business goals.

    • Understand complex attacks, leverage threat intelligence, and employ analytics to enhance the enterprise security posture

    • Understand the landscape of threats, their sources, methods employed and potential targets

    • Utilize threat intelligence to predict, detect and counteract threats before they compromise a system

    • Conduct risk assessments to identify and prioritize potential security vulnerabilities, threats, and risks.

    • Collaborate with other departments to analyze and assess the impact of security threats and vulnerabilities.

    • Develop risk mitigation strategies and implement security controls. Ensure that risk management practices align with industry best practices and compliance requirements.

    • Ensure compliance with relevant laws, regulations, and industry standards. Participate in audits and regulatory assessments.

    • Establish, maintain, and audit cyber security guidelines, standards, policies and procedures.

    • Coordinate with other IT and business units to integrate security into daily operations. • Ensure compliance with industry regulations and standards (e.g., GDPR, HIPAA, ISO 27001).

    • Provide guidance on security best practices to ensure compliance to standards and best practices.

    • Lead and contribute to security awareness programs to educate employees about security policies and best practices.

    • Mentor and train on security best practices to insure a focus on security across the enterprise.

    • Collaborate with training teams to develop and deliver security training programs.

    • Develop and maintain an incident response plan.

    • Coordinate and participate in security incident response activities. • Conduct post-incident assessments to improve incident response capabilities.

    • Work closely with other IT teams, such as network, infrastructure, and application development, to integrate security into their processes.

    • Collaborate with external vendors and partners to ensure security requirements are met.

    • Regular attendance is required.

    • This is not an all-inclusive list of job requirements and/or duties and may not contain all mental and physical capabilities necessary to perform the job at all times due to circumstances. Operational, safety and other needs may require the employee to perform any and all other duties as assigned. Employees are expected, and must be able to perform all such duties and tasks. Qualifications:

    • Bachelor's degree, or relevant work experience required in Information Security, Cybersecurity, Computer Science, or a related field. Master’s degree preferred.

    • 5 or more years of cyber or information security experience, with a focus on security architecture within complex, diverse enterprise environments required.

    • 4 or more years of experience in software development, infrastructure engineering, technical architecture, or similar discipline required. 5 to 9 years preferred

    • Strong working knowledge of firewalls, VPN, routers, servers, zero-trust technology, WAF, API Gateways and IDS/IPS, network access controls, DevSecOps, and network segmentation required. • Strong leadership and influence skills

    • Must be able to present to all levels of management & executive leadership, and communicate effectively to technical and non-technical individuals

    • Knowledge of and experience applying cryptography, encryption, public infrastructures (PKIs), including digital signatures and certification authorities (CA), required • Must be experienced with multiple platforms, including Windows, UNIX, and Linux, containers, VMs, hybrid cloud/on premise/cloud (AWS, Azure, GCP) environments, and end user/mobile devices (Windows, IOS, Android)

    • Experience with authentication technologies - multi-factor authentication, SAML, OIDC, tokens, IAM/IGA, PAM preferred • Security related certifications, such as – CISSP, CEH, CISM, CRTSA, CRISC, CISSP-ISSAP, CSSA, AWS Certified Security or Microsoft Certified: Azure Security Engineer Associate preferred.

    • Outstanding influencing and consensus building skills • Ability to conduct technological analyses and research

    • Leadership, mentoring, coaching and role model skills

    • Strong communication, teamwork and collaboration skills required to evangelize technology subjects across all levels of the organization

    • Seasoned in managing tradeoffs and risks, adapting to change & uncertainty and making recommendations with imperfect information

    • Exceptional analytical and critical thinking skills • Strategic thinking and time management skills

    • Must be able to comply with all company policies, rules, procedures and Code of Conduct

    • Must be able to interact well with others

    • Must be able to work independently, or in a team setting

    • Must be capable of working under tight time constraints in a high volume environment with multiple priorities

    • Responds well to questions; Ability to read, interpret and comply with written information and documents such as safety rules, operations / procedure manuals and maintenance instructions with a high comprehension and concentration level to include the ability to meet deadlines

    • Must pass a pre-employment drug screen, random drug and/or alcohol tests, and will be subject to a criminal history background check

    • Must be authorized to work in the United States

    Physical Demands: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to talk or hear. Specific vision abilities required by this job include close vision, distance vision, peripheral vision, depth perception and ability to adjust focus. The employee is frequently required to sit and use hands to finger, handle, or feel or operate computers and other standard office equipment. The employee is occasionally required to stand, walk, lift, twist, turn and reach with hands and arms. The employee must be capable of lifting a minimum of 20 lbs., or more if required by the essential functions of the job. Work Environment: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The noise level in the work environment ranges from quiet to loud as required by the essential functions of the job

Copyright 2023, International Information Systems Security Certification Consortium, Inc. (“(ISC)²), in website format and trade dress only. All Rights Reserved. (ISC)², CISSP, SSCP, CAP, ISSAP, ISSEP, ISSMP, CSSLP, and CBK are registered certification, service, and trademarks of (ISC)². Disclaimer: (ISC)²” does not own, operate, or moderate this website. All content of this site, exclusive of licensed trademarks or copyright, is the property of the designated (ISC)² Chapter organization, which is not owned, managed, or controlled by (ISC)² and operates independent of (ISC)².  

(ISC)2RVA is a 501(c)3 nonprofit organization.  EIN: 83-4655968

P.O. Box 2566, Glen Allen, VA 23058-2566

Powered by Wild Apricot Membership Software