OBS! Ansökningsperioden för denna annonsen har
passerat.
Arbetsbeskrivning
Veritaz is a fast-growing IT-consultant firm. Our company is made up of insanely bright people from over 4 countries, and we are located in Sweden, UK, US and Pakistan. The voyage has been incredible this far, but it is only the beginning.
Assignment Description:
We are looking for an IT Security Architect who is experienced in pursuing security issues with suppliers such as when setting requirements, follow-up, inquiry and evaluation.
Do you value openness, transparency, and empowerment? Our squad is high performing cross-functional team who are set with a mission to provide win-win exchanges for our customers.
What you'll do:
● Work closely with our technical experts, the business and other stakeholders to solve complex security issues and ensure a safe and secure digital environment for the customer's target audiences.
● Develop target architecture and strategic plans for IT security, as well as analysing the need for IT security solutions and designing customized solutions that meet future requirements.
● Choose, implement, monitor, and upgrade computer anti-virus and malware protection systems.
● Encrypt data transmissions and erect firewalls to conceal confidential information during transmission.
● Seek to build security during the development stages of software systems, networks, and data centers.
● Use various tools for vulnerability scanning of IT assets and dynamic/static application assessments.
Who you are:
● Have a solid background in IT architecture and IT security acquired through work experience or a combination of education and work experience.
● Good knowledge of one or more of the following areas: IAM, PKI, network infrastructure, server infrastructure, directory services, virtualization platforms, logging, application security, client security, and cloud services.
● Excellent communication, teamwork skills, inter-personal and Organizational skills.
● Have a deep understanding of how hackers work and the ability to keep up with the fast pace of change in the criminal cyber-underworld.
● Have the ability to use logic and reasoning to identify the strengths and weaknesses of IT systems.