top of page

Security & Infrastructure Architect

Bengaluru, India, Hybrid or Remote

Job Type

Full Time

about the role

The Security and Infrastructure Architect will be responsible for designing, building, and overseeing the implementation of network and computer security for our organization. This role requires a deep understanding of both hardware and software systems, as well as a strong grasp of security protocols and technologies.

Requirements

  • Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.

  • Minimum of 5 years’ experience in a similar role with demonstrated expertise in infrastructure security.

  • Professional security management certification, such as a CISSP, CISM, or similar.

  • Strong understanding of the latest security principles, techniques, and protocols.

  • Experience in building and maintaining security systems.

  • Detailed technical knowledge of database and operating system security.

  • Hands-on experience with network security and networking technologies and with system, security, and network monitoring tools.

  • Thorough understanding of disaster recovery, computer forensic tools, technologies, and methods.

  • Excellent planning, organizational, and problem-solving skills.

  • Strong interpersonal and communication skills.

Responsibilities

  • Design and implement security architectures for IT projects.

  • Assess and mitigate system security threats and risks throughout the program life cycle.

  • Manage and configure physical and virtual infrastructure including firewalls, routers, switches, and servers.

  • Develop and implement comprehensive disaster recovery plans and business continuity strategies.

  • Conduct security assessments and audits, and provide recommendations for enhancing data systems security.

  • Collaborate with IT management to align security management with business and IT strategies.

  • Stay current with emerging security trends, issues, and control technologies.

  • Lead the integration of new technology and the improvement of existing processes for enhanced security.

bottom of page