Security Architect responsible for management and oversight of the cloud security assurance processes. Reviews proposals for cloud solutions and approved deployments based on proper standards and policies. Audits and validates approved solution baseline against implemented services as deployed. Will develop and communicate verbal and written presentations coordinated with other cloud teams.
Contributes in defining framework used by the organization to establish security principles and practices. Identifies and implements new efficiencies in assurance framework and refines methods for a repeatable process. Works with various cloud teams to create, update and document the systems and how they relate to the overall framework. Stays apprised of evolving technologies within the organization and across cloud industry.
Manage, document and lead the security exceptions process through enterprise systems, interviews and company policies. Expected to create and follow a process for assessing and auditing those security exceptions. Will work closely with engineering teams and influence them to adopt security best practices. Contributes to and stays current with organization policies, processes and design patterns. The successful candidate will make security aspects of all new delivery processes easy for our engineering teams to understand and track. You'll help design automation and tooling to support initial proposal intakes and assessments.
Role will work as an independent contributor having direct impact on security teams of engineering, infrastructure, development and ethical hacking. Candidate must demonstrate a history of running numerous time sensitive projects involving multiple cross-functional teams and background in large scale security oversight. Delivers consistent results within timeframes that can be reasonably anticipated in alignment with product delivery cadence.
A successful candidate in this role would have led security teams in the past focused on solving complex security problems. Candidate should have understand IT regulatory control structures. Ideally, candidate will have experience in assessing privacy and data security issues. IT security or audit certifications preferred.
Broad technical comprehension will enhance candidate's value and effectiveness. Reviews will leverage technical knowledge in routing, firewall policy, secure credential management, virtualization, service oriented architecture, development practices, operational practices, web services design, and database design. Candidate's experience with Oracle's software offerings will be beneficial in reviewer role including Java, Fusion Middleware, and Weblogic; general experience with hardware offerings including Big Data Appliance, Exadata, Exalogic, and Sun ZFS will also be beneficial.
Executes security controls to prevent hackers from infiltrating company information or jeopardizing e-commerce programs.
Researches attempted efforts to compromise security protocols. Maintains security systems for routers and switches. Administers security policies to control access to systems. Maintains the company's firewall. Uses applicable encryption methods. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information.
Provide leadership and expertise in evaluating and developing complex business problems, frequently operating at the leading edge of technology. Recommends and justifies major changes to existing automated systems. BS or MS degree or equivalent experience relevant to functional area. Eight or more years of related experience recommended.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans status or any other characteristic protected by law.
A little about us:
Oracle is shifting the complexity from IT, moving it out of the enterprise by engineering hardware and software to work together—in the cloud.