Information Security Architect

The Sherwin-Williams Company - Cleveland, Ohio

The Information Security Architect’s core function is to support the Information Security Manager in achieving IT goals.  These goals are interrelated with the business goals of the company.  Assignments at this level require both advance managerial and technical abilities.  This position coordinates projects with their initiation, development, and solution of problems with the interdepartmental and interdivisional related systems.  Must clearly demonstrate above standard Information Security competence or exceptional effectiveness in one phase of the field. 
 
Essential Functions
Strategy & Planning
  • Participate in the planning and design of enterprise security architecture, under the direction of the Information Security Manager, where appropriate.
  • Provide architectural expertise, direction, and assistance to Systems Analysts, Systems Engineers, other Systems Architects.
  • Evaluate Linux / Unix / Windows based Enterprise Configuration Management services and  virtualization.
  • Develop security solutions that facilitate the companies strategic business needs.
  • Conduct research on emerging technologies in support of systems development efforts, and recommend technologies that will increase improve the enterpreise security posture.
 Acquisition & Deployment
  • Recommend security control and systems to support business goals of the company.
  • Implement security systems that have positive budgetary impact by reducing costs and increasing productivity.
  • Enhance the company’s information assets by contributing to it’s security, integrity, efficiency, availability, and accuracy.
 Operational Management
  • Perform strategic analysis; apply advanced principles, theories, and concepts to resolution of problems.
  • Establish and communicate design and architecture standards via mentoring, technical presentations, and white papers.
  • Interact with all levels of customers, users, and vendors, including executive management, technical personnel, and contractors.

 Incidental Functions   

  • Assist with Change Management preparations and implementations, providing technical subjectmatter expertise.
  • Provide security analysis and consultation services for product, system and Data Protection architecture designs.
  • Attend, and periodically lead meetings with the team.
  • Assist with other projects as may be required to contribute to efficiency and effectiveness of the group.
  • 10% travel as required.
  • Work outside the standard office 7.5 hour workday as required with on-call availability.
 
Position Requirements
Formal Education & Certification
  • Bachelor and/or Master degree or foreign equivalent in related field or equivalent experience.
  • Preferred CISSP, GIAC, or CompTIA Security
     

Knowledge & Experience

  • 14 years IT experience.
  • Proven experience in planning, organizing, and developing IT security and facility security system technologies.
  • 8 years designing and deploying Linux and Windows based systems in a large scale.
    production enterprise.
  • Experience deploying Linux and Windows based virtualization technologies, such as VMWare, OVM, or XEN.
  • Experience with Linux and Windows server hardening practices.
     
    Preferred Experience in any combination of the following Security areas
     
    Linux/ Unix Security
  • Hands-on experience with dynamic and static scanners, such as Qualys.
  • 2 years designing and deploying configuration management services, such as Puppet, Chef, or Ansible.
  • Experience implementing ITIL based service catalog for Linux platforms.
  • Enterprise Storage experience.
  • Working knowledge of database technologies (Oracle clustering and ASM, MondoDB, Mysql, and/or DB2.
  • Experience working with all phases of the software development lifecycle (SDLC).
     
    Windows Security
  • 2 years performing Windows server administration and support.
  • 2 years experience with Active Directory administration and support.
  • 1 years Visual Basic and PowerShell scripting experience.
  • NetIQ product suite experience.
  • Experience with Windows 2003 and knowledge of Windows 2008.
  • Experience Public Key Infrastructure (PKI) and certificate management.
  • Experience with web proxy technology.
     

Personal Attributes

  • Ability to set and manage priorities.
  • Excellent written and oral communication skills.
  • Excellent interpersonal skills.
  • Ability to present ideas in business-friendly and user-friendly language.
  • Exceptionally self-motivated and directed.
  • Keen attention to detail.
  • Superior analytical, evaluative, and problem-solving abilities.
  • Exceptional service orientation.
  • Ability to motivate in a team-oriented, collaborative environment.
 
Must be legally authorized to work in country of employment without sponsorship for employment now or in the future.
 
Equal Opportunity Employer. All qualified applicants will receive consideration for employment and will not be discriminated against based on race. color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, age, pregnancy, genetic information or any other consideration prohibited by law or contract.
 
VEVRAA Federal Contractor requesting appropriate employment service delivery systems, such as state workforce agencies and local employment delivery systems, to provide priority referrals of protected veterans.

Posted: 30+ days ago

About The Sherwin-Williams Company


The Sherwin-Williams Company Logo
The year 2016 is a unique moment in the history of Sherwin-Williams — it’s our 150th anniversary. We are proud to honor our founders Henry Sherwin and Edward Williams, and the thousands of men and women who have shaped our company since 1866... more

Get more Job Training at

Vermont College
Vermont College
Visit our partner site