PDC Energy

  • Information Security Architect

    Category
    Information Technology
    Job Location
    US-CO-Denver
  • Job Description

    SUMMARY

    A brief description summarizing the overall purpose and objectives of the position and the results the worker is expected to accomplish.

     

    The Security Architect provides leadership and oversight to the delivery of security architect services to PDC in both the Information Technology (IT) and Operational Technology (OT) environments. It will be the Security Architect’s responsibility to protect the confidentiality, integrity and availability of information systems by instituting and proliferating security best practices and patterns throughout all IT projects and operations. Additionally, this role will identify and lead initiatives to drive improved security operations and to improve the overall security posture and maturity of the IT organization. The Security Architect will establish strategic security controls and reusable patterns/standards for IT security. This role also ensures that the patterns/standards are considered and enforced in the project life cycle and in day-to-day IT operations.

     

    ESSENTIAL FUNCTIONS

    The tasks, duties, and responsibilities of the position that are most important to get the job done.

    1. Design and develop an Enterprise Security Architecture to mitigate the risks presented by the ever-changing threat landscape unique to the organization;
    2. Ensure that secure architectural solutions are incorporated into every aspect of enterprise architectures supporting the organization’s key business processes and organizational missions;
    3. Responsible for defining the technical design specifications and operational practices for on-premise, cloud and OT environments;
    4. Work collaboratively with IT to build, test and implement security systems;
    5. Evaluate enterprise security infrastructure and ensure the disparate components are well integrated, secure, and operating efficiently;
    6. Design and incorporate security controls in new, legacy, and in-progress environments undergoing general IT transitions/upgrades ;
    7. Translate technical risk issues and distill such issues to IT and business leaders;
    8. Serve as a key technical interface, performing liaison functions between leadership and technical teams;
    9. Coordinate and administer documentation for security processes/procedures/standards for the IT department;
    10. Provides security subject matter expertise on cloud architecture control implementation;
    11. Ensure system security requirements are established and maintained for operations;
    12. Review current system security measures and recommending and implementing enhancements;
    13. Conduct regular system tests to ensure continuous monitoring of network security ;
    14. Develop security requirements, perform security risk assessments, system analysis and review security systems design;
    15. Support security testing and evaluations including; system hardening, vulnerability testing, security event monitoring, web application scanning, and other technical security assessment work;
    16. Possess a thorough understanding of complex IT and OT systems and stay up to date with the latest security standards, systems and authentication protocols, as well as security best practices;
    17. This position may also apply advanced forensic tools and techniques for attack reconstruction;
    18. Other duties, not listed, may be assigned by the Director, Information Security.

    KNOWLEDGE, SKILLS AND ATTRIBUTES

    The specific minimum competencies required for job performance.

    1. A self-starter accustomed to working in an environment with technical uncertainties, business ambiguities and solving anticipated future business-relevant problems;
    2. Must be able to clearly articulate security requirements to all levels within the organization;
    3. Experience authoring reports, data flow diagrams, and Visio drawings for security systems and networks;
    4. Solid understanding of security protocols, cryptography, authentication, authorization and security;
    5. Experienced with implementing security requirements within technologies such as firewalls, IDS/IPS, SIEM, malware protection, application whitelisting, VPNs, remote access, CASB, SaaS, IaaS, and PaaS;
    6. Experienced with information security practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies;
    7. Experience implementing multi-factor authentication, single sign-on, identity management or related technologies;
    8. Expertise in designing and architecting information technology and security controls across complex and diverse applications and infrastructures;
    9. Must be organized, detail-oriented, deadline-driven, and able to handle multiple responsibilities in a fast-paced environment;
    10. Ability to work with wide range of people and to take responsibility and function under minimal supervision;
    11. Ability to think strategically, with good interpersonal and organization skills;
    12. Advanced technical skills – both breadth and depth;
    13. Technical aptitude and critical thinking skills while having the ability to think outside the box;
    14. Strong interpersonal and communication skills and experience in working collaboratively with different teams.

    SUPERVISORY RESPONSIBILITIES

    The scope of the person’s authority, including a list of jobs that report to the incumbent.

     

    This position has no supervisory responsibilities

     

    WORKING CONDITIONS

    The environment in which the job is performed, especially any unique conditions outside a normal office environment.

    1. Consistent with that of a normal office environment;
    2. Ability to routinely lift up to 50 lbs;
    3. Availability during non-working hours (e.g. participation in 24X7 on-call rotation);
    4. Required to work on-call during planned maintenance and/or emergencies;
    5. Infrequent travel to all PDC offices required (~10%).

    MINIMUM QUALIFICATIONS

    The minimum level of education, experience, and certifications required to perform the job.

    1. Bachelor’s degree in computer science, information security or related field required;
    2. Advanced degree in computer science, information security, or a related field preferred (MS, MBA, etc.);
    3. Minimum of 7 years’ experience in information security or information technology;
    4. Minimum of 5 years’ direct experience in an information security specific role (Security specialist, engineer, architect or administrator);
    5. Industry certifications such as: CISSP, CCSP, CISM, GSEC, GICSP, or GCED.

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed