Sign In

 

 

 

Principal Cyber Security ArchitectPrincipal Cyber Security ArchitectFalseFalse211212https://exeloncorp.taleo.net/careersection/exelon_external/jobdetail.ftl?job=211212, https://exeloncorp.taleo.net/careersection/exelon_external/jobdetail.ftl?job=211212<p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><font face=""calibri light", sans-serif"><font size="3"><strong>PRIMARY PURPOSE OF POSITION</strong></font></font></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><font face=""calibri light", sans-serif"><font size="3"> </font></font></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><font face=""calibri light", sans-serif"><font size="3">The Principal Cyber Security Architect (PCSA) partners with IT and business teams to provide expert leadership to drive security technology and security reference architecture solutions by weighing the advantages of security technology standards, market availability of products, and risks and benefits of security technology introduction into Exelon�s computing environments.   The PCSA provides comprehensive consultation to business units and IT management and staff at the highest technical level for all aspects of the security architecture domain. The PCSA develops and maintains business, systems, and IT/OT processes to support enterprise mission needs and requirements; translates technology and environmental conditions (e. g. , law and regulation) into IT/OT rules and requirements that describe baseline and target security architectures. The PCSA designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e. g. , law and regulation) into security designs and processes.   The PCSA operates independently with little or no direct supervision. </font></font></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><b><font face=""calibri light", sans-serif"><font size="3"> </font></font></b></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><b><font face=""calibri light", sans-serif"><font size="3"> PRIMARY DUTIES AND ACCOUNTABILITIES </font></font></b></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><font face=""calibri light", sans-serif"><font size="3"> </font></font></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><font face=""calibri light", sans-serif"><font size="3">- Provide technical and security expertise to IT and business teams to identify security technology solutions and develop security reference architectures and strategies to achieve business results.   Ensure appropriate implementation of security technology and reference architectures within both the development and production environments.   Analyze user needs and requirements to plan architecture.  </font></font></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><font face=""calibri light", sans-serif"><font size="3"> </font></font></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><font face=""calibri light", sans-serif"><font size="3">- Design and develop enterprise-wide security architecture and strategy for all aspects of the security domain in alignment with the business strategy and goals. Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements.    Provide input on security requirements to be included in statements of work and other appropriate procurement documents.  </font></font></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><font face=""calibri light", sans-serif"><font size="3"> </font></font></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><font face=""calibri light", sans-serif"><font size="3">- Provide technical guidance and security expertise in the areas of secure application development, security architecture risk management and assessment, security policies and standards, security architectures and implementations. </font></font></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><font face=""calibri light", sans-serif"><font size="3"> </font></font></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><font face=""calibri light", sans-serif"><font size="3">- Provide technology and security expertise and advice to IT leadership in the development of strategic security technology and plans to support business strategies.   Translate proposed capabilities into technical requirements.  </font></font></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><font face=""calibri light", sans-serif"><font size="3"> </font></font></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><font face=""calibri light", sans-serif"><font size="3">- Establish, maintain, and enhance relationships with business and IT partners.   Communicate status to key stakeholders on a regular basis. </font></font></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><font face=""calibri light", sans-serif"><font size="3"> </font></font></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><font face=""calibri light", sans-serif"><font size="3">- Maintain awareness of trends and issues in area of security expertise, evaluate new security technologies or technology opportunities, and provide analysis of their potential impact to advantage the business. </font></font></p>