Cloud Security Architect

Las Vegas, NV /
Information Technology – Security /
Full-Time
Summary
Information Security Architect Duties:
•Designing and implementing the security measures needed to protect data stored on public clouds against unauthorized access, including secure authentication methods, encryption, access control lists, intrusion detection systems, firewalls, and other measures
•Working with security analysts and engineers to design new security controls, processes, policies, and procedures as needed, then testing them to ensure that they work as intended
•Educating employees about the importance of security awareness, data security and best practices for protecting sensitive information
•Analyzing threats to an organization’s security and designing solutions to mitigate those threats
•Recommending and implementing new security measures as needed to keep data and systems safe
•Identifying new security threats and recommending ways to address them
•Assisting and conducting forensic investigations on cyberattacks to determine how they occurred and how they can be prevented in the future
•Designing and developing security architectures that align with Allegiants, or a specific business unit’s strategic goals
•Mentoring more junior security analysts, engineers, and architects helping them scope work, identify strengths and weaknesses, and grow other information security architects. 
Information Security Architect Skills
Cloud security architects need the following skills in order to be successful:
Cloud security and architecture: Security architects need to understand how cloud computing and cloud security works and how to apply effective security measures to protect cloud data. This includes understanding the different types of cloud computing, such as public, private and hybrid cloud, network security groups, the important of cloud IAM/IdM, and the differences and challenges between on-premises and cloud security.
Information security: Information security is the ability to identify and mitigate potential threats to a system. Security architects need to have a thorough understanding of information security practices to develop a comprehensive security strategy for an organization. This should include multiple layers of security using a mix of technology, process, and people. 
Networking: As a security architect, you may need to collaborate with other professionals across the organization, such as developers, engineers, business unit leaders, and other security specialists. Having strong networking skills can help you build relationships with others in the industry and find the resources you need to complete your work.
Project management: As a security architect, you may be responsible for overseeing and leading the implementation of a company’s security measures. This may include working with other IT professionals, such as a network administrator, to ensure that the security measures are in place and working properly. Project management skills can help you to organize and oversee the project to ensure that it’s completed on time and within budget.
Business analysis: Security architects often work with business analysts to develop strategies for improving a company’s security. Business analysis involves evaluating a company’s needs and determining how to meet them. Security architects can use their business analysis skills to help companies develop effective security strategies.

Visa Sponsorship Available
No

Minimum Requirements
Combination of Education and Experience will be considered. Must be authorized to work in the US as defined by the Immigration Act of 1986. Must pass a Criminal Background Check.
Education:
Master’s / Bachelor’s degree or equivalent experience.
Certification Details:  
Technical certifications or equivalents, CISSP required.
Years of Experience:  
Minimum eight (8) years experience in information security.
Minimum two (2) years of project or team lead experience.

Preferred Requirements
•Has advanced in-depth and expert knowledge in multiple information security specialty areas. Has expert and in-depth knowledge in two or more of the below areas: SIEM, Database Activity Monitoring, IDS/IPS management and design, expert knowledge in penetration testing/ Kali Linux, Red team scenario, Proficient in PCI compliance, Internal and External security design and architecture, File Integrity Monitor and Auditing solution, Cloud Security, Vulnerability Management, Application Security, Email Security, Endpoint Security, Incident Response, etc.
•Has advanced in-depth knowledge of public cloud security and private cloud security constructs, and the effective deployment of cloud security tools such as network security groups, cloudtrail, guard duty, inspector, and securityhub. 
•Has knowledge of security automation, and CI/CD pipeline techniques, using cloudformations, terraform, ansible, github, Jenkins, and other security automation tooling. 
•Can leverage knowledge to anticipate multiple future needs and opportunities and develop advanced in-depth security solutions.
•Has advanced in-depth knowledge of / skills in the content areas of: Components / technologies / applications of networking and Information Security, hacking techniques, modern security vulnerabilities, and security protections, risk assessment and management, application development security / OWASP, anticipation of future security requirements and technologies. 
•Experience and proven ability to work under time constraints and pressure.

Job Duties
•Architects, designs, and helps guide the implementation of information security controls, projects, and initiatives.
•Architects and designs components of the Allegiant information security systems.  This includes Cloud Security, Vulnerability Management, Application Security, Email Security, Endpoint Security, and Incident Response best practices.
•Participates in the development and maintenance of information security policies, processes, and procedures.
•Projects typically focus on the development of innovative solutions that improve or enhance the information security posture of both our on-premises and cloud environments.
•Typically assigned to multiple projects.
•Actions often influence the work of other team members and some management decisions.
•Troubleshoots and solves escalated, highest risk and complex information security problems.
•Completes a variety of complex tasks in creative, highly resourceful, and effective ways.
•Reviews systems, network, and application requirements / implementations for security design / vulnerabilities.
•Participates in Incident Response activities for any security breaches.
•Provides advanced in-depth top-level support for complex information security issues at all Allegiant locations.
•Creates, maintains, and documents complex information security processes and procedures.
•Works with application developers to identify security requirements and issues.
•Provides training to Allegiant IT/IS groups on security procedures. Internal contacts are both will include business leaders with individuals of considerable influence within Allegiant.
•Receives, interprets, and transmits complex information requiring extensive explanation or interpretation to a variety of technical and non-technical audiences.
•Work is subject to regular supervisory oversight at major milestones.
•Determines methods, policies and procedures for own work and the work of the team on complex security projects and assignments.
•Escalates highly complex issues or requests to gain cooperation at levels of senior- to mid- management.
•Trains, mentors, and reviews the work of less experienced personnel.
•Other duties as assigned.

Physical Requirements
The Physical Demands and Work Environment described here are a representative of those that must be met by a Team Member to successfully perform the essential functions of the role. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of the role.
Office/IT - While performing the duties of this job, the Team Member is regularly required to stand, sit, talk, hear, see, reach, stoop, kneel, and use hands and fingers to operate a computer, key board, printer, and phone. May be required to lift, push, pull, or carry up to 50 lbs. May be required to work various shifts/days in a 24 hour situation. Regular attendance is a requirement of the role. Exposure to moderate noise (i.e. business office with computers, phones, printers, and foot traffic), temperature and light fluctuations. Ability to work in a confined area as well as the ability to sit at a computer terminal for an extended period of time. Some travel may be a requirement of the role.

Essential Services Provider
Allegiant as a national air carrier is deemed an essential service provider during declared national and state emergencies. Team Members will be required to report to their assigned trip or work location during national and state emergencies unless prohibited by local, state or federal order.

EEO Statement
Equal Opportunity Employer: Disability/Veteran
For more information, see https://allegiantair.jobs

People of color, women, LGBTQIA+, immigrants, veterans and persons with disabilities are encouraged to apply.