West Palm Beach, FL, US
42 days ago
Security Architect

Florida Crystals is a leading domestic sugar producer and North America’s first fully integrated cane sugar company, guiding our sugar from farm to table.  We are America’s first and only producer of certified organic sugar, grown and harvested in the United States. Our renewable energy facility is the largest of its kind in North America and provides clean energy that powers our sugar operations, which helps us reduce our use of fossil fuels.  Florida Crystals also sustainably farms rice, sweet corn and other vegetables in rotation with our sugarcane.  Our rice mill is the only rice mill in Florida. 

 

 

OVERVIEW 

The Information Security Architect position reports directly to the Sr. Director of Information Security.  The primary focus of this position is to envision, design, and implement new security solutions, participate in hardening and evolving the company’s existing security architecture and providing threat modeling, risk mitigation, and incident response expertise. In addition, the Security Architect will collaborate as a technical leader with senior IT and business management to advance the security strategy and drive the execution of the security roadmap.  

 

The Security Architect should possess deep expertise in the company's security processes across various domains and disciplines, including on-premise and cloud/SaaS applications, data, infrastructure, and mobile solutions. Success in this role requires a highly collaborative approach, strong communication with peers, management, and leadership, and the ability to lead cross-functional initiatives. Additionally, the Security Architect must respond swiftly and decisively to security issues or demands as they arise. 

 

  

DETAILED ROLES & RESPONSIBILITIES 

Performs security architecture, related documentation, and validates solution designs spanning multiple domains: SAP and other critical business applications, Data, Cloud and On-prem Infrastructure, Mobile, Networking, Operational Technology “OT”, etc.  Create, manage, and update Standard Operating Procedures as needed  Functions as a Subject Matter Expert (SME) regarding security integrations and authentication elements such as Microsoft Security, Azure Security, O365 Security, SSO (SAML, OIDC, LDAP, etc.), Certificates, Multi Factor Authentication, VPN, ZTNA Architecture, Active Directory Federation, Reverse Proxy, Identity and Access Management, SIEM, e-mail security solutions (Abnormal, Defender, Proofpoint, etc), URL Filtering (ForcePoint), PAM, SecureAuth, etc.  Works closely with the Security Engineer(s), Infrastructure, SAP BASIS, Partners and Solutions teams to ensure designs are functionally sound and based on best practice security standards  Works expressly with the Enterprise Architecture team to design, validate and implement effective and compliant Security Controls; cooperates on implementing a compliance-based Segregation of Duties (SoD) strategy and robust, risk-based operational security model; takes an active role to ensure consistency of standards, practices and policies related to security operations and implemented solutions  Works with security peers, Infrastructure, BASIS, Partners, and others to evolve security related processes and implement risk-based, prioritized security; leads effort and coordination with Infrastructure and Managed Security Service Provider(s) on asset management cataloguing for risk mitigation / risk assessment purposes  Collaborates on Security Integration architectures for corporate acquisitions  Evaluates security questionnaires for vendors and analyses the potential security impact including risks, threats, vulnerabilities, and process bottlenecks for solutions under consideration, and ensures solutions (application, service, database, network, infrastructure, mobile, cloud) can be implemented using best practice standards and innovations  Leads internal initiatives to periodically review and perform operational risk assessments and analysis, vulnerability reviews, compliance violation checks, partner re-certifications, penetration testing and other activities to address potential security risks  Participates in corporate and external security audit proceedings  Coordinates the security patch management program for servers, systems, applications, and devices  Leads the effort to architect and validate a preferred IAM solution and designing the integration points  Functions as the lead to evolve the SIEM / Advanced (Real time) Threat Management strategy and its functional architecture  Coordinates inner team and cross team communications and activities that improve and sustain operational security functions related to support, maintenance, optimizations, and projects as warranted  Provides relevant security training to team members to improve their skills and abilities as security professionals  Stays current on modern day security practices and techniques and evaluates new offerings and methodologies that potentially minimizes the company’s security risk on an ongoing basis  Establish a threat modeling methodology to identify, classify, prioritize, and report on cyber threats using a structured approach  Collect information on threats to the organization through communication with other partner institutions, mailing lists, open-source news, and industry partnerships  Provide awareness to internal teams and leadership on changes to the cyber threat landscape 

  

WORK EXPERIENCES 

8+ years of experience as an IT Security professional with at least 5 years architecting and leading solutions in a hybrid environment with a heavy focus on Microsoft and/or Azure   Broad security knowledge working in a heterogeneous environment of diverse applications, systems, databases, SaaS solutions and on premise as well as Cloud-based security offerings 

  

EDUCATION REQUIREMENTS 

A minimum of a Bachelor’s Degree in Information Systems, Computer Science, Engineering, or equivalent experience  In lieu of a Bachelor’s Degree, 8+ years of relevant field experience will be considered  CISSP, Microsoft/Azure, and/or SANS certification preferred 

  

 ESSENTIAL CAPABILITIES (KNOWLEDGE, SKILLS, ABILITIES AND PERSONAL ATTRIBUTES) 

Significant understanding and experience working in complex and distributed IT environments, applying security expertise involving both on premise and cloud-based solutions  Strong understanding of security and risk mitigation strategies  Expert understanding of Microsoft security strategies and platforms, Azure security, o365 security, Active Directory / Federation Model, Multi-factor authentication, SSO, SAML, OAUTH, SSL Certificates, etc.  Working understanding of SAP’s Security Architecture Model and experience with SAP Application Security: ECC, GRC, IAM, SuccessFactors, CRM, EP, Solution Manager, PLM, HANA, HCM, Analytics Cloud, etc. Is preferred  Ability to create clear and concise documentation targeted at the appropriate audience – IT executives, Internal Business Clients and technical teams  Demonstrated knowledge of common adversary tactics, techniques, and procedures (TTPs)  Intimate knowledge of the Cyber Kill Chain, MITRE ATT&CK, and other relevant network defense and intelligence frameworks  Experience with collecting, analyzing, and interpreting technical data from multiple sources, documenting the results and providing meaningful analysis products  Must demonstrate assertiveness and leadership qualities, deliver excellence in verbal and written communication and prioritize effectively  Must be capable of creating architecture and related documents for pre-existing solutions and implementations  Must be capable of collaborating with others regarding critical security decisions and policy and have others feel their input is being considered when decisions affect multiple teams and / or the Business 

  

 LOCATION OF ROLE 

West Palm Beach, FL 

 

 

 

We are an equal opportunity employer. We do not discriminate on the basis of race, color, creed, religion, gender, sexual orientation, gender identity, age, national origin, disability, veteran status or any other category protected under federal, state, or local law.  All employment is decided on the basis of qualifications, merit, and business need. 

Confirm your E-mail: Send Email