Pb Arquitecto Seguridad (GTB) /b /ppbr/ppbLocation Málaga /b /ppThe person will be a candidate to be hired internally. /ppbr/ppbWHAT WILL YOU DO IN YOUR WORK? /b /ppbr/ppAs a Cyber Security Engineer your main objective will be to ensure compliance with security standards and principles: /pulliEvaluation and review of security architectures of the projects ensuring compliance with internal policies and principles. /liliSupport for the implementation of reference architectures, facilitating the adoption of the technologies and products of each project. /liliEnsure compliance with Corporate Security policies, generating compliance standards for architectures. /liliEnsure compliance with security reference standards, considering the recommendations of the Cyber Global architecture teams. /liliIdentify the best practices and trends applicable in security architectures. /liliAlignment with the Global Cyber Security architecture teams, with active participation in global initiatives. /liliWork closely with the CTO Architecture team. /liliEngagement with CISO SCIB for alignment and priority definitions. /liliProvide general advice in security topics. /li /ul pbWHAT ARE WE LOOKING FOR? /b /ppbr/ppbEXPERIENCE /b /pulliMore than 15 years of experience in IT, and at least 10 years of experience in a similar position. /li /ulpbr/ppbEDUCATION /b /pulliBachelor or Degree in Engineering, Computer Science and/or Telecommunication or similar background. /liliAWS Certifications (is a must). /liliRecognized Cyber Security certifications (at least one is a must) as ISACA, NIST, ISO, CompTIA Security+, CISSP+… etc. /liliVendors certifications (desired) as PaloAlto, Checkpoint, Cisco. /li /ulpbr/ppbr/ppbSKILLS KNOWLEDGE /b /pulliAdvanced English and Spanish level. /liliOperational and analytical Cybersecurity: /li /ululliDigital Identity and Access Management: mastering the SAML and OpenID Connect standards. /liliAPI security access: mastered in OAuth 2.0 JWT Bearer Grant and Auth Code with PKCE is a must. /liliGood understanding of OSI Model in Network Layer. /liliSecrets management. /liliPKI environments, cryptography, CMEK/BYOK. /liliRisk assessment / Impact analysis. /liliAWS architecture practitioner. /liliThreat modeling methodologies (STRIDE). /li /ululliNetworking, security and high availability of telecommunications systems and services in each network layer. /liliExperience in designing security solutions and architectures. /liliMastering documentation tasks. /liliMore extensive knowledge of cybersecurity: cyber-attack, cyber defense, secure architecture, security management and administration. /liliKnowledge of microservices architecture: Docker, Kubernetes, etc. /liliKnowledge of SecDevOps. /liliDevelopment and good coding methodologies knowledge. /liliTOGAF desired. /li /ulpbr/ppbOTHER INFORMATION /b /pulliStrong communication skills, with high ability to work as a team. /liliAccuracy and attention to detail. /liliBanking scope knowledge. /liliCritical thinking. /liliInterpersonal relationships. /liliWork under pressure. /liliProblem solving. /liliOptimism regarding uncertainty. /liliTakes ownership. /li /ulpbr/ppLet’s connect if you’re passionate about building the future of technology! /p