Job added in hotlist
Applied job
Contract job
90-day-old-job
part-time-job
Recruiter job
Employer job
Expanded search
Apply online not available
View more jobs in Bridgewater, NJ
View more jobs in New Jersey

Job Details

Director Security Solution Architect - PVH Corp.

Company name
PVH Corp

Location
Bridgewater, NJ, United States

Employment Type
Full-Time

Industry
Executive, Manager, It

Posted on
Dec 17, 2020

Apply for this job






Profile

The Security Solution Architect plays an integral role in defining and assessing the organization's security strategy, architecture, and practices. The Security Solution Architect will be required to effectively translate business objectives and risk management strategies into specific security processes enabled by security technologies and services.The Director & Solution Architect for Network Infrastructure will be responsible globally for leading the organization’s security architecture specifically focused on the development of visionary technical architecture, design, and implementation standards of solutions that will securely enable our digital transformation.In this role, the candidate sets the security architecture strategy and vision for the organization. The candidate will create the vision and be the evangelist of the strategy to assure it is socialized, understood, and instituted within PVH. This is a pivotal role that partners with other technology, security, business, and regional support leads across PVH. The candidate defines and evolves the supporting security architecture globally, while sourcing, leading, and presenting forward-thinking, security capabilities for PVH.We seek a result driven leader who is passionate about applying program leadership, organizational discipline, and technology to transform the retail apparel industry. The Security Solution Architect must be a leader who will drive the security technology portfolio, oversee its governance, sponsor technical development, be a trusted partner and advisor to key business, infrastructure, and information security partners while driving adoption through cross-functional teams in multiple geographies. The candidate must have a strong understanding of the latest trends and how to incorporate relevant emerging technologies while maintaining daily operations.Empower team members to make recommendations and provide inputs in a highly collaborative environment.Serve as a trusted advisor on security architecture and related technologies questions to the Information Security & Global Infrastructure & Operations leaders. Partner as needed across the rest of the TPG organization.Develop and maintain a security architecture process that enables the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology, and threat drivers.Develop security strategy plans and roadmaps based on enterprise architecture practices.Develop and maintain security architecture artifacts (e.g., models, templates, standards, and procedures) that can be used to leverage security capabilities in projects and operations.Track developments and changes in the digital business and threat environments to ensure that they're addressed in security strategy plans and architecture artifacts.Participate in application and infrastructure projects to provide security-planning advice.Draft security procedures and standards to be reviewed and approved by executive management.Determine baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation, and identity and access management (IAM).Develop standards and practices for data encryption and tokenization in the organization, based on the organization's data classification criteria.Establish a taxonomy of indicators of compromise (IOCs) and share this detail with other security colleagues, including the security operations center (SOC), information security managers and analysts, as well as counterparts within the global command center (GCC).Coordinate with DevOps teams to advocate secure coding practices, and to escalate concerns related to poor coding practices.Coordinate with the privacy officer or office to document data flows of sensitive information in the organization (e.g., PII or ePHI) and recommend controls to ensure that this data is adequately secured (e.g., encryption and tokenization).Validate IT infrastructure and other reference architectures for security best practices and recommend changes to enhance security and reduce risks, where applicable.Review network segmentation to ensure least privilege for network access.Liaise with the internal audit (IA) team to review and evaluate the design and operational effectiveness of security-related controls.Support the testing and validation of internal security controls, as directed by the CISO or the internal audit team.Review security technologies, tools, and services to make recommendations to the broader security team for their use, based on security, financial and operational metrics.Liaise with other architects and security practitioners to share best practices and insights.Experience:   Ten years or more experience in enterprise level security architecture and engineering.Experience in using architecture methodologies such as SABSA, Zachman and/or TOGAF.Direct, hands-on experience or strong working knowledge of managing security infrastructure — e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), endpoint protection, identity & access management, SIEM and log management technology.Verifiable experience reviewing application code for security vulnerabilities.Direct, hands-on experience or a strong working knowledge of vulnerability management concepts and tools.Documented experience and a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services.Full-stack knowledge of IT infrastructure:ApplicationsDatabasesOperating systems — Windows, Unix and LinuxHypervisorsIP networks — WAN and LANStorage networks — Fibre Channel, iSCSI and NASBackup networks and mediaDirect experience designing IAM technologies and services:Active Directory / Azure Active DirectoryLightweight Directory Access Protocol (LDAP)Amazon Web Service (AWS) IAMStrong working knowledge of IT service management (e.g., ITIL-related disciplines):Change managementConfiguration managementAsset managementIncident managementProblem managementExperience designing the deployment of applications and infrastructure into public cloud services.Payment Card Industry Data Security Standard (PCI-DSS)General Data Protection Regulation (GDPR)Privacy PracticesISO 27001/2NIST Cybersecurity Framework (CSF)EDUCATION:   Bachelor’s Degree in Information Systems, Computer Science, Engineering, or other related fields required. SABSA (Sherwood Applied Business Security Architecture) or CISSP (Certified Information Systems Security Professional) certifications are preferred but not required.SKILLS:  Adaptability: Demonstrates flexibility within a variety of changing situations, while working with individuals and groups. Changes his or her own ideas or perceptions in response to changing circumstances. Alters standard procedures, when necessary, and multitasks when required.Business Acumen: Demonstrates an awareness of internal and external dynamics, and an acute perception of the dimensions of business issues. Conducts research and identifies, collects and analyzes information about markets, economies, technology trends and business operation issues to make informed decisions. Develops approaches and solutions that are clearly linked to the organizational strategies and goals for optimal performance.Conceptual Thinking: Synthesizes facts, theories, trends, inferences, and key issues and/or themes in complex and variable situations. Recognizes abstract patterns and relationships among apparently unrelated entities and situations. Applies appropriate concepts and theories in the development of principles, practices, techniques, tools, and solutions.Openness to Learning: Takes personal responsibility for personal growth. Acquires strategies for gaining new knowledge, behaviors and skills. Builds on and applies existing knowledge. Engages in learning from others, inside and outside the organization. Tries new approaches and broadens the scope of work to learn from work assignments.Strategic planning & organization skills — The Security Solution Architect must interpret business, technology and threat drivers, and develop practical security roadmaps to deal with these drivers. Possess the ability to organize multiple high priority tasks, managing the delivery of positive outcomes.Communication skills — The Security Solution Architect will be required to translate complex security-related matters into business terms that are readily understood by colleagues. The Security Solution Architect should anticipate presenting analyses in person and in written formats.Financial analysis — As part of the due diligence of security technologies, the Security Solution Architectwill be expected to evaluate the financial costs of recommended technologies. Specifically, the Security Solution Architect will need to quantify purchasing and licensing options, estimate labor costs for a given service or technology, and estimate the total cost of operation (TCO), the ROI, or the payback period for services or technologies replacing existing capabilities.Project management — Security services and technology implementations will require solid project management skills. The Security Solution Architect will be expected to draft project plans for security service and technology deployments and coordinate with stakeholders across the organization. PVH Corp. or its subsidiary (\PVH\) is an equal opportunity employer and considers all applicants for employment on the basis of their individual capabilities and qualifications, consistent with applicable law and without regard to race, color, sex, gender identity or expression, age, religion, creed, national origin, citizenship status, sexual orientation, genetic information, physical or mental disability, military status or any other characteristic protected under federal, state or local law. In addition to complying with all applicable laws, PVH also has a strong corporate commitment to inclusion, diversity and to ensuring that all current and future PVH associates are compensated solely on job-related factors such as skill, ability, educational background, work quality, experience and potential. To achieve these goals, across the United States and its territories, PVH prohibits any PVH employee, agent or representative from requesting or otherwise considering any job applicant’s current or prior wages, salary or other compensation information in connection with the hiring process. Accordingly, applicants are asked not to disclose this salary history information to PVH,datePosted:2020-12-18T00:00:00.000Z,title:Director, Security Solution Architect - PVH Corp.,@context:http://schema.org,occupationalCategory:Information Technology}Director, Security Solution Architect - PVH Corp. in Bridgewater, New Jersey, United States of America | Information Technology at PVH

Company info

PVH Corp
Website : http://www.pvh.com/

Similar Jobs:
Sr. Programmer Analyst
Location : Edison, NJ
Sr. Programmer Analyst 11/02/2023 Sr. Programmer Analyst (full-time, 6 positions) needed in Edison, NJ and various unanticipated locations throughout the US to gather and evaluate requirements from users to determine goals and obj...
Senior Business Analyst
Location : Edison, NJ
Senior Business Analyst 03/08/2018 Senior Business Analyst (4 position available; full-time) Senior Business Analyst needed in Edison, NJ and various unanticipated locations throughout the US to design and analyze business manag...
Software Engineer
Location : Edison, NJ
Software Engineer 10/24/2017 Software Engineer (full-time; 3 position available) Software Engineer needed in Edison, NJ and various unanticipated locations throughout the US to design, develop, test, and implement computer appli...
EmploymentCrossing is great because it brings all of the jobs to one site. You don't have to go all over the place to find jobs.
Kim Bennett - Iowa,
  • All we do is research jobs.
  • Our team of researchers, programmers, and analysts find you jobs from over 1,000 career pages and other sources
  • Our members get more interviews and jobs than people who use "public job boards"
Shoot for the moon. Even if you miss it, you will land among the stars.
InformationTechnologyCrossing - #1 Job Aggregation and Private Job-Opening Research Service — The Most Quality Jobs Anywhere
InformationTechnologyCrossing is the first job consolidation service in the employment industry to seek to include every job that exists in the world.
Copyright © 2024 InformationTechnologyCrossing - All rights reserved. 21 192