Global Cybersecurity Architect

Location US-IL-Northbrook
Job ID
2022-30306
# of Openings
1
Job Category
Information Technology

 

E&A.Software.Tech.IT - Man with data - Secure

At UL, we know why we come to work.

Thousands of us around the world wake up every day with a common purpose: to make the world a safer, more secure and sustainable place. Science is in our DNA; we are endlessly curious and passionate about seeking and speaking the truth. We take delight in knowing that our work makes a meaningful contribution to society, and we are proud that our culture is centred on integrity, collaboration, inclusion and excellence. UL Solutions stands at the forefront of technological advancement, and we are continually challenged to find new ways to foster innovation and positive change. Satisfying? Yes. Exciting? Absolutely!

 

The Global Cybersecurity Architect plays an integral role in defining and assessing the organization’s security strategy, architecture, and practices. The security architect will be required to effectively translate business objectives and risk management strategies into specific security processes enabled by security technologies and services. This role will be part of global cybersecurity leadership team, reporting to the VP, Security Transformation. 

What you’ll learn & achieve:

The security architect will be responsible for the following activities and functions: 

 

Planning and Design Activities 

  • Develops and maintains a security architecture process that enables the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology, and threat drivers
  • Develops security strategy plans and roadmaps based on sound enterprise architecture practices
  • Develops and maintains security architecture artifacts (models, templates, standards and procedures) that can be used to leverage security capabilities in projects and operations
  • Determines baseline security configuration standards for operating systems (e.g., operating system hardening), network segmentation, and identity and access management (IAM)
  • Drafts security procedures and standards to be reviewed and approved by executive management
  • Develops standards and practices for data encryption and tokenization within the organization based on the organization’s data classification criteria
  • With guidance from the VP, Security Transformation and in conjunction with security operations center (SOC) colleagues, establishes procedures — including escalations — for when indicators of compromise (IOCs) are discovered
  • Establishes a taxonomy of IOCs and shares this detail with other security colleagues, including the SOC, information security managers and analysts, and counterparts within the network operations center (NOC)

 

Assurance 

  • Tracks developments and changes in the digital business and threat environments to ensure that these are adequately addressed in security strategy plans and architecture artifacts
  • Validates IT infrastructure and other reference architectures for security best practices, and recommend changes to enhance security and reduce risk where applicable
  • Validates security configurations and access to security infrastructure tools, including firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), anti-malware/endpoint protection systems, etc.
  • Validates that security and other critical patches to firmware and operating systems are configured and deployed in a timely fashion
  • Conducts or facilitates threat modeling of services and applications that tie to the risk and data associated with the service or application
  • Ensures that a complete, accurate and valid inventory of all systems, infrastructure and applications is conducted that should be logged by the security information and event management (SIEM) or log management tool
  • Coordinates with the DevOps teams to advocate secure coding practices and escalate concerns related to poor coding practices to the VP, Security Transformation
  • Coordinates with the privacy officer to document data flows of sensitive information within the organization (e.g., PII or ePHI) and recommends controls to ensure this data is adequately secured (e.g., encryption, tokenization, etc.)
  • Reviews network segmentation to ensure least privilege for network access
  • Supports the testing and validation of internal security controls as directed by the identity access team
  • Reviews and assess security and infrastructure logs for indicators of compromise or other anomalous behavior within networks, applications or user profiles
  • Conducts security assessments of internal systems, applications and IT infrastructure as part of the overall risk management practice of the organization
  • Conducts vulnerability assessments and other security reviews of systems, and prioritizes remediation based on the risk profile of the asset and guidance from executive management
  • Conducts code reviews of applications to determine security flaws or other issues that would impact the confidentiality, integrity or availability of the system
  • Conducts reviews of and oversees the change management function for security rulesets for the organization’s firewalls

 

Collaboration 

  • Liaisons with the vendor management team to conduct security assessments of existing and prospective vendors, especially those with which the organization shares intellectual property, PII, ePHI, regulated or other protected data, including:
    • SaaS providers
    • Cloud/infrastructure as a service (IaaS) provider
    • Managed service providers
    • Payroll providers
  • Evaluate the statements of work from these providers to ensure that adequate security protections are in place. Assess the providers’ SSAE 16 SOC 1 and SOC 2 audit reports (or alternative sources) for security-related deficiencies and required “user controls,” and report any findings to the executive management and vendor management teams.
  • Coordinates with operational and facility-management teams to assess the security of operational technology and Internet of Things (IoT) systems
  • Liaisons with other security architects and security practitioners to share best practices and insights
  • Liaisons with the internal audit (IA) team to review and evaluate the design and operational effectiveness of security-related controls
  • Participates in application and infrastructure projects to provide security planning advice
  • Liaisons with the business continuity management team to validate security practices for both disaster recovery planning (DRP) and business continuity management (BCM) testing and operations when a failover occurs
  • Reviews security technologies, tools and services, and makes recommendations to the broader security team for their use based on security, financial and operational metrics
  • Leads and/or coordinates penetration testing, and other “red” team exercises as directed by the VP, Security Transformation

 

Key Relationships 

The global cybersecurity architect liaises with important security and risk management constituencies. Specifically, the global cybersecurity architect may be expected to work collaboratively with individuals or departments, including: 

  • Application and information owners
  • CISO
  • CIO
  • Chief risk officer (CRO)
  • Chief privacy officer (CPO)
  • Information security manager (ISM)
  • Security analyst
  • SOC manager and staff
  • NOC manager and staff
  • Enterprise architect
  • Project management office
  • Vendor management team
  • Internal audit

The global cybersecurity architect will be expected to advocate security requirements and objectives with these constituencies, while also ensuring that global cybersecurity architecture and practices do not infringe on the needs of the business. Specifically, the security architect will serve as a technical sounding board for the CISO’s interaction with other line-of-business constituencies within the organization. The global cybersecurity architect will be expected to evaluate new services, vendors, applications, and security tools, among other items, from a technical perspective and translate the risk characteristics of these activities and functions into enterprise risk terms that the CISO can communicate to colleagues within the organization. 

What makes you a great fit:

Education 

Bachelor’s or master’s degree in computer science, information systems, cybersecurity or a related field. 

 

Security and Technical Experience 

The global cybersecurity architect should have direct, documented and verifiable experience with the following: 

  • Experience in using architecture methodologies such as SABSA, Zachman and TOGAF
  • Direct, hands-on experience managing security infrastructure such as firewalls, IPSs, WAFs, endpoint protection, SIEM and log management technology
  • Verifiable experience reviewing application code for security vulnerabilities
  • Direct, hands-on experience using vulnerability management tools
  • Documented experience and a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services
  • Full-stack knowledge of IT infrastructure:
    • Applications
    • Databases
    • Operating systems (Windows, UNIX and Linux)
    • Hypervisors
    • IP networks (WAN, LAN)
    • Storage networks (Fibre Channel, iSCSI and network-attached storage)
    • Backup networks and media
  • Direct experience designing IAM technologies and services (e.g., Active Director, LDAP, Amazon Web Services’ [AWS’] IAM)
  • Strong working knowledge of IT service management (e.g., ITIL-related disciplines):
    • Change management
    • Configuration management
    • Asset management
    • Incident management
    • Problem management
  • Experience designing the deployment of applications and infrastructure into public cloud services (e.g., AWS or Microsoft Azure)

 

Industry and Regulatory Experience 

The global cybersecurity architect is expected to have documented experience with the following, but not limited to: 

Regulations, Standards and Frameworks 

  • Payment Card Industry’s Data Security Standard (PCI-DSS)
  • Health Insurance Portability and Accountability Act (HIPAA)/Health Information Technology for Economic and Clinical Health (HITECH)
  • Validated Systems (e.g., Good Automated Manufacturing Practice [GAMP])
  • Sarbanes-Oxley Act
  • General Data Protection Regulation (GDPR)
  • Privacy Principles (best practices)
  • International Organization for Standardization (ISO) 27001/2
  • National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)
  • International Traffic in Arms Regulations (ITAR)

Industry, Market or Sector Experience (minimum of 2 desired)

  • Manufacturing
  • Healthcare
  • Pharmaceutical
  • Retail
  • Financial services
  • Government
  • Military
  • Education

 

Business-Related Skills 

The global cybersecurity architect is expected to contribute his/her insights not only to colleagues within the security team and the CISO, but also to colleagues within IA, risk management and other line-of-business teams. To ensure that security-related matters are adequately conveyed, the following skills are required: 

  • Strategic planning skills The global cybersecurity architect must interpret business, technology and threat drivers, and develop practical security roadmaps to deal with these drivers.
  • Communication skills The global cybersecurity architect will be required to translate complex security-related matters into business terms that are readily understood by the CISO and line-of-business colleagues. The global cybersecurity architect should anticipate presenting his or her analysis both in person and in written formats.
  • Financial analysis — As part of the due diligence of security technologies, the global cybersecurity architect will be expected to evaluate the financial costs of recommended technologies. Specifically, the global cybersecurity architect will need to quantify purchasing and licensing options, estimate labor costs for a given service or technology, and estimate the total cost of operation or the ROI, or payback period for services or technologies that are replacing existing capabilities.
  • Project management — Security services and technology implementations will require solid project management skills. The global cybersecurity architect will be expected to draft project plans for security service and technology deployments and coordinate with stakeholders across the organization.

 

Required Certifications 

The global cybersecurity architect will evidence his or her knowledge of security and risk management through ongoing continuing professional education. The ideal candidate will maintain one or more of the following certifications.

 

  • ISC2’s CISSP, ISACA’s CISM, ISACA’s CISA, The Open Group’s TOGAF, SANS’ GAIC, IAPP’s CIPT

 

Key Behaviors/Competencies 

The global cybersecurity architect will be expected to demonstrate the following key behaviors and competencies as they fulfill the core responsibilities of their roles: 

  • Adaptability: Demonstrates flexibility within a variety of changing situations, while working with individuals and groups. Changes his or her own ideas or perceptions in response to changing circumstances. Alters standard procedures, when necessary, and multitasks when required.
  • Business acumen: Demonstrates an awareness of internal and external dynamics, and an acute perception of the dimensions of business issues. Conducts research and identifies, collects and analyzes information about markets, economies, technology trends and business operation issues to make informed decisions. Develops approaches and solutions that are clearly linked to the organizational strategies and goals for optimal performance.
  • Conceptual thinking: Synthesizes facts, theories, trends, inferences, and key issues and/or themes in complex and variable situations. Recognizes abstract patterns and relationships among apparently unrelated entities and situations. Applies appropriate concepts and theories in the development of principles, practices, techniques, tools and solutions.
  • Openness to learning: Takes personal responsibility for personal growth. Acquires strategies for gaining new knowledge, behaviors and skills. Builds on and applies existing knowledge. Engages in learning from others, inside and outside the organization. Tries new approaches and broadens the scope of work to learn from work assignments.
  • Versatility: Ability to work effectively with different types of scenarios and challenges. Ability to address tasks and projects for which no precedence exists in the organization.

Personal Characteristics

  • Can interface with, and gain the respect of, stakeholders at all levels and roles in the company
  • Is a confident, energetic self-starter, with strong interpersonal skills
  • Has good judgment, a sense of urgency and has demonstrated commitment to high standards of ethics, regulatory compliance, customer service and business integrity
  • Instinctive and creative
  • Strong problem-solving and trouble-shooting skills
  • Self-motivated and possessing of a high sense of urgency and personal integrity
  • Highest ethical standards and values

 

UL has COVID-19 protocols and policies in place to ensure the safety of our employees, customers and clients. Effective November 1, 2021, the company mandates that employees are vaccinated against COVID-19 as a condition of employment (except where prohibited by law), subject to reasonable accommodation as required by law. 

What you’ll experience working at UL:

  • Mission: For UL, corporate and social responsibility isn’t new. Making the world a safer, more secure and sustainable place has been our business model for the last 125 years and is deeply engrained in everything we do.  You will shape the way we approach and deliver our solutions to promote safe living and working environments for people everywhere.
  • People: Ask any UL employee what they love most about working here, and you’ll almost always hear, “the people”. Work with colleagues, who you can listen and learn from and challenge each other so that you can continually push for excellence and results.
  • Interesting work: Your work at UL will challenge you to try fresh approaches, be empowered to drive change and help you gain in-depth experience in your field. And as a global company, in many roles,  you will get international experience working with colleagues around the world.
  • Grow & achieve: Growth and development are part of our DNA. Grow & achieve with targeted development, reward and recognition programs as well as our very own UL University that offers extensive training programs for employees at all stages as well as a technical training track for applicable roles.

Learn More:

Working at UL Solutions is an exciting journey that twists and turns daily. We thrive in the twists and revel in the turns. This is our every day. This is our normal.


Curious? To learn more about us and the work we do, visit our company page www.UL.com

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed

Connect With Us!

Not ready to apply, or can't find a relevant opportunity?
Connect with us to keep informed about the latest UL career opportunities, tailored to your interests.

If you wish to request reasonable accommodation at any time, please email our Talent Acquisition team at Talent.Acquisition@ul.com.

UL is an Equal Opportunity Employer: Female/Minority/disability/Protected Veteran/Sexual Orientation/Gender Identity

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, or disability status. If you'd like more information about your EEO rights as an applicant under the law, please review the EEO is the Law and EEO is the Law Supplement.

Please review the following additional documents:

UL EEO Policy

Pay Transparency Statement

E-Verify Poster (English)

Right to Work Poster (English)