The project focuses on designing, implementing, and managing technical cybersecurity solutions, with particular emphasis on SSH key management, identity and access management, and cryptography. The goal is to ensure compliance with business and technical requirements, minimize risk, and support IT transformation in a large organization.
responsibilities :
Architecture, Technology & Design:
Produce, manage, and update end-to-end solution designs in line with reference architecture and business requirements.
Articulate and publish key design decision records and options to ensure all solutions follow a logical, transparent decision-making process.
Articulate, publish, and ensure approval of any design deviations resulting in technical debt.
Ensure any technical risks or issues arising from a solution design are recorded and mitigated.
Translate requirements into the architecture for the solution, ensuring technology and services meet customer needs and expected business outcomes.
Ensure the design of the solutions is efficient, timely, and cost-effective throughout the project lifecycle.
Clear understanding of both the motivations of the business and technical security.
Promote strong documentation and clerkship.
Governance:
Ensure all high-level designs, architecture patterns, decision records, deviation requests, and technical risks or issue records undergo architectural and project governance processes.
Ensure all architecture and design artefacts undergo appropriate peer review prior to design authority presentation.
Present publications at technical design authorities for input, feedback, and approval.
Risk and Dependency Management:
Effectively manage and escalate both technical and project risks or issues.
Articulate solutions and remediation steps to technical risks and issues.
Ability to map design decisions to resultant technical risks and issues to articulate the cause and rationale which leads to any negatively impacting change.
Leadership & Teamwork:
Provide technical thought leadership in their domain of expertise.
Willingness and ability to work across information technology as a cybersecurity SME, particularly with knowledge of SSH Key Management.
requirements-expected :
Requirements
Experience and proven technical depth within the following domains: identity & access management, cryptography, privileged access management, SSH key management.
Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level.
Experience working in large-scale IT transformation programmes.
Bachelor’s or master’s degree in cybersecurity, computer science, software engineering, or related field.
CISSP/CISM certification or other broad cybersecurity industry-recognised certificate.
Platform & Technology:
BizzDesign, Archi, or generic UML visualisation experience for high-level designs.
Working proficiency in Jira for project & tasks management.
Working proficiency in Confluence for documentation.
offered :
We are open to the employment form according to your preferences
Work with experienced and engaged team, willing to learn, share knowledge and open for growth and new ideas
Hybrid or remote working system
Mindbox is a dynamically growing IT company, but still not a large one – everybody can have a real impact on where we are going next
We invest in developing skills and abilities of our employees
We have attractive benefits and provide all the tools required for work
Interpolska, Multisport, Warta Insurance
benefits :
sharing the costs of sports activities
private medical care
sharing the costs of professional training & courses