Company Description
Sutherland is a global leader in driving business and digital transformation, and exceptional experiences along the entire journey of our client’s engagement with their customers. With over 35 years of experience, we combine deep domain expertise and extensive knowledge in proven optimization with both proprietary and partnered tools and platforms to drive growth, efficiency, and productivity across organizations.
Sutherland brings together our people, processes, products and platforms across cognitive artificial intelligence (AI), intelligent automation, advance analytics and digital services to create unique solutions for the industries that we service. The core values of remaining agile, outside-the-box thinking, uncompromising integrity and flawless execution are key pillars of the company.
We serve marque brands across Healthcare, Insurance, Banking and Financial Services, Communications, Media and Entertainment, Technology, Travel and Logistics and Retail. Sutherland has 212 unique and independent inventions associated with several patent grants in critical technologies in the US and UK. Leveraging this IP and combining it with our platforms, domain expertise, engineering and digital expertise and collaborative partnerships, we are a team of 40,000 delivering tailored services and solutions driving tangible results at scale for our clients.
Job Description
Job Summary: We are seeking an experienced Cybersecurity Architect to design and implement robust security solutions to protect our organization’s systems, networks, and data. The ideal candidate will have a deep understanding of cybersecurity frameworks, industry best practices, and the ability to develop strategic plans that address both current and emerging threats. As a Cybersecurity Architect, you will work closely with internal teams and external partners to ensure the protection and resilience of our IT infrastructure.
Key Responsibilities:
- Security Architecture Design & Strategy:
Design, develop, and implement security architectures for enterprise-wide systems, networks, applications, and databases to ensure data protection and compliance with security policies and regulations. - Risk Assessment & Threat Modeling:
Conduct regular risk assessments, vulnerability analysis, and threat modeling to identify potential security weaknesses and recommend countermeasures. - Security Standards & Best Practices:
Develop and enforce security standards, policies, and guidelines in line with industry best practices, compliance regulations (such as NIST, ISO 27001, GDPR, etc.), and business requirements. - Incident Response Planning:
Develop and implement incident response plans and ensure they align with business continuity and disaster recovery strategies. Lead response efforts during major security incidents. - Security Tool & Solution Selection:
Identify, evaluate, and recommend security tools and technologies - firewalls, intrusion detection/prevention systems, endpoint protection, encryption solutions, IAM Solutions to enhance security posture. - Collaboration with IT & Development Teams:
Work closely with IT infrastructure, development, and DevOps teams to integrate security solutions into systems and applications, ensuring secure system designs and secure software development practices (DevSecOps). - Compliance & Auditing:
Ensure all security solutions meet regulatory compliance requirements. Prepare for and participate in security audits and assessments. - Training & Awareness:
Provide security training and awareness programs to staff members to promote security best practices across the organization. - Continuous Monitoring & Improvement:
Implement continuous monitoring of network and system security, analyzing security metrics and trends, and improving the security architecture based on findings and evolving threats. - Vendor & Third-Party Security Management:
Evaluate the security posture of third-party vendors, contractors, and partners. Ensure that outsourced services meet internal security standards.
Qualifications:
- Education:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field (Master's degree preferred). - Certifications (preferred but not required):
- Certified Information Systems Security Professional (CISSP)
- Certified Information Security Manager (CISM)
- Certified Ethical Hacker (CEH)
- CompTIA Security+
- Experience:
- 12+ years of experience in cybersecurity, with at least 2 years in an architectural role.
- Proven experience with cloud security architectures (AWS, Azure, Google Cloud).
- Strong knowledge of security technologies, protocols, and tools – SailPoint IAM, OKTA, Sentinel IPS, Insight VM, Metasploit, MS MDM, firewalls, encryption, VPNs, Splunk SIEM system
- Hands-on experience with securing networks, operating systems, web applications, and databases.
- Familiarity with security frameworks such as NIST, ISO 27001, CIS Controls, etc.
- Skills:
- Deep understanding of cyber threats, vulnerabilities, and mitigation techniques.
- Excellent problem-solving, analytical, and decision-making skills.
- Strong communication and interpersonal skills, with the ability to explain complex security concepts to both technical and non-technical stakeholders.
- Ability to work collaboratively with cross-functional teams.
- Other Requirements:
- Knowledge of incident detection, response, and forensics practices.
- Experience with security automation and orchestration tools.
- Familiarity with secure software development practices and DevSecOps principles.
Qualifications
Any Graduate
Additional Information
All your information will be kept confidential according to EEO guidelines.