Are you passionate about understanding how things work, helping them to work better, and excited about building new possibilities? Motorola Solutions has an opportunity for a security architect in which you will be at the forefront of designing and implementing cutting-edge enterprise security architecture and contributing to the future of a global enterprise. You will be able to grow your expertise across a diverse array of technologies, environments, and projects. In this role you will be an advocate for security practices, a solver of complex problems, a researcher into new technologies and capabilities, and a valued source of expertise for our business leaders as they optimize the security configurations of enterprise applications and infrastructure. If you're inspired by the challenge of shaping the future of security, join us and see what possibilities await.
Scope of Responsibilities / Expectations
- Become an expert in Multi-Cloud security to help teams follow enterprise security policies, industry regulations, and security best practices
- Expand and enforce Security Architecture standards, principles, and frameworks across enterprise applications and infrastructure
- Analyze and improve security architecture review processes and practices
- Perform security assessments of applications and systems
- Conduct tests to identify vulnerabilities and perform root cause analysis to identify gaps
- Evaluate, develop, and implement new systems, technologies, and frameworks that enhance the enterprise security program
- Promote new ways of working with emerging security technologies throughout the enterprise
- Coordinate with appropriate resources to ensure that subsidiaries assets are in compliance with Motorola Solutions’ security policies and standards
- Responsible for maintaining technical documentation of design, policies, and operational procedures
- Work with application owners and administrators to identify and remediate vulnerabilities
Desired Background/Knowledge/Skills
- Experience with enterprise level security tools and platforms
- Strong understanding of Application Programming Interfaces (APIs), their functionalities, and how to leverage their capabilities effectively in a security context
- In-depth familiarity with the nuances of constructing and maintaining secure data pipelines, including data flow, integration, and processing
- Skilled in scrutinizing system and security logs to detect and investigate signs of unauthorized or malicious activity.
- Demonstrated experience adhering to formal change management protocols to ensure controlled and secure alterations to the IT environment.
- An inventive mindset with a keen eye for identifying and implementing new efficiencies within security operations and protocols.
- Solid understanding of recognized cybersecurity frameworks, principles of defense in depth, and strategies for implementing layered security defenses.
- Comprehensive knowledge of cloud security best practices, along with the ability to evaluate and deploy the most effective security tools available in the market for cloud environments.
Preferred Competencies
- Exceptional ability to analyze complex issues, identify patterns, and devise effective solutions.
- Strong aptitude for tackling challenges with a systematic and results-oriented approach.
- Excellent verbal and written communication skills, with the capacity to articulate ideas clearly and collaborate with a diverse range of stakeholders.
- Outstanding organizational capabilities, with a proven track record of managing tasks efficiently and prioritizing effectively.
- A demonstrated history of working harmoniously within team settings, contributing positively to group dynamics, and supporting shared objectives.
Basic Requirements
- A Bachelor’s degree is required.
- Candidates should have a solid background in network and security engineering. We are looking for professionals with a proven track record and several years of experience in the field.
- Proficiency in administering Linux, MacOS, or Windows within an enterprise environment is essential. Candidates should have experience managing and maintaining these systems at a professional level.
- Demonstrable experience in implementing and administering enterprise-grade security tools and platforms is a must. Candidates should have a history of working with these technologies and be able to showcase their expertise.