Team Leadership : Lead and mentor a team of cybersecurity architects, fostering a collaborative and innovative environment.
Stakeholder Engagement : Engage with senior leadership and stakeholders to align cybersecurity initiatives with business goals.
Strategic Vision : Provide strategic vision and direction for the cybersecurity team, ensuring alignment with organizational objectives.
Resource Management : Manage resources effectively to ensure successful project delivery and optimal team performance.
Requirements
Education : Bachelor's or Master's degree inputer Science,puter Engineering, or related IT discipline. An additional business degree is advantageous.
Certifications : Industry certifications such as CISSP, TOGAF, CISA, ITIL, PMP, and other relevant certifications are highly desirable.
Experience : At least 10 years of experience in cybersecurity architecture, including leading multiple major implementations and creating technology strategies.
Leadership : Proven experience in managing and mentoring teams of cybersecurity architects and technical professionals.
Security Solutions : Extensive experience in designing, implementing, and improving cybersecurity solutions.
Emerging Technologies : Up-to-date knowledge of emerging technologies and trends in cybersecurity.
Industry Knowledge : Familiarity with industry best practices, technology trends, and business trends in the financial industry.
Large-Scale Projects : Experience in implementing large-scale cybersecurity projects and producing cybersecurity designs specifically for banking.
AI Solutions : Experience working with AI solutions, including designing and implementing AI-driven cybersecurity solutions, and integrating AI technologies into enterprise architecture.
Cybersecurity Expertise : In-depth knowledge of cybersecurity principles, including data breaches, hacking, account hijacking, malicious insiders, third parties, authentication, APTs, data loss, and DoS attacks. Experience in identity and access management, and creating / enforcing policies thatern access to sensitive technology resources and information assets.