Security Architecture China Lead
- Shanghai, Shanghai Shi, China
- Permanent, Full time
- Morgan Stanley
- 25 Sep 16
See job description for details
The IT Security Architecture (SecArch) team is part of the Technology Infrastructure Risk (TIR) organization. The mission of the SecArch team is to provide security assessments of technology systems and processes to identify business risks and recommend remedial action based on established security standards or security best practices. The IT Security Generalist (Integrator) is an internal consultant that is working on multiple security architecture and design assessments. The Integrator works with team members (IT, Business, Suppliers, Stakeholders and Partners) globally to perform SecArch assessments. To be successful as an Integrator the candidate must have broad technology experience coupled with strong communication, influencing and time management skills.
An Integrator has the following responsibilities:
1.Lead SecArch deep dives with the requestor of the assessment
2.Conduct assessment and provide technology risk/requirements to the requestor. Areas covered:
a.AAA Authentication, Authorization, Auditing
b.Application Security Session Security, Vulnerability/Pen Testing items, Input Validation
c.Secure data transport and storage
3.Periodically review security reference architecture (security blueprints) and conduct updates/enhancements
4.Participate in various Operational and Technology Risk governance processes
5.Assist in identifying new areas and opportunities of technology investment for the firm
Skills and Experience
Soft Skills (Required)
1.Excellent communication skills: written, oral, presentation, listening
2.Ability to influence through factual reasoning
3.Time management: ability to handle multiple concurrent assessments, plan based deliverable management, strong follow up and tracking
4.Strong focus on delivery when presented with short timelines and increased involvement from senior management
5.Ability to adjust communication of technology risks vs business risks based on the audience
Security Architecture Skills
1.Required In depth knowledge of application, network and platform security vulnerabilities. Ability to explain these vulnerabilities to developers
2.Required Experience in conducting Information Security, IT Security, Audit assessments. Presenting the outcomes of the assessment and obtaining buy in.
3.Required Strong focus on reviewing technical designs and functional requirements to identify areas of Security weakness.
4.Required The candidate must have working experience in the following application/network security domains:
a.Authentication: SAML, SiteMinder, Kerberos, OpenId
b.Entitlements and identity management
c.Data protection, data leakage prevention and secure data transfer and storage
d.App Security - validation checking, software attack methodologies
e.Cryptography encryption and hashing
5.Desired Knowledge of standard network model and the risks that present at each layer, the functions of network equipment such as switches, routers, firewalls, proxies, vpn, and load-balancers, and to understand network architecture.
6.Desired - The candidate must have working knowledge of the primary operating systems (Unix, Windows, z/OS, Mac OS), the configuration and management of that platform at an enterprise scale, the security risks to that platform, and how to mitigate those risks.
7.Desired - experience in testing tools, at least one of Veracode, Fortify, OunceLabs, AppScan, WebInspect, Burp
1.Required Even though the SecArch Integrator role is not a development role, the candidate must have previous background in programming, design and application architecture.
2.Required In order to be a practical SecArch Integrator the candidate must have experience implementing complex applications in an enterprise environment.
4.Desired In-depth knowledge of web technologies such as Web Browsers, Web Servers, Web Services
Other Areas of Expertise
1.Frameworks, protocols and subsystems: J2EE, .NET, Spring, RPC, SOAP, MQSeries, JMS, RMI, JMX, Hibernate.
3.Database design and programming experience
4.Experience of liaising with 3rd Party Entities (exchanges, suppliers, regulators)
5.Experience in conducting and / or reviewing penetration tests, dynamic vulnerability assessments and static vulnerability assessments
6.Understanding of geographic regulations and their impact on Security assessments
7.Previous experience in Financial Services is preferred
8.CISSP or other industry qualification
9.Desired experience working with global organizations
Bachelors Degree with minimum 5 years relevant work experience in high-paced, enterprise environment