Sorry, this listing is no longer accepting applications. Don’t worry, we have more awesome opportunities and internships for you.

Principal Security Solutions Architect

Input Technology Solutions

Principal Security Solutions Architect

San Diego, CA
Full Time
Paid
  • Responsibilities

    The Principal Security Solutions Architect role is a national role responsible for developing solutions around data protection and privacy for our clients. This includes legislation driving data privacy as well as alignment of business processes to the technology controls required to secure an organization’s data landscape. The Principal Security Solutions Architect must serve as a thought leader, and enabler for the technology both internal and external to the company. The Principal Security Solutions Architect is one of the company’s top resources for strategic direction and tactical solutions for the technology. As an enabler, the Principal Security Solutions Architect creates tools, cultivates skills, and weaves best practices into the fabric of the company.

    Job Responsibilities:

    • Define market segments, product positioning, competitors, value proposition and go-to market strategy specific to data protection and privacy solutions.
    • Align with OEM alliance managers and key OEM partners in development, roadmaps, and market acceleration activities.
    • Assist sales team with identifying and capturing customer business requirements during the sales cycle and determining recommended solution and develop and finalize solution architecture/design.
    • Serves in a national position but must work closely with the regions and therefore must be able to create value through both direct and indirect team building.
    • Provide technical expertise to sales team and customers on designated solution focus area
    • Establish credibility with field teams and customers
    • Collaborate with the business to create content to drive sales and improve project quality
      • Sales: data sheets, technology and process presentations, solution positioning, competitive differentiators, etc.
      • Proposal: reference designs, task lists, work breakdown structures, assumptions, level of effort estimates, SOW templates, etc.
      • Delivery: methodologies, processes, best practices, design templates, testing plans, etc.
      • Support Security Marketing teams in the creation and validation of security focused marketing content 
    • Assess customer pain points and market demand to define compelling services offerings packaged as a product
    • Enable technical readiness, training and development on developed Security solutions
    • Work on achieving additional relevant certifications that would benefit the Architect role
    • Conduct knowledge transfers with solution architect colleagues and service delivery team regarding solution and OEM product updates/changes, lessons learned from previous engagements/experience, etc. as relevant
    • Identify product or services candidates to sales and services management as new solution areas to potentially develop or invest in
    • Complete and/or register for training and maintain OEM certification(s) as requested and approved by immediate manager in accordance with assigned focus area
    • Business development
      • Participate in identifying strategic and tactical manufacturer partnerships and key players necessary to achieve and sustain thought leadership for security solutions
      • Evaluate, initiate, grow, and manage partnership opportunities with both manufacturer and services organizations
      • Identify, evaluate, and execute on opportunities to optimize or expand a line of business
      • Proactively work with vendor management team in achieving vendor certification targets and audit requirements
      • Ensure security solutions are designed to drive services revenue on Security technologies
      • Evaluate emerging market trends and directions in order to accelerate technology discovery & adoption
      • Build credibility by establishing us as an authority on the given technology
      • Expand industry awareness through webinars, seminars, speaking engagements, blogging, publishing, and other forms of media

    • Technical
      1. Technical master to expert-level knowledge within area of specialty
      2. Previous success in designing, developing, and implementing IT solutions within the technical discipline
      3. Demonstrated skill at architecting distributed solutions across technical disciplines
      4. Must be fully knowledgeable and able to design, plan, and support deployment efforts around IT security solutions using five or more of the following technologies:
    • Data Governance & Legislation
    • Identity & Access Management
    • Data Encryption
    • Data Protection Controls & Processes
    • Application Security & SDLC
    • Data Classification
    • Data Privacy Controls
    • Orchestration and Automation experience in leveraging multiple security technologies via APIs, scripting, or platform features.
    • Proficient working knowledge with one or more data governance technologies that include but are not limited to: data discovery, classification, tagging, DLP solutions, encryption solutions including certificate management & HSMs, database and ERP security, and insider threat solutions. Specific experience working with tools such as Varonis, Proofpoint, and Thales.
    • Issues authoritative, publishable opinions on emerging technologies and trends
    • Demonstrated ability to guide teams through multiple vendors’ product strategies
    • Holds highest or multiple advanced vendor certifications
    • Contributes to or shapes industry standards
    • Personal

      Education and Experience:

      • Bachelor’s degree or equivalent experience; advanced degree preferred
      • 10 years of progressively successful career progression within an IT related industry.
      • Experience working in a high growth, fast paced, high speed environment and industry
      • Deep knowledge of the Security technology architecture (cyber security, firewalls, intrusion prevention, penetration testing, vulnerability assessments, network access solutions, etc.).