4+ Security architecture Jobs in Bangalore (Bengaluru) | Security architecture Job openings in Bangalore (Bengaluru)
Apply to 4+ Security architecture Jobs in Bangalore (Bengaluru) on CutShort.io. Explore the latest Security architecture Job opportunities across top companies like Google, Amazon & Adobe.

Job Description
Who we are looking for:
A Senior consultant with proven technical and consultative experience, fluent Japanese language proficiency, and expected to be strong in both technical and interpersonal skills. A Senior Consultant must be a proven self-starter with the ability to problem-solve, communicate, participate in diverse project teams from a technical perspective, and interface effectively with customers, vendor partners, and colleagues. You will actively contribute to improving operational efficiency on projects and internal initiatives. Deliver timely engagements and work closely with Practice Directors to drive training and education, career development, performance development, and collaboration across the team. In line with Optiv’s commitment to quality, you will confirm that work is of the highest quality as per Optiv’s quality standards, by reviewing the work provided by other members.
How you’ll make an impact:
• Comfortably deliver solo-based work or act as "point" for complex projects
• Acts as technical escalation point to assist other consultants
• Lead in creation, development and delivery of custom security solutions
• Lead security and compliance program-related development and implementation efforts
• Design, implement and educate on specific security processes
• Effectively provide knowledge transfer and post-engagement support activities as necessary
• Excellent team communicator
• Mentor less experienced consultants
• Maintain professional and technical knowledge by attending educational workshops; reviewing professional publications; establishing personal networks; participating in professional associations such as ISACA, ISC2 etc.
• Consistently complete administrative project tasks like time and expense entry, status reporting, and project completion reporting
• Support and occasionally lead practice related development efforts including training and awareness, performance development and cyber strategy accelerators
• Act as contributor in Optiv communities for solutions of focus.
Qualifications
• Bachelor's degree and related work experience
• Proven security architecture experience
• Strong knowledge of multiple security concepts and methods such as vulnerability assessments, data classification, privacy assessments, incident response, security policy creation, enterprise security strategies, architectures and governance
• Strong understanding of networking (TCP/IP, OSI model), operating system fundamentals (Windows, UNIX, mainframe), security technologies (firewalls, IDS/IPS, etc.) and application programming/scripting languages (C, Java, Perl, Shell)
• Strong understanding of regulatory requirements and compliance issues affecting clients related to privacy and data protection, such as PCI DSS, GLBA, Basel II, EU Data Protection Directive, International Cross Border, and U.S. State Data Privacy Laws
• Expert knowledge of using Microsoft Office
• Ability to build relationships with and influence other functional areas
• Well-developed negotiation skills
• Ability to build consensus
• Solid business acumen and basic project management expertise.
• Ability to manage multiple tasks in parallel
• Willingness to travel to meet client needs.
Good-to-Have Criteria
- Professional certifications such as CISSP, CISM, CISA, CEH, or equivalent
- Exposure to cloud security platforms (AWS, Azure, GCP)
- Experience in data privacy & cross-border compliance projects
- Advanced skills in automation, scripting, or security orchestration
- Previous consulting experience with global clients
- Participation in professional associations (ISACA, ISC2, etc.)
Mandatory Criteria:
- Need candidate having Fluent Japanese language proficiency.
- Need candidate from Cybersecurity companies Only.
- Certifications required by the candidate - (Either from given two) - ISO 27001 or CISSP
- Candidate should have experience in Security architecture & Consulting
- Candidate should have Strong expertise in networking, operating systems (Windows/UNIX/mainframe), firewalls, IDS/IPS
- Candidate should have Knowledge of scripting/programming languages (C, Java, Perl, Shell)
- Candidate should have Hands-on experience in vulnerability assessments, incident response, policy creation, governance
- Candidate should have Strong understanding of regulatory frameworks (PCI DSS, GLBA, Basel II, EU Data Protection, US State Privacy Laws)
- Candidate should have Excellent client-facing and stakeholder management skills
- Candidate should have Ability to mentor, lead projects, and work in diverse teams
- Candidate should be Willing to travel as per business/project requirements
As an Enterprise Security Architect you will join a growing organization to lead a modern enterprise security program. In this role the Architect will have responsibility for identifying, defining, developing, leading security technology strategy across a broad portfolio of IAM, Cloud, End Point, Network, Web security and related technology systems, and the assessment of new and emerging identity technologies at the very large enterprise scale.
As a senior member of the team you will engage and partner with senior leaders across the organization leveraging your extensive background in (managing / delivering / implementing / architecting) security technology combined with expertise in organizational and cross-functional communication to develop strategy, influence roadmaps, solution adoption, champion strategic opportunities / execution plans with the aim to improve security capabilities, reduce risk and position forward looking identity governance and security enhancements
• Responsible for defining an architectural vision and architecture for large complex solutions, which aligns with the enterprise architecture strategy, technology and platform choices
• Describes the solution intent and the associated operating environment, determining the primary systems/subsystems and their interfaces, defining non-functional requirements and architectural runway to support new epics/features and expand into new opportunities
• Ensures the solution is fit for purpose and use by working with stakeholders, vendors/service providers, and evaluating the impact of strategic design decisions
• Contributes to best practices, standard templates, and the architecture roadmap for defined domains.
• Creates endpoint/host, workplace productivity security reference architecture and design patterns for reusability.
• Contributes in the creation of the architecture roadmap of defined domains (Business, Application, Data and Technology) in support of the product roadmap
• Contributes to the development of best practices including standardized templates
• Works across business and technology to create the solution intent and architectural vision for large complex solutions and evolves it based on an emerging backlog
• Works with Product Manager/Owner to plan and prioritize technology focused backlog items for the architecture runway to enable business epics/features and expand into new opportunities
• Clarifies the architecture for the development teams to support implementation, and provides solution options to resolve any architectural impediments
• Performs design and code reviews to ensure all non-functional requirements for a solution are sufficiently met (e.g. security, performance, maintainability, scalability, usability, and reliability)
• The platform security architect must interpret business, technology and threat drivers, and develop practical security roadmaps to deal with these drivers.
• Develop blueprints and procedures to effectively secure company data against accidental or unauthorized modification, destruction or disclosure.
• Create and define the security architectures and roadmaps encompassing cloud architecture, access management, and monitoring.
• Design and develop data security architectures for cloud and cloud/hybrid-based systems.
• Align architectural design technical controls and solutions to industry best practices and guidelines (e.g., NIST CSF, CSA, CIS, OWASP)
What are we looking for?
We want strong collaborators who can deliver a world-class client experience. We are looking for people who thrive in a fast-paced environment, are client-focused, team oriented, and are able to execute in a way that encourages creativity and continuous improvement.
Requirements:
• 10+ years of hands-on experience with scoping, sizing, designing, architecting & building IAM solutions across various technologies, or demonstrated ability to meet job requirements through comparable work experience.
• Expert level knowledge of authentication/authorization standards, protocols, and frameworks such as FIDO, OpenID, SAML, OAuth, JWT, CA, X.509, MTLS, etc.
• Technical expertise and experience with Microsoft MFA, SailPoint, CyberArk, ForgeRock, Okta, Ping, Active Directory, Azure Active Directory, AWS, Google Cloud Platform, Microsoft Azure, and IDM integration across domains
• Solid understanding of Cloud concepts and hands on knowledge on Azure/AD or other cloud identity environments.
• Experience designing and implementing security services and tools applied to GCP, Azure and AWS
• Expertise with Data Loss Prevention and CASB strategies and solutions supporting security of critical SaaS solutions such as Office 365, etc.
• Experience with Hybrid cloud architectures and designs
• Must have experience with Internet Application Hosting architectures, best practices and related technologies to effectively protect externally facing applications
• Experience with DevSecOps process, Container technologies (Docker, Kubernetes), API Gateways, and other common web application technologies is preferred
• Strong knowledge of enterprise security concepts/frameworks and products, secure design principles and best practices
• Strong verbal and writing skills to develop technical documentation and presentations
• Experience in leading technical architecture and security design discussions
• Experience managing multiple multi-level stakeholder relationships
• Bachelors in Computer Science, Computer Engineering or related field
“Such other task that Company may assign you time to time”.
Security Monitoring and Operations (SIEM)
Security Solutions design and deployment
IDAM - Identity and Access Management Experience
Network Monitoring and Management Experience
VAPT - Vulnerability Assessment and Penetration Assessment
Experience on DLP and Endpoint Security
Knowledge on Encryption
Experience in performing Maturity Assessment for identifying the security gaps and recommending measures to fix the gaps
Experience in Audit controls and applying security measures (ISO, PCI etc..)
Knowledge in automation and scripting
