This job posting isn't available in all website languages


Information Security Operations Global Application Security Architect

Information Systems
EB00064882262 Requisition #
Apply for Job
Share this Job
Sign Up for Job Alerts

What you will do

The Johnson Controls Global Information Security (GIS) team is undergoing a transformation and expansion as Johnson Controls increases its cybersecurity resources and capabilities to address the increasing cybersecurity threat landscape.
Hosted in Boca Raton, FL, Milwaukee, WI, or Cork, Ireland, the Information Security Operations Global Security Architect is a position reporting into the Global Information Security Architecture and Engineering Manager with responsibility of assisting in development of standards, architectural tollgates, assessments and designs.
Is a key player and consultant in the development and implementation of global systems, with significant exposure to clients and interfaces within all levels of management and outside vendors. Serves as the lead on security application specification and design activities working closely with the regional Global Infrastructure groups, Business Unit I/T delivery organizations, the Identity Management, and other GI Architecture members. Manages the technology life cycle and maintains a life cycle matrix identifying current standards and future technology directions. Research, Validation and Evaluation of Identity management products to assist in defining strategy and deployment planning.
Responsible for maintaining a close working relationship with the Service Strategy, other GI/ IT organizations and business unit representatives in order to understand their requirements and technology needs. Builds a business relationship based on trust and earns the respect and confidence of the BU’s and regional I/T organizations.
Maintains an understanding of key Business Unit initiatives to provide effective consulting services, both solicited and unsolicited.
Ensures compliance with established architecture direction and standards. Works with Service Management and stakeholders to collect functional requirements and ensure the most effective solution is used. Works with Connectivity Platform Strategy and Engineering to understand current operational metrics, challenges and problems to adjust the architecture design accordingly.
Develops and maintains a close relationship with key vendors, suppliers and service partners. Maintains an understanding of relevant industry standards and directions to ensure key vendors, suppliers and service partners development plans include support for same.

How you will do it

The responsibilities of the Global Security Application Architect include, but are not limited to:
Acts as a senior level mentor to application development and support personnel for any/all issues regarding the design or use of security systems. This includes Enterprise Operational staff and Business Unit personnel.
Stays current on all enterprise and regional application development and implementation projects to maintain global standards and provide global continuity among regional development and support personnel.
Produces service level metrics consistent with current business requirements and defines the parameters and attributes to be monitored by Enterprise Operations tools.
Acts as liaison between Company and managed vendors to provide information on future projects, business requirements and technical concerns on initiated projects.
Stays abreast of current and evolving technologies in the application security area.
Manage and facilitate the design and implementation of secure applications in support of Enterprise and Business Unit applications.
Participates in or leads the design and implementation and reserves final approval of all interfaces.
Establishes security related standards, Define technology roadmaps, support requirements and management infrastructure.
Partner with IT and Risk Management to develop a comprehensive set of cyber-security policies and procedures governing hosted and SaaS environments.
Partner with IT and Risk Management to identify and obtain appropriate third party secure and risk certifications.
Establish repeatable, effective methodology for addressing security related customer inquiries whether direct or via RFP.
Develops enterprise level strategic plans and identifies key success factors; sets priorities and allocates the resources to achieve unit, division and corporate goals.
Defines, prioritizes, schedules and monitors multiple enterprise level technical projects, developing and maintaining comprehensive project plans/schedules (and uses same to provide senior management with accurate and complete status information).
Manages Global scope of security assessments
Adheres to all current Changes and Problem management policies and procedures.
Follow the Architecture analysis process, which consists on Research, Validation and Evaluation of all new initiatives, with phase gates reviews presented to all stakeholders during the process.
Ensures that third party solutions follow all Johnson Controls standards.
Acts as an internal consultant to BU’s and Infrastructure I/T.
Provides management with accurate and complete status information.

What we look for
The successful candidate will be a passionate information security professional with the ability to communicate to different business and IT leaders. The candidate will be able to execute the Information Security inventory management strategy defined by leaders. The candidate will demonstrate drive, intelligence, maturity, and energy and will be a proven team leader and security strategist. The candidate should have experience working with cloud technologies and securing them appropriately. The candidate will have experience designing and implementing applications following appropriate security models and standards.

A minimum bachelor’s degree in computer engineering, computer security or computer science discipline.
7-10 years of information security related experience working with teams in security operations, incident analysis, developing applications, securing cloud configurations and security applications.
Familiarity with network security methodologies, tactics, techniques and procedures.
Candidate must be able to react quickly, decisively, and deliberately in high stress situations.
Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, to technical and non-technical audiences at different seniority levels and interact with customers.
Highly motivated individual with the ability to self-start, prioritize, multi-task and work in a global team setting.
Ability to create and maintain good business relationships with counter parts, customers and external entities to achieve the security operations management goals

Ability to maintain a high level of discretion and personal integrity in the exercise of duties, including the ability to professionally address confidential matters
Experience with open source and commercial security management tools
Experience in the definition and implementation of strategic information security plans
Moderate knowledge of regulatory compliance requirements (PCI-DSS, HIPAA, FISMA, SOX)
Moderate knowledge in National Institute of Standards and Technology (NIST) as they apply to FISMA
Bachelor’s degree or related experience in Computer Science, Engineering or related discipline.
Strong experience with MS Visio, PowerPoint, MS Word and MS Excel.
A broad range of Identity Management, IT and Telecommunications knowledge desired, including experience with:
o Active Directory
o CA Siteminder
o Federation of Directories
o MS Identity Management
o Azure AD
o Centrify
o Various Provisioning systems, LDAP.
o Desktop: Microsoft Windows Client and Office systems, Workday, Peoplesoft, SAP

Desired Certifications (but not required):
Certified Information Systems Security Professional (CISSP) 

Certified Information Security Manager (CISM)
Certified Information Systems Auditor (CISA)
Certified Ethical Hacker (CEH)
Cisco Certified Network Professional (CCNP)
Server Platform Certifications (Microsoft MCP, MCSE, MCSA, Red Hat RHCS, RHCE)
Certificate of Cloud Security Knowledge (CCSK)

Previous Job Searches

My Profile

Create and manage profiles for future opportunities.

Go to Profile

My Submissions

Track your opportunities.

My Submissions

Similar Listings

Ireland, Ireland, Cork

📁 Information Systems

Requisition #: 1811119

Ireland, Ireland, Cork

📁 Information Systems

Requisition #: WD30057801323

View All Jobs