Understands existing application architectures including associated product vendors, application requirements, configurable settings, application interfaces, associated data flows, compatibility and interoperability risks. This role understands current architectures and develops potential new and/or augmented architecture focusing on areas such as privileged user access, identities and access, data classification, etc.
Supports cyber assurance audits and assessments and delivers and ensures security of new functionality. Ensures only secure, trusted code is implemented, that gold images are managed, that PKI and key management strategies are properly designed and implemented, and that recovery mechanisms are architected and properly implemented. Develops workflows and user roles for role-based security and determines required user access to networks and devices.
Develops application concepts and works on the capabilities needed for all phases of the development life cycle; translates technology and environmental conditions (e.g., law and regulation) into application architecture and security designs and processes. Ensures that the stakeholder security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of application architecture.