×
Register Here to Apply for Jobs or Post Jobs. X

Managing Software Engineer

Job in Chicago, Cook County, Illinois, 60290, USA
Listing for: Capgemini
Full Time position
Listed on 2025-12-25
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, IT Consultant, Network Security
Job Description & How to Apply Below

Job Description - Managing Software Engineer (054586)

Managing Software Engineer

The Senior Security Architect is responsible for thought leadership in enterprise initiatives that involve the latest business demands such as cloud computing, mobile, virtualization as well as tried and true techniques such as access control, encryption, networking, and host security. This individual will be collaborating with the business and other technologies experts to develop defense in depth security reference architectures, security architecture standards and frameworks spanning all layers of security from host, server, and network to application and data security.

Job Responsibilities
  • Identifies the need for new security technology solutions; designs, reviews and collaborates on the deployment of new solutions. Contributes to the development and implementation of security technology solutions for enterprise environments and architecture.
  • Participates in request for information/request for proposal (RFI/RFP) and vendor selection processes and leads the technical design of the deployment. Technologies might include:
    Database security;
    Enterprise encryption - application and whole disk;
    Authentication and Authorization systems such as two-factor, federated, single-sign-on, Active Directory/Light Weight Access Protocol (AD/LDAP);
    Cloud computing / virtualization;
    Container Security;
    Data leakage identification and prevention;
    Network/Wireless access controls;
    Intrusion Detection and Prevention;
    Security Incident and Event Management;
    Web application firewalls;
    Host based controls;
    Application gateway security controls;
    Voice over Internet Protocol (VOIP) security controls.
  • Acts as a subject matter expert on the implementation and capabilities of all existing security controls within WBA, particularly in the case of complex and complicated security issues.
  • Conducts system architecture reviews for new technology to ensure best practices, document security solutions, and enables re-use of processes.
  • Handles the ongoing documentation, development, implementation, and maintenance of processes, procedures, and services associated with architecture functions including ensuring requirements and deliverables are clearly defined.
  • Works with Operations teams to ensure security architectures are appropriately assessed and able to be supported.
  • Works with Engineering and Operations teams to implement new technologies and security solutions in alignment with industry best practice and commonly accepted principles of secure design.
  • Planning and implementing security controls over Azure infrastructure and implementing Single Sign On using AzAD, Application Proxy, B2C.
  • Experience with Active Directory, Azure Active Directory (AAD), AAD Connect
  • In-depth knowledge of security trust-based models, micro-segmentation architectures and IAM, authentication and access capabilities
  • Experience with the design and implementation of Azure AD hybrid identity, RBAC, PIM, Identity Protection, MFA, Azure App Proxy, SSO, and Condition Access
  • Strong understanding of Cloud Security Expertise in Azure Infrastructure operations security tools inclusive of:
    Security and Audit dashboard, Azure Resource Manager Templates, Azure Monitor, Azure Monitor Logs, Azure Security Center, Azure Application Gateway, RBAC for storage accounts, Shared Access Signatures(SAS), Storage Service Encryption, VPN Gateway, Azure Key Vault, Azure Site Recovery, Azure Active Directory (AAD), Single Sign-On(SSO), Condition Access, Azure Sentinel and Splunk SIEM ,Expertise in Infrastructure and data security.
Qualifications Basic Qualifications
  • Bachelor’s degree and at least 5 years of experience in Information Security and IT designing and implementing enterprise solutions OR a High School Diploma / GED and at least 7 years of experience Information Security and IT designing and implementing enterprise solutions.
  • Available to work on call during evenings, weekends, and holidays
  • At least 3 years of experience translating technical data into business impact information and experience analyzing and troubleshooting various IT Security technologies.
  • At least 3 years of experience managing…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary