H3What does a Solution Architect do?brWe asked our colleague Benoit what his typical day looks like. /h3h3Description /h3ulliThe role of an INNOCOM ESA is helping our clientstranslate and implementtheirsecuritystrategy.This is done bydeveloping and maintaining a security strategy plan and roadmap that enables the client to develop and implement security solutions and capabilities that are clearly aligned with businessstrategyand technology. /liliThey ensure the EnterpriseSecurityArchitecture iscontinuouslyaligned to the business Strategy, Business Operating Model and IT strategy. /liliThe INNOCOM ESAwill track developments and changes in the digital business of our clients to ensure that these are adequately addressed in security strategy plans and architecture artifacts. /liliFurthermore the INNOCOM ESA will conduct security assessments, be actively involved in developing security standards and practices, thedesign of security capabilities and modelling,play a key role in reviewing security technologies, tools and services, liaise with enterprise architects, other security architects and security practitioners to share best practices and insights. /li /ulh3Experience /h3ulliExcellent oral and written English, Dutch and/orFrench communication skills. /liliAt least 5years’ experiencewith enterprisesecurityarchitecture within a corporate environment. /liliStrong technical experience of developing security architectures that enable a digital transformation within a business. /liliUnderstanding of key IT disciplines e.g., strategy, governance, software delivery, … /liliPractical experience with Architecture service definition and governance including Innovation, IT Strategy, Portfolio Planning, Budget, Solution Architecture /liliExperience in using architecture methodologies such as SABSA, Zachman and/or TOGAF.Methodsfor risksidentification analysis,models forcyber adversary behaviorandsecurity threats. /liliGood working knowledge ofmanaging security infrastructures— e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs),Endpoint protection,Monitoring and Detection,SIEM and log management technology) /liliGood knowledge of IAM technologies and services /liliGood knowledge of Cloud Security Architecture andTechnologies /liliGood knowledge of Cyber Security (Threat Modelling, Penetration testing, Risk Management, Cyber Defense Operations, Security Governance, Business resilience ) /li /ulh3Profile /h3ulliOpen honest, highly energetic and intrinsically motivated. /liliA fast learner, able to absorb new skills and quickly adapt to new contexts /liliCapable to build trusted relationships with senior management. /liliExtremely customer focused, able to adapt quickly to new environments, connect easily with people and context. /liliA conceptual, creative and critical thinker. /liliPassionate about change and eager to push it forward while managing expectations. /liliA natural communicator, able to explain complex topics in understandable language to different stakeholders(ability to communicate complex technical issues to non-technical stakeholders) /liliAble to create impact /liliCapable of leading a team /liliA team player able to support the learning of others and initiate improvement /liliA role model and ‘go to person’ with high emotional intelligence /li /ulh3strongContact us /strong and have a chat about joining us, strongor apply below? /strong /h3 #J-18808-Ljbffr