Security Architect

Accenture logo


View Salaries, Reviews, and more  

Job Summary

โ‚น113,043 - โ‚น147,684 / Monthly EST

Job Type


Years of Experience
Information not provided

Tech Stacks

Job Description

Project Role : Security Architect

Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations.

Must have skills : Security Information and Event Management (SIEM) Operations

Good to have skills : Excellent Communication Skills

Minimum 3 Year(s) Of Experience Is Required

Educational Qualification : Bachelor or college degree in related field or equivalent work experience

Summary: As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve documenting the implementation of the cloud security controls and transitioning to cloud security-managed operations. Roles & Responsibilities: - Lead the development and implementation of cloud security controls and architecture. - Collaborate with cross-functional teams to ensure the cloud security framework meets business requirements and performance goals. - Document the implementation of cloud security controls and transition to cloud security-managed operations. - Provide technical guidance and support to the security operations team. Professional & Technical Skills: - . Log Collection and Management Log Aggregation: Collect logs from various sources such as servers, network devices, applications, and security appliances. Normalization: Convert log data into a standard format for easier analysis. Storage: Ensure logs are stored securely and in compliance with data retention policies. 2. Monitoring and Detection Real-time Monitoring: Continuously monitor network traffic, system activities, and security events. Correlation Rules: Implement and manage rules to correlate different events and detect potential threats. Alerting: Configure alerts for suspicious activities or anomalies detected in the network. 3. Incident Response Triage and Analysis: Analyze alerts to determine the severity and potential impact of the incident. Investigation: Conduct thorough investigations to understand the nature and scope of the incident. Response Actions: Implement containment, eradication, and recovery measures to handle the incident. 4. Threat Intelligence Integration Threat Feeds: Integrate external threat intelligence feeds to enhance detection capabilities. Threat Hunting: Proactively search for threats based on the latest threat intelligence and internal data. 5. Reporting and Compliance Reporting: Generate regular reports on security events, incidents, and trends for management and compliance purposes. Compliance: Ensure SIEM operations align with regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS). 6. System Maintenance and Tuning Regular Updates: Keep the SIEM system and its components up to date with the latest patches and updates. Performance Tuning: Optimize the performance of the SIEM system to handle large volumes of data efficiently. Rule Management: Regularly review and update correlation rules to improve detection accuracy and reduce false positives. 7. User Training and Awareness Training: Provide training to security analysts and other stakeholders on using the SIEM system effectively. Awareness Programs: Conduct awareness programs to keep users informed about the latest security threats and best practices. 8. Collaboration and Communication Team Coordination: Work closely with other IT and security teams to ensure cohesive security operations. Incident Communication: Maintain clear and effective communication during incidents, both internally and with external parties if necessary. Tools and Technologies SIEM Platforms: Use platforms like Splunk, IBM QRadar, ArcSight, or LogRhythm for SIEM operations. Integration: Ensure seamless integration with other security tools such as firewalls, IDS/IPS, endpoint security solutions, and threat intelligence platforms. Best Practices Automation: Implement automation for repetitive tasks to improve efficiency and reduce human error. Regular Audits: Conduct regular audits of SIEM operations to identify and address gaps. Continuous Improvement: Stay updated with the latest security trends and continuously improve SIEM processes and technologies. - Additional Information: - The candidate should have a minimum of 3 years of experience in Security Information and Event Management (SIEM) Operations. - The ideal candidate will possess a strong educational background in computer science, information technology, or a related field, along with relevant certifications such as CISSP, CISM, or CCSP. - This position is based at our Gurugram office.

Bachelor or college degree in related field or equivalent work experience

Interview Questions of Security Architect at Accenture

Interview questions from Accenture that are similar to Security Architect
View more interview questions from Accenture โ†’
banner icon
Prepare For Your Interview in 1 Week?
Equip yourself with possible questions that interviewers might ask you, based on your work experience and job description.
Get Started!

Achieve your dream job with our top-notch tools!

Resume Checker Illustration

Resume Checker

Our free resume checker analyzes the job description and identifies important keywords and skills missing from your resume in just a minute!

Check Now
Interview Preparation Illustration

AI InterviewPrep

Utilizing advanced AI, our tool generates tailored interview questions based on your industry, role, and experience. Practice and receive feedback on your answers in real time!

Check Now
Resume Builder Illustration

Resume Builder

Let us show you the differences between a bad, good, and great resume, and guide you in building a resume that helps you stand out to employers, ensuring you land your next position faster!

Check Now