Reporting to the Director, Risk Management, the Sr. Staff Infrastructure Security Architect is principally responsible for recommending and designing security solutions for the architecture of the Walt Disney Internet Group�s (WDIG�s) technical infrastructure. The position is responsible for designing enterprise-class infrastructure security solutions that include network security, operating systems security, and physical storage systems. The position stays current on technology trends, directions, and best practices, as they relate to I.T. infrastructure security.
task % of time spent Coordinate security reviews of all new network/system/storage infrastructure designs, based upon established security policies and standards. Identifies candidate infrastructure components for review through a combination of formal and informal means, including staff meetings, project documentation, and self-initiated meetings with Technical Operations staff. Ensures that the security strengths and weakness of new designs are assessed, either by coordinating with another member of the Risk Management department or by performing the work directly. Identify cost of implementation and ongoing deployment of recommendations. 25 Provide technical recommendations for improving the security architecture of existing infrastructure systems (network, operating systems, and storage systems). Identify cost of implementation and ongoing deployment of recommendations. 20 Consults with business units regarding changing business and technical plans to ensure that infrastructure security requirements are addressed early in a project�s life and in the program. 15 Advise business managers and technical personnel about the implementation of security requirements, especially infrastructure requirements relating to Personally Identifiable Information (PII). 15 Consults with senior management in times of an information security crisis to ensure that the crisis managed properly both internally and externally. 10 Stays current on technology trends and directions, as they relate to I.T. security. 10 Review logs and monitoring systems for signs of potential compromise. 5
QUALIFICATIONS FOR POSITION
� Bachelor�s degree in Computer Science, Information Systems, Engineering, or related major is required. Graduate coursework is desired. � Requires 5-15 years of full-time experience in I.T. security. � The candidate should be an active participant in the broader I.T. security community in a tangible and verifiable way. This participation could be in one of a number of security-related activities, such as: o an I.T. security email list o a professional association (leadership roles a plus) o security conferences o publications (publication of a technical security vulnerability is a plus) � The candidate must have very strong project management skills, including willingness and initiative to lead designated projects through to completion. � Exceptional communication skills are a plus. The candidate must project confidence in technical discussions and, when necessary, be able to defend his or her ideas.
SPECIFIC SKILLS REQUIRED
� The candidate should have the ability to design and review enterprise-class, high availability architectures for most of the following components: o Security Assessments o Firewalls o VPN Security o Intrusion Detection Systems o Windows NT/2000 o Oracle/SQL Server o Solaris, Linux � A basic understanding of TCP/IP networking and Windows security is required. � The ability to quickly learn and teach others new technologies is required. � Any of the following security certifications are a plus: CISSP, SSCP, or any GIAC certification (such as GCFW, GCUX, GCIA, GCIH, GCIA, GCWN). � Ability to travel. Travel is not expected to exceed 15% domestically. � The candidate must be able to successfully complete a criminal background investigation and a credit history check.