SlideShare a Scribd company logo
1 of 2
Senior SecurityArchitect/Engineer
Work withall teamsinTribune Medialeadingthe design,implementation,andoperationof enterprise-
wide securityarchitecturesaswell asresearching,developingandrecommendingarchitectural policies
and practices forcurrent andfuture securityinitiativesfromdefinitionphase throughimplementation
and operation.
RESPONSIBILITIES
• Evaluationof IT systems,appliances,anddevicesbeingproposedforuse withinthe
environmentandtheirabilitytomeetTribune Media’ssecurityrequirements,recommendingmitigating
controlsforidentifiedlimitationsandrisks.
• WorkingcloselywithotherTribune MediaEnterprise Architectstoensure securityrequirements
are addressedinall phasesof projectlifecycles.
• Design,implement,andoperate securitytoolsacrossthe Tribune Medianetwork
• Assistinginthe creationandmaintenance of enterprisesecuritypolicies,controls,andstandards
for technologiesdefinedwithinthe TribuneMediataxonomy.
• Assistinginidentifyingandassessingriskaspartof the overall RiskManagementprocess.
• Participatesinthe discovery,documentationandrefinementof businessrequirementsto
ensure alignmentwithtechnicallyviablesolutiondesigns.
• Subjectmatterexpertiseacrossapplications,data,database,middleware,network
(Intranet/Extranet/Internet),security,andclientplatform(Includingmobile) ITproductsandservices
• Designs,documentsandrecommendsimprovementstosecurityarchitectures,technologies,
and relatedsecuritycontrols.
• Developsandmaintainsthe securitytechnologyplanandroadmaptoprovide adefense in
deptharchitecture.
• Works withTribune Mediateamsonvulnerabilityassessmentandremediation.
• Providesguidance toprojectteamsregardingcomputingsystemornetworkconfigurationand
securitycontrols.
• Works withDevelopsandmaintainscomputingsystemandnetworkbuildstandards.
• Providesguidance andanalysisfortuningsecuritysystems’rules,alertingandreporting.
• Recommends, validates,maintainsandimplementsinformationsecuritystandards,guidelines
and procedurestoensure compliance withthe InformationSecurityprogram.
• Recommendsappropriateandcosteffectivecontrolstoaddressidentifiedsecurityarchitecture-
relatedrisks.
• Implementscomplexsecurityarchitecture projecttasksincludingprovidingrequirementsfor
designingandimplementingcomponentsof the InformationSecurityprogram.
• Interfaceswithexternal departmentsandvendorstoprovide expertlevel consultation
concerningInformationSecurityarchitecturesandthe,implementationandintegrationwithexisting
networkenvironments,applicationsandservices.
• Providesassistance tootherTribune MediateamsregardingInformationSecurityarchitecture
issuesandcontrols.
• Evaluatesthirdpartyproductsand servicestoverifythattheymeetsecuritystandardsandwill
integrate seamlesslyandsecurelyintothe TribuneMediacomputingarchitecture.
• Providesaleadershiprole inthe design,implementationandmaintenance of consistent
applicationandinfrastructure architecture securityprograms.
• Works withInternal auditandotherdepartmentstoensure securitycontrolsmeetregulatory
compliance suchasSOX,PCI, or HIPAA
• Ownsecurityadministrationforall SaaSapplications.
• Developedandsupportedall accesssecurityforWorkdayERPand HCM application.
• DevelopedsecuritysettingsforAnaplanbudgetingapplication.
• Maintainfull supportforWorkdayand AnaplanSecurity.
• Developedadd-onsforProcurementandUsertime trackingwithinWorkday.
• Review,test,andimplementall securityconfigurationinWorkdayforbothERP andHCM.
• Reviewall useraccessrequeststoensure noseparationof dutiesconflicts.
• Performbi-annual WorkdayuseraccessreviewandSeparationof Dutyreview.

More Related Content

Similar to Tribune Media Sec Architect

C_COHEN_RESUME
C_COHEN_RESUMEC_COHEN_RESUME
C_COHEN_RESUME
Carl Cohen
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systems
Tonex
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
Mark Simos
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security Engineer
Mark Long
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
360 BSI
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
· Technical security expert supporting the development and susta.docx
· Technical security expert supporting the development and susta.docx· Technical security expert supporting the development and susta.docx
· Technical security expert supporting the development and susta.docx
alinainglis
 

Similar to Tribune Media Sec Architect (20)

Irfan Ur Rehman
Irfan Ur RehmanIrfan Ur Rehman
Irfan Ur Rehman
 
C_COHEN_RESUME
C_COHEN_RESUMEC_COHEN_RESUME
C_COHEN_RESUME
 
The Netizen Approach to Security and Innovation
The Netizen Approach to Security and InnovationThe Netizen Approach to Security and Innovation
The Netizen Approach to Security and Innovation
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systems
 
SY0-701 Dumps | SY0-701 Preparation Kit
SY0-701 Dumps | SY0-701 Preparation KitSY0-701 Dumps | SY0-701 Preparation Kit
SY0-701 Dumps | SY0-701 Preparation Kit
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Specialist security enigneer
Specialist security enigneerSpecialist security enigneer
Specialist security enigneer
 
Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...Security Culture from Concept to Maintenance: Secure Software Development Lif...
Security Culture from Concept to Maintenance: Secure Software Development Lif...
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security Engineer
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
Engineering council uk guidance on security for engineers & technicians
Engineering council uk guidance on security for engineers & techniciansEngineering council uk guidance on security for engineers & technicians
Engineering council uk guidance on security for engineers & technicians
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise Architecture
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
CV_Rohit Garg
CV_Rohit GargCV_Rohit Garg
CV_Rohit Garg
 
· Technical security expert supporting the development and susta.docx
· Technical security expert supporting the development and susta.docx· Technical security expert supporting the development and susta.docx
· Technical security expert supporting the development and susta.docx
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 

Tribune Media Sec Architect

  • 1. Senior SecurityArchitect/Engineer Work withall teamsinTribune Medialeadingthe design,implementation,andoperationof enterprise- wide securityarchitecturesaswell asresearching,developingandrecommendingarchitectural policies and practices forcurrent andfuture securityinitiativesfromdefinitionphase throughimplementation and operation. RESPONSIBILITIES • Evaluationof IT systems,appliances,anddevicesbeingproposedforuse withinthe environmentandtheirabilitytomeetTribune Media’ssecurityrequirements,recommendingmitigating controlsforidentifiedlimitationsandrisks. • WorkingcloselywithotherTribune MediaEnterprise Architectstoensure securityrequirements are addressedinall phasesof projectlifecycles. • Design,implement,andoperate securitytoolsacrossthe Tribune Medianetwork • Assistinginthe creationandmaintenance of enterprisesecuritypolicies,controls,andstandards for technologiesdefinedwithinthe TribuneMediataxonomy. • Assistinginidentifyingandassessingriskaspartof the overall RiskManagementprocess. • Participatesinthe discovery,documentationandrefinementof businessrequirementsto ensure alignmentwithtechnicallyviablesolutiondesigns. • Subjectmatterexpertiseacrossapplications,data,database,middleware,network (Intranet/Extranet/Internet),security,andclientplatform(Includingmobile) ITproductsandservices • Designs,documentsandrecommendsimprovementstosecurityarchitectures,technologies, and relatedsecuritycontrols. • Developsandmaintainsthe securitytechnologyplanandroadmaptoprovide adefense in deptharchitecture. • Works withTribune Mediateamsonvulnerabilityassessmentandremediation. • Providesguidance toprojectteamsregardingcomputingsystemornetworkconfigurationand securitycontrols. • Works withDevelopsandmaintainscomputingsystemandnetworkbuildstandards. • Providesguidance andanalysisfortuningsecuritysystems’rules,alertingandreporting. • Recommends, validates,maintainsandimplementsinformationsecuritystandards,guidelines and procedurestoensure compliance withthe InformationSecurityprogram. • Recommendsappropriateandcosteffectivecontrolstoaddressidentifiedsecurityarchitecture- relatedrisks.
  • 2. • Implementscomplexsecurityarchitecture projecttasksincludingprovidingrequirementsfor designingandimplementingcomponentsof the InformationSecurityprogram. • Interfaceswithexternal departmentsandvendorstoprovide expertlevel consultation concerningInformationSecurityarchitecturesandthe,implementationandintegrationwithexisting networkenvironments,applicationsandservices. • Providesassistance tootherTribune MediateamsregardingInformationSecurityarchitecture issuesandcontrols. • Evaluatesthirdpartyproductsand servicestoverifythattheymeetsecuritystandardsandwill integrate seamlesslyandsecurelyintothe TribuneMediacomputingarchitecture. • Providesaleadershiprole inthe design,implementationandmaintenance of consistent applicationandinfrastructure architecture securityprograms. • Works withInternal auditandotherdepartmentstoensure securitycontrolsmeetregulatory compliance suchasSOX,PCI, or HIPAA • Ownsecurityadministrationforall SaaSapplications. • Developedandsupportedall accesssecurityforWorkdayERPand HCM application. • DevelopedsecuritysettingsforAnaplanbudgetingapplication. • Maintainfull supportforWorkdayand AnaplanSecurity. • Developedadd-onsforProcurementandUsertime trackingwithinWorkday. • Review,test,andimplementall securityconfigurationinWorkdayforbothERP andHCM. • Reviewall useraccessrequeststoensure noseparationof dutiesconflicts. • Performbi-annual WorkdayuseraccessreviewandSeparationof Dutyreview.