SAP NS2 Security Architect
Role details
Job location
Tech stack
Job description
This position requires access to customer data; Must be a U.S. citizen. SAP NS2 does not offer Visa sponsorship for this role. All internals must have manager's approval to transfer.
Candidates can be located anywhere but preference to an individual near one of our NS2 offices (Herndon, Newtown Square, Austin).
This role serves as a "hands-on" architect who will be responsible for interfacing with the engineering teams, gathering the security control implementations information for the technical controls and documenting their implementation in documentation such as High and Low Level Designs as well as contribute to the system SSP. Security architect will guide teams understanding between security and control requirements to technical implementation methods. Additionally, this role will assist with the security assessments, and continuous monitoring evidence.
The Security Architect Is responsible for the aligned and consistent architecture of a product, part of a product or a specific architecture subject (e.g. integration, software lifecycle). In the case architect is part of a central architecture team they will contribute to the aligned and consistent architecture strategy and/or target architecture of product line, product family, or a specific cross-product architecture subject (e.g. user interface strategy, platform strategy). The Security Architect evaluates architecture risks and estimates effort for business case or backlog item, prepares management decisions on these topics and aids in the evaluation and assessment of product systems. The architect will translate business and product requirements into technical requirements, models and software architectures.
GENERAL RESPONSIBILITES
- Collects and documents requirements and constraints with high impact on the architecture as basis for architectural decisions
- Is responsible for defining the product's architecture together with implementation team(s), drives alignment of architecture concepts and ensures documentation in architecture concept document(s).
- Identifies opportunities for reuse of architecture concepts or software parts and cross-team synergies
- Aligns architecture with stakeholders regarding architectural or technical dependencies
- Supports and advices product owner by ensuring technical and architectural feasibility, readiness, and compliance
- Is responsible for setting up collaboration with the developers/architects of the product team/implementation team(s) and contributes to all tasks of implementation team/product team
- Coaches and advises implementation team(s) on all aspects which have impact on the architecture, reviews design documents of implementation teams regarding compliance with ACD and relevant product line guideline
- Monitors implementation of the architecture concepts together with implementation team
- Implements software parts, typically related to infrastructure or architecture
- Proposes improvements and innovations for implementing a product but also in development processes and methodologies
- Gather information, architecture diagrams and implementation of the security controls through interfacing with the security engineering team
- Develop security documentation such as, but not limited to, High Level Designs, Low Level Designs, SSP, security plans, procedures, and processes
- Understand the intent of the SOC and FedRAMP moderate security controls, FISAM security controls and communicate as needed
- Assist with the SOC and FedRAMP or FISMA authorization to include, but not limited to, prep of operations team through training and mock interviews, update documentation as required, and support SOC and FedRAMP PMO/ Agency / CISO requests, Compensation Range Transparency : SAP believes the value of pay transparency contributes towards an honest and supportive culture and is a significant step toward demonstrating SAP's commitment to pay equity. SAP provides the annualized compensation range inclusive of base salary and variable incentive target for the career level applicable to the posted role. The targeted combined range for this position is 159800 - 271600(USD) USD. The actual amount to be offered to the successful candidate will be within that range, dependent upon the key aspects of each case which may include education, skills, experience, scope of the role, location, etc. as determined through the selection process. Any SAP variable incentive includes a targeted dollar amount and any actual payout amount is dependent on company and personal performance. Please reference this link for a summary of SAP benefits and eligibility requirements: SAP North America Benefits (https://www.sapnorthamericabenefits.com/en/public/welcome) .
AI Usage in the Recruitment Process
For information on the responsible use of AI in our recruitment process, please refer to our Guidelines for Ethical Usage of AI in the Recruiting Process (https://jobs.sap.com/content/Ethical_usage_of_AI_in_the_recruiting_process/?locale=en_US) .
Please note that any violation of these guidelines may result in disqualification from the hiring process.
Requirements
Bachelor's Degree in Computer Science / MIS / Information Technology, or equivalent experience in Information Security, Information Technology, or related technical discipline. A combination of equivalent work and life experience will be accepted in lieu of degree
- Minimum 7 years' Information Technology experience
- Experience with Cloud technologies, especially AWS and Azure, desirable
- Experience with SOC and/or FedRAMP and other authorization processes and risk management framework
- Experience in developing, evaluating, and implementing information security architectures, technologies, standards, and practices to secure applications and IT systems, desirable
- Experience in development of security architecture documentation such as High and Low Level Designs, SSP, policies, procedures, etc
- Flexible, self-motivated, and able to work independently in a fast-paced environment
- Excellent communication skills and the proven ability to work effectively with all levels of IT and business management.
- Skill in preparing and making written and oral presentations of complex technical nature.
- Demonstrated ability to coordinate multiple tasks
SPECIFIC TECHNICAL SKILLS DESIRED:
- Professional industry certifications in area of expertise.
- Knowledge of Best Practice and security guides (ex. NIST 800-53 rev 5, FedRAMP, SOC 1, SOC 2)
- ISC CISSP or ISACA CISM or equivalent certification