Job Description
Description
Be a part of something powerful at America's leading energy provider!
At Exelon, our people are the heart and soul of our business. Whether it's powering lives, supporting communities or collaborating with colleagues, an Exelon employee is talented, compassionate, forward-thinking and inspired. We are a Fortune 200 company united by our values and shared vision for a cleaner and brighter future. We encourage curiosity, value diverse perspectives and we never stop looking for ways to be, work and do better. We know the future is in our hands. That's why we're looking for people like you, who have the power to make a difference.
As the nation's largest utility company, we serve more than 10 million customers through six fully regulated transmission and distribution utilities -- Atlantic City Electric (ACE), Baltimore Gas and Electric (BGE), Commonwealth Edison (ComEd), Delmarva Power & Light (DPL), PECO Energy Company (PECO), and Potomac Electric Power Company (Pepco). All 18,000 of us are committed to delivering safe, reliable and affordable energy to our customers, strengthening our communities, supporting a clean energy future and reducing our impact on the changing climate.
Our people are empowered to evolve and advance their careers in an open and inclusive environment. We pride ourselves on being the kind of place where people want to come, stay and grow -- whether that's in the role and path they start in or in new and exciting career opportunities across our business. We know that investing in our employees' futures strengthens ours, which is why we offer competitive compensation, incentives, opportunities for career path changes, and health and retirement benefits.
PRIMARY PURPOSE OF POSITION
The Principal Cyber Security Architect (PCSA) partners with IT/OT and business teams to provide expert leadership to drive security technology and security reference architecture solutions by weighing the advantages of security technology standards, market availability of products, and risks and benefits of security technology introduction into Exelon's computing environments. The PCSA provides comprehensive consultation to business units and IT/OT management and staff at the highest technical level for all aspects of the security architecture domain. The PCSA develops and maintains business, systems, and IT/OT processes to support enterprise mission needs and requirements; translates technology and environmental conditions (e.g., law and regulation) into IT/OT rules and requirements that describe baseline and target security architectures. The PCSA designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes. The PCSA operates independently with little or no direct supervision.
PRIMARY DUTIES AND ACCOUNTABILITIES
- Provide technical and security expertise to IT/OT and business teams to identify security technology solutions and develop security reference architectures and strategies to achieve business results. Ensure appropriate implementation of security technology and reference architectures within both the development and production environments. Analyze user needs and requirements to plan architecture. (30%)
- Design and develop enterprise-wide security architecture and strategy for all aspects of the security domain in alignment with the business strategy and goals. Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements. Provide input on security requirements to be included in statements of work and other appropriate procurement documents. (20%)
- Provide technical guidance and security expertise in the areas of secure application development, security architecture risk management and assessment, security policies and standards, security architectures and implementations. (20%)
- Provide technology and security expertise and advice to IT/OT leadership in the development of strategic security technology and plans to support business strategies. Translate proposed capabilities into technical requirements. (10%)
- Establish, maintain, and enhance relationships with business and IT/OT partners. Communicate status to key stakeholders on a regular basis. (10%)
- Maintain awareness of trends and issues in area of security expertise, evaluate new security technologies or technology opportunities, and provide analysis of their potential impact to advantage the business. (10%)
JOB SCOPE
The Principal Cyber Security Architect (PCSA) provides cyber and information security architecture expertise in the analysis, assessment, development, and evaluation of security solutions and architectures to secure applications, operating systems, databases, and networks. The PCSA develops security architecture requirements, conducts security architecture risk assessments, designs security solutions, evaluates application and system architectures, and develops and reviews appropriate security architecture policies and standards. The PCSA leads and manages the cyber and information security architecture aspects of IT/OT and business initiatives and projects to assist in mitigating security risks for operational applications and systems. This role serves as a senior technical staff member who provides technical cyber and information security architecture expertise and guidance to team members and collaborates with other IT/OT teams to address and resolve security issues.
Qualifications
MINIMUM QUALIFICATIONS
- Bachelor's Degree in Computer Science, Information Technology (IT), or a related discipline, and typically 8 or more years of solid, diverse experience in cyber security architecture and design, or equivalent combination of education and work experience.
- Appropriate technical skills and in-depth knowledge of business unit functions and applications, including: � Expert knowledge of authentication, authorization, and access control methods. � Expert knowledge of computer algorithms � Expert knowledge of encryption algorithms � Expert knowledge of cryptography and cryptographic key management concepts � Expert knowledge of database systems � Expert knowledge of embedded systems � Expert knowledge of system fault tolerance methodologies � Expert knowledge of how system components are installed, integrated, and optimized � Expert knowledge of human-computer interaction principle � Expert knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) � Ability to design architectures and frameworks � Skill in applying cybersecurity methods, such as firewalls, demilitarized zones, and encryption � Expert knowledge of network access, identity, and access � Expert knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services � Expert knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs � Expert knowledge of parallel and distributed computing concepts � Expert knowledge of key concepts in security management (e.g., Release Management, Patch Management). � Expert knowledge of configuration management techniques � Expert knowledge of cloud computing
- Comprehensive understanding of change management techniques associated with new technology implementation.
- Demonstrated experience producing an economic business case.
- Demonstrated leadership ability.
- Proven analytical, problem solving, and consulting skills.
- Excellent communication skills and the proven ability to work effectively with all levels of IT and business management.
PREFERRED QUALIFICATIONS
- ICS Security, Real-Time Systems Security, OT Security
- Graduate degree in cyber security or related area of expertise.
- Relevant security certifications (CISSP, CISM, CRISC, SABSA, GIAC, GICSP, GRID)
- Appropriate technical skills and in-depth knowledge of business unit functions and applications, including: � Demonstrated experience and subject matter knowledge in cyber and information security for applications, web architectures, operating systems, databases, and networks. � Demonstrated experience and subject matter knowledge of SCADA, ICS, Distribution Automation, Smart Grid, DMS, and ECS systems architecture. � Experience and proven capabilities in application risk assessment, application security architecture development, web application security, and application security testing. � Demonstrated experience in security architecture risk assessment, requirements development, secure design analysis, architecture assessment and development, and security testing of applications and systems. � Extensive experience developing, evaluating, and implementing cyber and information security architectures, technologies, standards, and practices to secure applications and IT systems. � Demonstrated knowledge and experience in the implementation of governance frameworks and security risk management processes, such as NIST, ISO, and COBIT guidelines and standards. � Demonstrated experience in addressing regulatory compliance for the security requirements in applicable laws and regulations, such as NERC CIP, SOX, PCI DSS, and HIPAA. � Solid understanding and experience with security development lifecycle (SDL) processes for internally developed applications, including the web-based and Internet facing components. � Expert knowledge and experience in application security standards, methodologies, and technologies. � Solid capability to assess application and web architectures and operating systems for vulnerabilities and develop appropriate security countermeasures. � Solid knowledge and experience with IT security aspects of operating systems, Active Directory, database (SQL) access, LDAP, Microsoft SharePoint, and web server configurations. � Experience in assessing, configuring, and testing security applications and systems, such as Cisco firewalls, security appliances, IDS/IPS, SSL or TLS, IPSec, and web services security. � Ability to demonstrate analytical skills, technical knowledge, and practical application of cyber and information security principles to business leaders and technical staff.