Security Architect Blockchain (Crypto, DLT, R3 Corda DAML, etc) HYBRID

at Harris Recruiting and Sourcing Solutions, LLC.
Published September 15, 2022
Location Tampa, FL
Category Default  
Job Type Full-time  

Description

JOB LOCATIONS ARE: Tampa, Dallas, Jersey City

JOB DESCRIPTION:

  • Responsible for providing highly advanced technical and analytical skills to the Technology Risk Management (Information Security) Office.
  • Under the supervision of the lead Director, the candidate will assist in advancing adoption of DLT/Blockchain initiatives to ensure secure design principles and architectures are followed.
  • This person will also be responsible for participating and leading internal and external working groups and alliances in developing standards and guidelines centered around security.
  • Additional responsibilities will be to conduct technical research when necessary to contribute to setting DLT security direction and strategy.
  • Assists others on own team, or other teams where applicable, on Blockchain security projects or security-relevant tasks on technical pro.

RESPONSIBILITIES:

      • A passionate leader with strong desire to learn and experiment with new technologies.
      • Knowledge of various consensus algorithms, public and private key cryptography, symmetric, hash functions, encryption/signatures.
      • Experience using cryptography material such as certificates for identity management in order to authenticate members, transactions etc.
      • Conduct detailed risk and security assessments for DLT solutions in scope to determine the feasibility of successful implementation.
      • Experience with Docker, Kubernetes, and other container orchestration solutions.
      • Experience and/or certifications with Amazon Web Services, Google Cloud Platform, or Microsoft Azure; namely choosing platform components and assembling application and runtime architecture.
      • Engage with technical teams in education /advocacy of security for proposed DLT solution. Ensure the proposed solution meets the corporate security controls and policy standards in creating & operating the applications.