Dir, Information Security - Architecture (Hybrid / Flex various BD at Becton, Dickinson and Company in Franklin Lakes, NJother related Employment listings - Franklin Lakes, NJ at Geebo

Dir, Information Security - Architecture (Hybrid / Flex various BD at Becton, Dickinson and Company in Franklin Lakes, NJ

Dir, Information Security - Architecture (Hybrid / Flex various BD locations) Job Description Summary Job Description BD is one of the largest global medical technology companies in the world and is advancing the world of health(TM) by improving medical discovery, diagnostics, and the delivery of care. BD is at the forefront of digital transformation and is leading the sectors of cloud computing, Internet of Things (IoT), Artificial Intelligence (AI) and big data analytics. However, with these technologies come additional security challenges and vulnerabilities. Reporting to the Senior Director of Information Security Engineering, the Director of Security Architecture serves as the strategic leader of security architecture efforts for the enterprise IT security, manufacturing/OT security and product security organizations. We are looking for a talented individual to lead a high-performing team of security architects creating cutting-edge security solutions and infrastructures that will make sure that BD medical devices, products, manufacturing, service, enterprise IT, and third-party partners are secure and resilient. The location of this position is flexible. You can work from any BD office or remotely.
Responsibilities:
Lead IT security, product Security and manufacturing/ OT security development architecture and strategy across BD business units and regions. Drive and influence BD business units in the design, build and deployment of BD products and systems with enterprise-class security. Establish focused Information Security Centers of Excellence (COE) in topics such as Cloud Security, Application Security, Zero Trust principles, etc. Foster innovation across the BD IT, product, manufacturing/ OT, and IoT security cybersecurity architecture. Direct the development of a target architecture roadmap and the generation of proposals that reflect requirements and platform capabilities needed to support the roadmap. Own all elements of people management, including developing and hiring a high-performing team. Education/
Experience:
Bachelor's degree in Information Systems, Computer Science, Engineering Degree or a combination of equivalent technical experience and education. Eight or more years of Information Security experience, including security architecture experience. Minimum of four years of Information Security leadership experience. Ability to identify and attract top Information Security talent at both the individual contributor and leadership levels. Experience in leading the implementation of Cloud security and solid understanding of best practices. Certified Information Systems Security Professional (CISSP), Cloud Security Certified Prof (CSSP) or any or technology specific certifications for Azure, AWS and Google preferred but not required. Working knowledge of a wide variety of cybersecurity technologies for architecture and testing relating to Multi-Factor Authentication, Passwordless Authentication, Digital Rights Management, PKI, Endpoint Protection, Mobile Device Management, Patch Management, Vulnerability Management, Security Incident and Event Management, Data Loss Prevention, and Zero Trust principles. Keywords:
Remote with Travel Duties can be performed from various BD locations Primary Work Location USA NJ - Franklin Lakes
Salary Range:
$250K -- $500K+
Minimum Qualification
IT Security, Technology ManagementEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.