Search by job, company or skills

Latest Jobs, Job Vacancies, Recruitment - foundit Formerly Monster. Search 500,000 + Jobs openings . Apply online IT, Sales, Banking, Fresher, Walk-ins, Part time, Govt jobs, etc. on foundit Formerly Monster. Post your resume now!.

Security Architect

Deutsche Bank


    Job Description

    More Info

    Recruiter Info

10-15 Years
24 days ago
124 Viewed
4 Applied

Job Description

Security Architect

Position Overview

Job Title: Information Security

Location: Bangalore, India

Role Description

The Security Architect is a senior manager aligned to a division or function. Security Architect is responsible to enforce Information Security compliance within their area of responsibility in line with the CISO mandate and strategy as well as the bank's risk appetite. Furthermore, Security Architect are the experts and points of escalation for all IT security related aspects of the IT assets in their area of responsibility. They provide guidance on how to implement technical control aspects and achieve compliance to the related Information Security controls and ensure appropriate handling of any relevant exceptions. In close cooperation with the respective Chief BISOs they support the business divisions as well as the COO IT counterparts to comply with Security Controls

What we'll offer you

As part of our flexible scheme, here are just some of the benefits that you'll enjoy

  • Best in class leave policy
  • Gender neutral parental leaves
  • 100% reimbursement under childcare assistance benefit (gender neutral)
  • Sponsorship for Industry relevant certifications and education
  • Employee Assistance Program for you and your family members
  • Comprehensive Hospitalization Insurance for you and your dependents
  • Accident and Term life Insurance
  • Complementary Health screening for 35 yrs. and above

Your key responsibilities

  • Design, build and implement enterprise-class security systems for a production environment
  • Align standards, frameworks and security with overall business and technology strategy
  • Identify and communicate current and emerging security threats
  • Design security architecture elements to mitigate threats as they emerge
  • Create solutions that balance business requirements with information and cyber security requirements
  • Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
  • Use current programming language and technologies to writes code, complete programming and performs testing and debugging of applications
  • Train users in implementation or conversion of systems
  • Derive the IT Security strategy from the overall Chief Information Security Office (CISO) strategy and requirements and translates this into an operational plan for delivery for their area of responsibility
  • Act as point of escalation for IT Security issues and exceptions.
  • In relation to the IT Assets, processes within their scope of responsibility they:
    • Drive integration of Chief Information Security Office Initiatives, programs and central solutions and ensure alignment with the divisional portfolios.
    • Ensure effective and efficient communication, coordination and implementation of CISO IT Security requirements and decisions
    • Are responsible for the adoption of centrally mandated Security Solutions and the maintenance of technical security documentation and compliance to security controls.
    • Are the recognized expert in DB Information Security Policies and procedures and their implementation in relation to technologies.
    • Proactively manages IT audits and plan (in co-operation with COO IT management) preparation and remediation.
    • Ensure appropriate senior management awareness/oversight of follow-up on action items to resolve identified issues, e.g. information security reviews of vendors, audit issue resolution.
    • Spearhead independent reviews of IT Security Controls, prioritise identified issues and assesses remediation actions for quality, considering the optimal cost-risk ratio as well the strategically optimal resolution (e.g. Information Security control evaluation and respective follow up activities).
    • Verify remediation concepts for critical and systemic issues and monitors their execution according to plan and with quality.
  • Partner with key stakeholders (Chief BISOs and IT management etc.) to act as mediator and subject matter expert for them on Information Technology Security topics. Ensure a common understanding of Information Technology Security risks and their implications for the Group and for their scope of responsibility.

Your skills and experience

Experience of 10-15 years in:

  • Security architecture, demonstrating solutions delivery, principles and emerging technologies - Designing and implementing security solutions. This includes continuous monitoring and making improvements to those solutions, working with an information security team.
  • Consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements.
  • Security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks.
  • Identity and access management (IAM) - the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources.

Experience with and knowledge of:

  • VB.NET, Java/J2EE, ColdFusion, API/web services, scripting languages and a relational database management system (RDBMS) such as MS SQL Server or Oracle. These are some of the technical elements needed to build security into an organization.
  • ISO27001 - specifications for a framework of policies and procedures that include all legal, physical and technical controls involved in an organization's risk management
  • Control Objectives for Information and Related Technologies (COBIT)
  • Windows and UNIX environment.

General skills include:

  • Exceptional communication skills with diverse audiences - Strong critical thinking and analytical skills
  • Strong leadership, project and team-building skills, including the ability to lead teams and drive projects and initiatives in multiple departments
  • Demonstrated ability to identify risks associated with business processes, operations, information security programs and technology projects
  • The ability to be the enterprise security subject matter expert who can explain technical topics to those without a technical background


  • Degree in Information Security or a comparable education
  • In addition, the following education/certification attainment will be beneficial:
    • CISSP (Certified Information Systems Security Professional) or equivalent.
    • ISSMP (Information Systems Security Management Professional).
    • CISM (Certified Information Security Manager) or equivalent.

Key Business Competencies - Proficiency Level (1 to 5)

  • Business Strategy : 5
  • Change Leadership : 5
  • Financial Management : 5
  • Industry Knowledge : 5
  • Managing Complexity : 5
  • Product Knowledge (internal/external) : 5
  • Risk Management : 5

Key Technical Competencies - Proficiency Level (1 to 5)

  • Business Analysis : 5
  • Client Services : 5
  • Operational Management : 5
  • Process Development & Management : 5
  • Quality Management : 5
  • Vendor/Contract Management : 4

How we'll support you

  • Training and development to help you excel in your career
  • Coaching and support from experts in your team
  • A culture of continuous learning to aid progression
  • A range of flexible benefits that you can tailor to suit your needs

About us and our teams

Please visit our company website for further information:

Our values define the working environment we strive to create - diverse, supportive and welcoming of different views. We embrace a culture reflecting a variety of perspectives, insights and backgrounds to drive innovation. We build talented and diverse teams to drive business results and encourage our people to develop to their full potential. Talk to us about flexible work arrangements and other initiatives we offer.
We promote good working relationships and encourage high standards of conduct and work performance. We welcome applications from talented people from all cultures, countries, races, genders, sexual orientations, disabilities, beliefs and generations and are committed to providing a working environment free from harassment, discrimination and retaliation.

Visit to discover more about the culture of Deutsche Bank including Diversity, Equity & Inclusion, Leadership, Learning, Future of Work and more besides.


At Deutsche Bank, we give original thinkers the space and support they need to shine. Merging local knowledge with global vision, in-depth insight with industry-leading digital expertise, if you&#8217&#x3B;re an innovator by nature, we can help you to unleash your potential.
We see things differently at Deutsche Bank &#8211&#x3B; and we&#8217&#x3B;re proud of our fresh perspective. Today, we&#8217&#x3B;re driving growth through our strong client franchise, investing heavily in digital technologies, prioritising long-term success over short term gains, and serving society with ambition and integrity.
Wherever your interests lie &#8211&#x3B; in investment banking, trading, private wealth, asset management, retail banking - or many of the infrastructure functions that support them &#8211&#x3B; you&#8217&#x3B;ll discover resources, training and opportunities designed to keep you ahead of the curve.
Intelligence has no boundaries: we welcome high-achieving, talented individuals from any background.


Similar Jobs

Information Security Architect

Company Name Confidential

Network Security Architect

Company Name Confidential

People also considered

DelhiBengaluru / BangaloreNoidaMumbaiHyderabad / Secunderabad Telangana
Last Updated: 13-06-2024 07:29:17 PM
Beware of Scammers

We don’t charge money for job offers