Home > Dallas jobs > Dallas education jobs

Posted: Wednesday, January 31, 2018 8:11 PM

Requisition Id :

Position Summary:
Responsible for design and development of next:generation device:level communication protocol coupled with comprehensive system:level security technology for both hardware and software products associated with Professional Solutions.
Supervisory Responsibilities: Lead a global team 35 higly competent, senior software professionals.
Job Responsibilities:
:Responsible for design and development of next:generation device:level communication protocol for Professional Solutions.
:Define, develop and deploy comprehensive system:level security technology for hardware and software products associated with Professional Solutions.
:Perform Threat Assessment , analyze attack vectors, review security requirements, systems and software architectures from a security standpoint and provide guidance for required implementation for core technology and strategic projects
:Work with fellow Cyber Security Architects to define security requirements for cross:functional teams in developing systems.
:Define specs for security testing and acceptance criteria, Define routine code analysis checks, establish policy for fuzz testing and functional security testing and Review policy adherence throughout lifecycle.
:Review new security technologies, help select third party suppliers, and create solutions to effectively mitigate security theats/risks.
:Will have to solve complex cyber security challenges balancing between requirments, state of the art security technologies and cost.
:Leading a Team : Build and develop a strong global team of software and system specialists, responsive to the needs of our businesses. Ability to attract, retain and motivate best in class talent. Promotes and develops top talent, move or change incorrect talent when needed.
:Financial and Commercial Accumen : The individual must have demonstrated an ability to think beyond the technology itself and will understand key business drivers that ensure technology investment will provide substantial value or improvements to customers.
:Team Player : The successful individual will have deep and broad experience leading and managing a team and collaborate with business owners and technology peers. He/She will be able to effectively communicate, motivate, coach and develop technical excellence. Establish credibility throughout the organization and with Corporate Executive Management as an effective developer of solutions to business challenges.
Basic Qualifications:
:Master or Bachelors degree in Computer Science, Computer Engineering, Software Engineering, Electrical Engineering or a related technical discipline
:At least 5 years experience as a security architect for embedded systems
:At least 2 years of hands:on experience in either implementation of security mechanisms or reverse engineering of embedded systems
:Expertise in systems and Layer 2 network driver development.
:Expertise in networking protocols, OSI network stack, network design and switching protocols.
:Experience in software project mangment
:Experience in applied cryptography and design of crypto:based mechanisms
:Experience in handling various HW platforms and various operating systems
:Experience in working in a global corporate with diverse technology teams and customers
Preferred Qualifications:
:Software Development : 10+ years of experience in driving and leading software predevelopment and core development, understanding the needs of program and product execution : technical capability to guide strategically and manage resources : experienced in leading agile software development
:Business Acumen : Business acumen, to gauge not just what can be done but to know what can be profitable, is a key requirement for this role. The ability to manage near:term R and D costs/risks with long:term product commercialization is a critical requirement for this position.
:Communication Skills : While it is required this person to be technica


• Location: Dallas

• Post ID: 76389702 dallas is an interactive computer service that enables access by multiple users and should not be treated as the publisher or speaker of any information provided by another information content provider. © 2018