Gathering your results ...
3 days
Not Specified
Not Specified
Not Specified
<p>Who We Are</p> <p>Through our service brands Hyundai Motor Finance, Genesis Finance, and Kia Finance, Hyundai Capital America offers a wide range of financial products tailored to meet the needs of Hyundai, Genesis, and Kia customers and dealerships. We provide vehicle financing, leasing, subscription, and insurance solutions to over 2 million consumers and businesses. Embodying our commitment to grow, innovate, and diversify, we strive to reimagine the customer and dealer experience and launch innovative new products that broaden our market reach. We believe that success comes from within and are proud to support our team members through skill development and career advancement. Hyundai Capital America is an Equal Opportunity Employer committed to creating a diverse and inclusive culture for our workforce. We are a values-driven company dedicated to supporting both internal and external communities through volunteering, philanthropy, and the empowerment of our Employee Resource Groups. Together, we strive to be the leader in financing freedom of movement.</p> <p>We Take Care of Our People</p> <p>Along with competitive pay, as an employee of HCA, you are eligible for the following benefits:</p> <ul> <li>Medical, Dental and Vision plans that include no-cost and low-cost plan options </li><li>Immediate 401(k) matching and vesting </li><li>Vehicle purchase and lease discounts plus monthly vehicle allowances </li><li>Paid Volunteer Time Off with company donation to a charity of your choice </li><li>Tuition reimbursement </li></ul> <p>What to Expect</p> <p>The Sr. Cybersecurity Architect will be responsible for designing, implementing, and maintaining comprehensive cybersecurity architecture to protect the organization's financial systems, customer data, and infrastructure. Reporting to the Sr. Manager, Security Engineering & Architect, this role will focus on creating secure-by-design solutions for networks, cloud environments, endpoints, and applications, with an emphasis on Identity and Access Management (IAM), Data Loss Prevention (DLP), and compliance with financial regulations (e.g., PCI DSS, GDPR, Korean SOX, FFIEC).</p> <p>What You Will Do</p> <ol> <li>Cybersecurity Architecture Design: </li></ol> <ul> <li>Secure Architecture Development: Design and implement scalable, resilient cybersecurity architecture for on-premises, cloud (e.g., AWS, Azure, Google Cloud and Oracle Cloud), and hybrid environments, ensuring alignment with zero-trust principles and financial security requirements. Support the long-term HCA Cybersecurity Technology Roadmap Strategy. </li><li>Network Security: Architect secure network configurations, including firewalls (e.g., Palo Alto), intrusion detection/prevention systems (IDS/IPS), and secure gateways, to protect financial transactions and data flows. </li><li>Cloud Security: Develop cloud-native security architectures, leveraging tools like AWS IAM, Azure Security Center, and native encryption to secure multi-cloud and hybrid environments. </li><li>Endpoint and Application Security: Design endpoint protection (e.g., CrowdStrike, Netskope, etc.) and secure application architectures, integrating with DevSecOps pipelines for financial applications. </li></ul> <ol start="2"> <li>Integration with IAM and DLP: </li></ol> <ul> <li>IAM Architecture: Collaborate with the IAM team to design and integrate identity and access management solutions (e.g., SailPoint, CyberArk), implementing role-based access control (RBAC), multi-factor authentication (MFA), and privileged access management (PAM). </li><li>DLP Integration: Work with the DLP team to incorporate data loss prevention controls (e.g., Symantec DLP, Microsoft Purview) into architectural designs, ensuring protection of sensitive financial data (e.g., PII, payment card data) across endpoints, networks, and cloud. </li><li>Zero-Trust Framework: Architect IAM and DLP solutions within a zero-trust model, enforcing least privilege and continuous verification for all users, devices, and applications. </li></ul> <ol start="3"> <li>Threat Modeling and Risk Management: </li></ol> <ul> <li>Threat Modeling: Conduct threat modeling and risk assessments to identify vulnerabilities in financial systems, applications, and third-party integrations, proposing mitigations to reduce risk. </li><li>Security Controls: Collaborate with Information Protection Governance team to define and implement security controls based on industry standards (e.g., NIST 800-53, CIS Benchmarks, ISO 27001) to address financial threats like ransomware, phishing, and insider fraud. </li><li>Penetration Testing Support: Collaborate with penetration testing teams to validate architectural designs and remediate identified weaknesses. </li></ul> <ol start="4"> <li>Compliance and Regulatory Alignment: </li></ol> <ul> <li>Regulatory Compliance: Ensure cybersecurity architecture meets financial regulations (e.g., PCI DSS, GDPR, Korean SOX, FFIEC, NYDFS) through secure design, documentation, and audit-ready configurations. </li><li>Policy Development: Contribute to the development of cybersecurity policies and standards, ensuring architectural designs align with regulatory and organizational requirements. </li><li>Vendor Evaluation: Assess third-party vendors and Managed Security Service Providers (MSSPs) for compatibility with architectural designs and compliance needs. </li></ul> <ol start="5"> <li>Collaboration and Innovation: </li></ol> <ul> <li>Cross-Functional Collaboration: Partner with IT Infrastructure and IT Application teams, DevOps, IAM, DLP, Security Operations, Information Protection Governance and business units to integrate security into digital transformation initiatives, such as cloud migrations, fintech innovations, and core banking systems. </li><li>Technology Evaluation: Research and evaluate emerging cybersecurity technologies (e.g., AI-driven threat detection, passwordless authentication) to enhance architectural resilience and efficiency. </li><li>Automation and Orchestration: Design automated security workflows using tools like SOAR platforms (e.g., Splunk SOAR, Palo Alto Cortex) to improve incident response and operational efficiency. </li><li>Knowledge Sharing: Mentor junior architects and engineers, sharing best practices and fostering a culture of security awareness across the organization. </li></ul> <ol start="6"> <li>Documentation and Reporting: </li></ol> <ul> <li>Architecture Documentation: Create and maintain detailed architectural diagrams, design documents, and runbooks to support implementation, audits, and incident response. </li><li>Executive Communication: Present architectural designs, risk assessments, and recommendations to the Director of Cybersecurity, CISO, and senior leadership, articulating business impacts. </li><li>Metrics and Validation: Develop metrics to validate architectural effectiveness (e.g., threat detection coverage, compliance adherence) and drive continuous improvement. </li></ul> <p>What You Will Bring</p> <ul> <li>Minimum 8 years progressive experience in cybersecurity with proven knowledge in cybersecurity architecture or engineering role designing secure systems. </li><li>3 years of experience in financial services, with a strong understanding of financial threats (e.g., fraud, data breaches) and regulations (e.g., PCI DSS, Korean SOX, GDPR). </li><li>Hands-on experience architecting secure network, cloud, endpoint, and application environments in complex, regulated industries. </li><li>Proven track record of integrating IAM (e.g., SailPoint, CyberArk) and DLP (e.g., Symantec DLP, Microsoft Purview) into cybersecurity architectures. </li><li>Bachelor's degree in computer science, Information Security, or related field; Master's degree preferred </li><li>At least one of the following: CISSP, CCSP, CISM, TOGAF, or equivalent. </li><li>Cloud security certifications (e.g., AWS Certified Security, Azure Security Engineer) are a plus </li></ul> <p>Technical Skills:</p> <ul> <li>Technical expert with deep experience in financial services, a strategic mindset, and the ability to align cybersecurity architecture with business objectives. </li><li>Expertise in network security (e.g., firewalls, IDS/IPS, VPNs), cloud security (AWS, Azure, Google Cloud, Oracle Cloud), and endpoint protection (e.g., CrowdStrike). </li><li>Proficiency in IAM frameworks (RBAC, MFA, PAM) and DLP technologies (data classification, policy enforcement). </li><li>Knowledge of security frameworks such as NIST, ISO 27001, and COBIT. </li><li>Strong knowledge of SIEM (e.g., Splunk), SOAR, and threat intelligence platforms for architectural integration. </li><li>Experience with secure software development lifecycles (SDLC) and DevSecOps practices. </li><li>Familiarity with automation and scripting (e.g., Python, PowerShell, Terraform) for infrastructure-as-code and security orchestration. </li><li>Knowledge of financial systems (e.g., core banking platforms, payment gateways) and their security requirements. </li></ul> <p>Soft Skills:</p> <ul> <li>Strong problem-solving skills to address complex architectural challenges. </li><li>Excellent communication skills to articulate technical concepts to technical and non-technical stakeholders. </li><li>Strategic thinker with the ability to align cybersecurity architectures with business and regulatory goals. </li></ul> <p>Preferred</p> <ul> <li>Experience with AI-driven cybersecurity tools (e.g., ReliaQuest GreyMatter, Rapid7, etc.) for threat detection and response. </li><li>Familiarity with zero-trust architectures and emerging technologies, such as SASE or decentralized identity. </li><li>Knowledge of data encryption, tokenization, and secure API design for financial applications. </li><li>Experience working with MSSPs to integrate external security services. </li><li>Understanding of threat modeling frameworks. </li></ul> <p>Work Environment</p> <p>Employees in this class are subject to extended periods of sitting, standing and walking, vision to monitor and moderate noise levels. Work is performed in an office environment.</p> <p>The posted salary range for this job takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; geographic location, and other business and organizational needs. Successful candidates may be hired anywhere in the salary range based on these factors. It is uncommon to hire candidates at or near the top of the range.</p> <p>California Privacy Notice</p> <p>This notice only applies to our applicants who reside in the State of California.</p> <p>The latest version of our Privacy Policy can be found here. This Privacy Policy provides you with notice, at or before the point of collection, about the categories of personal information to be collected from you, the purposes for which your personal information is collected or used, and whether that information is sold or shared, so that you can exercise meaningful control over our use of your personal information. We are providing this notice to comply with the California Consumer Privacy Act of 2018, as amended as amended by the California Privacy Rights Act of 2020 ("CCPA").</p> <p>If you have any questions about CCPA regarding California residents or HCA team members, please contact the Privacy Team at Privacy2@hcs.com.</p>
POST A JOB
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!