How to Become a Security Architect……. 03

Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on pinterest
Pinterest

Overview

As discussed in our last two Blogs, How to Become a Security Architect.

Security Architect is a person who plans, designs, and reviews the security requirements of any organization.

We already discussed about the knowledge required, and Tasks need to be taken care by any Security Architects

With these tasks, a Security Architect design a secure IT architecture for the overall organization.

In this article, we will discuss about the Skills and Abilities required to be a Security Architect.

Skills Required to be a Security Architect

Security analyst must have below mentioned skills:

  • Skill in applying and incorporating information technologies into proposed solutions.
  • Skill in designing countermeasures to identified security risks.
  • Skill in designing the integration of hardware and software solutions.
  • Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
  • Skill in design modeling and building use cases (e.g., unified modeling language).
  • Skill in using Virtual Private Network (VPN) devices and encryption.
  • Skill in writing test plans.
  • Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, antivirus software, anti-spyware).
  • Skill in designing multi-level security/cross-domain solutions.
  • Skill in the use of design methods.
  • Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic).
  • Skill in applying security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
  • Skill in translating operational requirements into protection needs (i.e., security controls).
  • Skill in setting up physical or logical sub-networks that separate an internal local area network (LAN) from other untrusted networks.
  • Skill in configuring and utilizing computer protection components (e.g., hardware firewalls, servers, routers, as appropriate).
  • Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations.

Abilities required to be a Security Architect

Security analyst must have below mentioned abilities:

  • Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization’s enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).
  • Ability to communicate effectively when writing.
  • Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
  • Ability to apply an organization’s goals and objectives to develop and maintain architecture.
  • Ability to optimize systems to meet enterprise performance requirements.
  • Ability to apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • Ability to apply secure system design tools, methods, and techniques.
  • Ability to apply system design tools, methods, and techniques, including automated systems analysis and design tools.
  • Ability to design architectures and frameworks.
  • Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • Ability to serve as the primary liaison between the enterprise architect and the systems security engineer and coordinates with system owners, common control providers, and system security officers on the allocation of security controls as system-specific, hybrid, or common controls.
  • Ability, in close coordination with system security officers, advise authorizing officials, chief information officers, senior information security officers, and the senior accountable official for risk management/risk executive (function), on a range of security-related issues (e.g. establishing system boundaries; assessing the severity of weaknesses and deficiencies in the system; plans of action and milestones; risk mitigation approaches; security alerts; and potential adverse effects of identified vulnerabilities).
  • Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
  • Ability to set up a physical or logical sub-networks that separates an internal local area network (LAN) from other untrusted networks.

Summary

Anyone with this Knowledge – Skills – Abilities is ready to be a Security Architect, and if anyone wants to be one, then he/she need to Gain the Knowledge – Enhance Skills and  Develop abilities given in these three Blogs. Our Course for Security Architect is designed as per these K-S-As. 

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

The NIST
Cloud Computing

NIST definition of cloud computing

National Institute of Standards and Technology (NIST) was founded in 1901 and is now part of the U.S. Department of Commerce. NIST is a physical