Firm Name: United Airlines
Numbers of Jobs: Senior Architect
Education Need: Graduate
Job Hours: 8
Payment: $20-$30/Hour
What's Job City: Fremont
Job Details:
The chance to work for United Airlines has never been better. We're moving in that direction as the greatest airline in aviation history. Our shared goal, Connecting People, Uniting the World, has more of an emphasis than simply getting people from one place to another. It also means that we have a special responsibility to improve and create opportunities in the communities where we work, live, and fly as a large corporation serving millions of customers and employing tens of thousands of people in hundreds of locations around the world. Only a workforce that is genuinely inclusive and diverse will allow us to achieve this. As we continue to grow, we will hire tens of thousands of people to work in every department of the airline. Our careers come with a full set of benefits that are intended to keep you happy, healthy, and active. The "Business Resource Group" communities run by employees, the 401(k) plan, and perks like space-available travel make United a truly exceptional place to work. Are you willing to travel the world?
Our belief that inclusion fosters innovation serves as the foundation of everything we do. The global digital technology team at United, which consists of people from all over the world, is creating the greatest airline in the history of aviation. Through cutting-edge architectures, data analytics, and digital solutions, our team develops, builds, and supports massively scalable technology solutions.
Principal responsibilities comprise.
a list of the responsibilities for the position.
The development of United Airlines' cloud security capabilities is assisted by the Senior Architect for Cloud Cybersecurity. You will be a part of a multidisciplinary cyber team that is in charge of the complete stack security architecture. The Architect in this role will cooperate with the product, platform, engineering, and operations teams and work on the creation and maintenance of security-relevant documentation to ensure the adoption of security standard methodologies throughout the entire application or system lifecycle. The role will enable us to continuously enhance our cyber controls and the playbooks, workflows, processes, and procedures that go with them.
- Develop and advance security and resilience architecture strategies, frameworks, and patterns in close collaboration with partner organizations and other cybersecurity teams.
- To ensure the adoption of business and industry-standard practices, work closely with collaborators to understand business needs and develop resilience and security principles that support them.
- demonstrates expert technology competence in two or more domains, such as identity management, zero trust, endpoint security, infrastructure, platform, and product security.
- Current network, system, and application architectures (IAAS, PAAS, SAAS, and on-premises) are examined for technical risks about the corresponding policies and risks, and appropriate remediation or risk reduction plans are offered.
- aids in defining and establishing security frameworks and standards.
- The integration of test plans, CI/CD pipeline tools, and tools for identifying cloud vulnerabilities should be taught to and coached by development and engineering teams.
- Promote secure infrastructure-as-code to enable end-to-end configuration and to ensure the overall success of the IaaS, PaaS, and SaaS environments.
- Threat modeling, end-to-end security evaluation, design and creation of cloud security standards, policies, and procedures for various kinds of public, private, and hybrid clouds.
- Equal opportunity is promoted by United Airlines. United Airlines recruits, hires, trains, pays and promotes its employees regardless of age, physical ability, veteran status, gender identity, sexual orientation, race, or any other protected status as specified by applicable law.
Because United values a variety of experiences and viewpoints, everyone who meets the requirements is encouraged to apply. Though having the "desired" qualifications makes for a stronger candidate, we encourage applicants to apply even if they don't feel they meet all of the "desired" requirements because we are always looking for people who will bring something new to the table.
Qualifications.
What is necessary to succeed (Minimum Requirements):.
- university diploma.
- technical expertise with AWS, specifically 4+ years.
- familiarity with AWS's management, governance, and security services.
- Understanding of the development, enhancement, and use of security technologies, such as identity and access management, network security, and application and data security.
- excellent knowledge of cloud computing technologies.
- An outgoing personality and the ability to effectively manage or work in a team.
- strong written and verbal communication skills.
- highly effective analytical, decision-making, and problem-solving abilities.
- programming language syntax and organization.
- knowing the typical techniques, tactics, and strategies used by the opposition.
- knowing how to analyze network traffic flow at the packet level.
- The Secure Software Development Lifecycle (SDLC) is aware of all of the processes that surround the developer and DevOps experience, including code compilation, system image build (containers, system images), continuous integration, and continuous deployment, as well as the tests and validations that take place throughout those processes.
- Without sponsorship, one needs the appropriate legal authorization to work in the US for any employer.
- The interview must be completed to fulfill the requirements for the position.
- Regular, punctual attendance is a crucial responsibility for the job.
Which of the following will make it easier for you to stand out from the crowd?
- a higher education.
- 8+ years of technical experience, 5 of which were spent specifically in the cloud.
- CCIE, CCDE, or an alternative vendor's equivalent.
- by AWS Solution Architect Pro. , Networking, and Security Specializations.
- the ISSMP, ISSAP, ISSEP, and CISSP.
- GIAC Family, CRISC, CEH, and CISM.
- CKA and security of Kubernetes.
- CDK JSII.