TechMatrix Inc

Information Security Architect- Cyber Security

Southfield, MI, US

6 days ago
Save Job

Summary

Role: Information Security Architect- Cyber Security

Location: Southfield, MI

Contract: W2


Note: Candidate must have experience with Vulnerabilities in-vehicle connectivity interfaces and protocols, e.g., CAN, BLE, Wi-Fi, GNSS, mitigation mechanisms, and security enforcement.


Responsibilities

  • Collaborate with cross-functional teams to consolidate detailed requirements and architecture specifications for the next-generation vehicle and infrastructure security solutions.
  • Define the success criteria and priorities of the project/product benefits and arrive at executable roadmaps.
  • Ensure complete requirements and architecture traceability and compliance with industry standards.
  • Closely collaborate with the Verification and Development engineers to establish product excellence; the teams span internal and external teams, including suppliers and partners.
  • Ensure optimization of software through design reviews and code reviews.
  • Collaborate with different teams, including Supply Chain, Tier-1 teams, Vehicle Controls, Chassis, Safety, Battery, Infotainment, and UX, to realize the overall project objectives on time and within budget.


Required Qualifications:

  • Bachelor’s in Computer Science or Computer Engineering
  • 6+ years of industry experience in technical architects' roles and technical product management in network and information security, data privacy, and cybersecurity.
  • Conversant with embedded security spanning secure software and firmware update, secure boot, secure storage, and trusted execution environment and hardware security modules and security hardware extensions.
  • Experience in threat analysis and risk assessment (TARA) at the system level and component level
  • Experience in Scalable Public Key Infrastructure Deployments and management
  • Experience in Vulnerabilities in-vehicle connectivity interfaces and protocols, e.g., CAN, BLE, Wi-Fi, GNSS, mitigation mechanisms, and security enforcement.
  • Experience using requirement management systems like JAMA, JIRA, Confluence, or similar tools.

How strong is your resume?

Upload your resume and get feedback from our expert to help land this job