Student Veterans of America Jobs

Welcome to SVA’s jobs portal, your one-stop shop for finding the most up to date source of employment opportunities. We have partnered with the National Labor Exchange to provide you this information. You may be looking for part-time employment to supplement your income while you are in school. You might be looking for an internship to add experience to your resume. And you may be completing your training ready to start a new career. This site has all of those types of jobs.

Here are a few things you should know:
  • This site is mobile friendly. You do not need a log-in or password to access information.
  • Jobs on this site are original and unduplicated and come from three sources: the Federal government, state workforce agency job banks, and corporate career websites. All jobs are vetted to ensure there are no scams, training schemes, or phishing.
  • The site is refreshed daily to remove out-of-date content.
  • The newest jobs are listed first, so use the search features to match your interests. You can look for jobs in a specific geographical location, by title or keyword, or you can use the military crosswalk. You may want to do something different from your military career, but you undoubtedly have skills from that occupation that match to a civilian job.

Job Information

ICON Clinical Research Senior Manager - Cyber & Information Security in Dublin, Ireland

Job Advert Posting

ICON plc is a world-leading healthcare intelligence and clinical research organisation. From molecule to medicine, we advance clinical research providing outsourced services to pharmaceutical, biotechnology, medical device and government and public health organisations.

With our patients at the centre of all that we do, we help to accelerate the development of drugs and devices that save lives and improve quality of life.

Our people are our greatest strength, are at the core of our culture, and the driving force behind our success. ICON people have a mission to succeed and a passion that ensures what we do, we do well.

The Role:

ICON is seeking to hire a Principal Security Architect to join their Cyber and Information Security department.

The Principal Security Architect will design and oversee the implementation of network and computer security within ICON; maintain and implement security standards, blueprints and patterns; liaise with business and IT stakeholders to clearly communicate and treat risks, deliver key initiatives as part of the security program, and ensure compliance with security standards.

The Principal Security Architect plays a crucial role in ICON’s security program and is expected to deliver key initiatives, provide guidance and expertise to team members and business stakeholders and contribute to shaping the Information Security program and budget.

Reporting to the Head of Cyber Risk Management and Security Architecture, the successful candidate will be responsible for the following activities:

  • Lead Security Project Management Office functions, including:

  • Identification : Review and provide IT Security’s feedback on business cases and participate in feasibility and solution design discussions.

  • Planning & Estimation : Ensure high-level designs are produced to ascertain security risks related to a project, estimate activities and deliverables required for a project based on a standard methodology, communicate level of effort estimates, and assign a primary Security Architect (including yourself) to projects.

  • Requirements : Create and maintain security architecture’s requirements, standards, blueprints and patterns, and review and approve low-level design documentation and requirements for projects. Facilitate penetration testing activities with the Red Team, 3rd party penetration testing firms, and project team stakeholders (e.g., developers, architects, project manager) to ensure penetration tests are scoped appropriately, scheduled, and results are effectively communicated.

  • Verification : Ensure activities are performed and requirements are met based on artefacts inspected or observed (e.g., SAST/DAST verification, pen test remediation, feedback is incorporated into design documentation, etc.), and any residual risks are communicated to the appropriate stakeholders.

  • Review change control requests as a key member of the Change Advisory Board to ensure changes proposed and emergency changes implemented comply with ICON’s security standards, and that the Cyber Security Operations Centre is aware of any changes that could impact alerts, telemetry, etc.

  • Approve/reject IT service management (ITSM) ticket requests for compliance with ICON’s security standards.

  • Collaborate with other Cybersecurity stakeholders (Cyber Risk Management, Cyber Third-Party Risk Management, Security Engineering, Cyber Resilience, Cyber Threat Intelligence), as needed.

  • Ensure timely and high-quality execution of security activities, providing early communication of any foreseeable project delays or budget overruns to the appropriate project team and cybersecurity stakeholders.

  • Record time spent on capitalizable projects and track forecasts for the projects assigned to you periodically.

  • Contribute to the Information Security strategy, including vision and tactical execution of Security Architecture initiatives.

  • Support MAD (Mergers, Acquisitions & Divestment) activities.

  • Act as an escalation point for other Security Architects, as required.

  • Ensure compliance with ICON Information Security policies and hardening standards, and author/review such policies and standards at least annually.

  • Educate and provide awareness to application development teams, enterprise architects and solution architects on ICON’s security standards and best practices.

  • Other functions as assigned by ICON Head of Information Security.

  • Demonstrate a strong awareness of the current threat landscape and willingness to learn modern solution architectures to incorporate zero-trust principles.

  • Solid vendor management experience, proven experience managing complex integration issues across multiple vendors.

  • Proven track record to drive high security standards across an organisation.

  • Advanced knowledge of operating systems (Windows, Unix, Mac OS) and technologies supported by major cloud service providers.

  • Ability to work within a multi-disciplinary team.

  • Ensure that defined security models are adhered to on an on-going basis.

  • Ability to relate technical issues to non-technical associates / business owners.

  • Change management and information security risk & governance experience.

  • Occasional travel may be required.

To be successful in the role, you will ideally have:

The successful candidate will gain experience of operating in a technically complex, fast-changing and dynamic environment. Working as part of a global security team, the Principal Security Architect must be a proven self-starter and have excellent organisational and communications skills. The ideal candidate will have a genuine passion for Information Security and must have the ability to maintain composure under pressure and work calmly during an emergency. They should also have a solid understanding in the following areas:

TOGAF and/or SABSA frameworks

NIST Cybersecurity framework

NIST Secure Software Development Framework

Threat modelling frameworks (e.g., STRIDE)

MITRE ATT&CK Framework

Information Security Standards

Application layer vulnerabilities

Strong understanding of Encryption Protocols

Network Security

Strong knowledge of Mobile Security

Strong understanding of Layered Security

Strong Knowledge of Cloud Architecture

Proven Problem Solving Skills

Data Loss Prevention

Essentials

At least 7-10 years in a security related role

Bachelor’s degree in computer science, programming, or other related program

Significant experience with risk management methodologies, industry standards, managing an Information Security Management System (ISMS) and delivering key aspects of a security program in a regulated environment.

Certifications: Relevant certs e.g. (ISC)2 CISSP, ISACA CISM/CISA/CRISC, SANS GIAC, ISO27k LA/LI

Presented on security topics at security conferences

Familiar with the laws, regulations, industry standards and guidance pertaining to Data Protection and Information Security

Benefits of Working in ICON:

Our success depends on the knowledge, capabilities and quality of our people. That’s why we are committed to developing our employees in a continuous learning culture – one where we challenge you with engaging work and where every experience adds to your professional development.

At ICON, our focus is to provide you with a comprehensive and competitive total reward package that comprises, not only an excellent level of base pay, but also a wide range of variable pay and recognition programs. In addition, our best in class employee benefits, supportive policies and wellbeing initiatives are tailored to support you and your family at all stages of your career - both now, and into the future.

ICON, including subsidiaries, is an equal opportunity and inclusive employer and is committed to providing a workplace free of discrimination and harassment. All qualified applicants will receive equal consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

If, because of a medical condition or disability, you need a reasonable accommodation for any part of the application process, or in order to perform the essential functions of a position, please let us know through the form below.

#LI-DK1

DirectEmployers