Job Description :
Title: Data Security Architect
Duration: 8+ months
Potential to Extend: Yes
Location: Foster City, CA

Must have:
Development and coding java, .net, C/C++, rest soap web services and debugging skills. API Integration.
Must have a Bachelor''s Degree. Implementing cryptographic Solutions.
Knowledge of cryptographic standards and algorithms such as AES, SHA, DES, PKCS standards.
Must have strong soft skills: strong people skills and good culture fit as they will be working across multiple organizations.

Expertise in building s/w systems, DevOps and security automation
An experience with languages used for security automation such as Python, Ruby, Perl
Understanding s/w architecture built using major enterprise wide platforms such as JEE, Spring, .NET
Understanding major s/w architecture principles: scalability, maintainability, reliability, redundancy, etc.
Understanding cryptography, its major algorithms, practical usage in programming languages, and major problems
Experience with implementing cryptographic solutions using HSM or s/w components is desired
Experience in building systems on UNIX/Linux based systems
Experience developing applications and components using Java, .net, C/C++, REST/SOAP web services and debug skills.
Experience implementing data security solutions for applications (Java, .net, web services), and databases (Oracle, MS-SQL – transparent encryption and integration with external key management systems such as Hardware Security Modules)
Deep understanding of key-management protocols and principles
Experience in delivering comprehensive architecture specifications for complex security solutions
Strong knowledge of cryptographic standards and algorithms such as AES, SHA, DES; PKCS standards

Bachelor degree
8-10 years overall experience preferred; fewer years with focus on data security will be considered too

Other skills
Verbal and written communication skills, problem solving skills, customer service and interpersonal skills (Required)
Strong ability to work independently and manage one’s time (Required)
Strong leadership and mentoring skills necessary to provide support and constructive performance feedback (Required)
Strong knowledge of computer hardware and software (Required)
Strong knowledge of the practical application of engineering science, technology, and applied cryptography (Typically required)
Strong knowledge of laws, legal codes, government regulations, agency rules and the democratic political process (Required)
Exercises independent judgement with minimal direction from management