IT Security Architect at Worldline
Roma, Lazio, Italy -
Full Time


Start Date

Immediate

Expiry Date

23 May, 25

Salary

0.0

Posted On

18 Apr, 25

Experience

3 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Childbirth, Color

Industry

Information Technology/IT

Description

Job Description
IT Security Architect
This is Worldline
We are the innovators at the heart of the payments technology industry, shaping how the world pays and gets paid. The solutions our people build today power the growth of millions of businesses tomorrow. From your local coffee shop to unicorns and international banks. From San Francisco to Auckland. We are in every corner of the world, in every part of commerce. And just as we help our customers accelerate their business, we are committed to helping our people accelerate their careers. Together, we shape the evolution.
The Opportunity
We design and operate leading digital payment and transactional solutions that enable sustainable economic growth and reinforce trust and security in our societies. If you are a highly skilled IT Security Architect, then get ready to join our company.
We are looking for a candidate to join the Cybersecurity team at Worldline Merchant Services Italia. The candidate will be responsible for evaluating and addressing security aspects in collaboration with other teams, while balancing the company’s short, medium, and long-term objectives.

Day-to-Day Responsibilities

  • Ensure the implementation of IT solutions that provide adequate IT and cybersecurity safeguards and measures consistent with the reference context (type of data, services, etc.) and in line with mandatory requirements and industry best practices;
  • Actively participate in the security analysis of solutions that involve the IT use of data, analyzing them with respect to the reference context and the types of applicable threats, defining technological measures aimed at ensuring appropriate protection in terms of confidentiality, integrity, and availability (CIA);
  • Analyze IT security assessment activities (Vulnerability, PenTest, SAST, DAST, etc.) evaluating them with respect to the reference context, participating in the definition of the related remediation plans, and directing them according to a risk-based approach;
  • Formulate and execute tailored cloud security strategies and policies aligned with corporate guidance and our cloud security and enterprise architecture standards;
  • Design cloud reference architectures that safeguard data and applications hosted in the cloud from unauthorized access, breaches, and other potential threats, ensuring information integrity and confidentiality;
  • Support periodic security assessments and audits, identifying vulnerabilities and developing effective countermeasures to strengthen cyber defenses, and address security policies for cloud services and applications.
Responsibilities
  • Ensure the implementation of IT solutions that provide adequate IT and cybersecurity safeguards and measures consistent with the reference context (type of data, services, etc.) and in line with mandatory requirements and industry best practices;
  • Actively participate in the security analysis of solutions that involve the IT use of data, analyzing them with respect to the reference context and the types of applicable threats, defining technological measures aimed at ensuring appropriate protection in terms of confidentiality, integrity, and availability (CIA);
  • Analyze IT security assessment activities (Vulnerability, PenTest, SAST, DAST, etc.) evaluating them with respect to the reference context, participating in the definition of the related remediation plans, and directing them according to a risk-based approach;
  • Formulate and execute tailored cloud security strategies and policies aligned with corporate guidance and our cloud security and enterprise architecture standards;
  • Design cloud reference architectures that safeguard data and applications hosted in the cloud from unauthorized access, breaches, and other potential threats, ensuring information integrity and confidentiality;
  • Support periodic security assessments and audits, identifying vulnerabilities and developing effective countermeasures to strengthen cyber defenses, and address security policies for cloud services and applications
Loading...