Internet of Things IoT Security Architect

Join IoT Security Architect TalentCloud

If you possess mastery in any of the roles or skills below, you can apply to this TalentCloud. Once you become an approved Experfy TalentCloud member, you will get exclusive access to jobs and project opportunities from our clients.

Cloud Description

This TalentCloud seeks experts who can be responsible for implementing end-to-end security for the IoT solution from device access to encrypted connectivity and IoT cloud to application security. Additional responsibilities and characteristics include:

  • Implementing best in class IoT security including firewalls, encryption strategies/implementation, authentication, and password encryption
  • Creating and implementing ongoing security monitoring real-time monitoring applications
  • Defining security architecture
  • Selecting encryption methods
  • Defining access security
  • Defining security approach for devices, connectivity, IoT platform, data storage, and applications

Required Skills

  • Proven experience in implementing security architectures for web & mobile applications
  • Understand the 4 core IoT components: devices, connectivity, IoT platforms, and applications
  • Understand how security is implemented on each of the 4 IoT elements and associated applications like storage
  • Understand security, data encryption, and encryption protocols
  • Understand device and user authentication approaches
  • Understand security and hacking threats for all aspects of an IoT solution
  • Understand how attack vectors can be used to breach an IoT solution
  • Experience in implementing connected device security including connectivity intrusions, data encryption, VPN, and security approaches of cellular and wireless connectivity technologies
  • Experience in Implementing cloud or web platform security solution
  • Creating and implementing security documentation and ongoing process to monitor overall security of IoT solution
  • Cybersecurity training and 2 at least certifications
  • Ability to describe and implement security approach/architecture for the four components of IoT

Preferred Skills

  • Ability to describe the current state of hackings and how to defend against them
  • Describe recent hacking attempts and how your solution would have defended the system
  • Show how a security architecture you designed kept hackers away
  • Proven implementation of security architecture for device & web or mobile application
  • Cloud or Enterprise security training and certification for relevant platforms
  • Computer Engineering degree with an added focus on cybersecurity and security methods