Principal Architect, Mobile Security

Company Name:
Aditi Staffing
Location - Bellevue, WA
Duration - 12+ Months (Contract to hire)
Title - Principal Architect, Mobile Security
The Principal Architect for Mobile Security plays a key role in shaping T-Mobile's technology strategy necessary to provide a secure mobile experience and protect critical assets from threats in the mobile ecosystem by applying expertise in strategic analysis, business architecture, and technology architecture. This role will seek to understand how people, processes, and technology interact to perform the fundamental activities of the business in both current and future states, and model these interactions to guide technology strategy in order to better achieve the strategic goals and objectives of the business.
Work cross-functionally to understand the linkage between T-Mobile's business goals, business architectures, and technology architectures - and strive to further T-Mobile's business goals via organic or inorganic evolution of T-Mobile's architectures. Drive the evolution of infrastructure, processes, products, and
by influencing decision makers. Compile, deliver, and evangelize end-to-end technology roadmaps that guide the evolution of infrastructure, products, and services by applying depth and breadth of expertise in multiple related disciplines
Responsible for building effective working relationships, making sound decisions, successfully making changes, initiating action and achieving results.
Minimum Required Skills / Competencies:
Has demonstrated depth and breadth of expertise in multiple related disciplines, such as Wireless telecom architecture, including Device, Access, Core, Transport, Customer systems, and/or Enterprise systems Enterprise Mobility Enterprise Architecture Frameworks Deep related domain expertise Ability to articulate the relationship between business strategy and technology strategy In-depth knowledge of current technological trends, developments, and best practices in the area of information security, wireless network architecture, technologies, and concepts Strong communication skills (written / verbal) with varied audiences Experience explaining difficult concepts to decision makers to help shape technology strategy. Experience modeling as-is and to-be architectures based on business requirements Minimum 8-10 years of experience in a dedicated information security role Minimum 4 year degree in
science or related discipline.
Preferred skills:
Demonstrated knowledge and experience in: Mobile analytics and threat management Product security incident response Bring Your Own Device (BYOD) Value added mobile security services Mobile product lifecycle management Mobile operating systems Ability to identify and describe relationship between critical members of the mobile ecosystem In-depth knowledge of current technological trends, developments, and best practices in the area of mobile security and product security Demonstrated technical writing ability to include published whitepapers, books, or articles on information security or technology topics. Working knowledge on the policy and regulatory environment of information security or mobile Minimum 3-5 years of experience in the telecommunications industry Minimum 3-5 years of experience in mobile technology

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.