Cloud Security Architect m/f/* IC4
📍 Job Overview
- Job Title: Cloud Security Architect m/f/* IC4
- Company: Oracle
- Location: Vienna, Austria
- Job Type: On-site
- Category: Security Architect
- Date Posted: 2025-06-25
- Experience Level: Mid-Senior level (5-10 years)
- Remote Status: On-site
🚀 Role Summary
- Strategic cybersecurity expert responsible for designing secure, innovative solutions on leading cloud platforms.
- Collaborative role involving workshops with technical and business stakeholders to gather and define security requirements.
- Customer-focused position delivering high-quality services that exceed expectations and provide a competitive advantage.
- Continuous learning environment with a focus on growing expertise in Oracle's evolving products and services.
📝 Enhancement Note: This role requires a strong background in cybersecurity, with a focus on security assessments, identity lifecycle management, and zero trust architecture. The candidate should also have excellent communication skills to engage with customers and stakeholders effectively.
💻 Primary Responsibilities
- Security Assessments: Conduct security assessments and facilitate workshops to gather and define requirements.
- Security Maturity Assessment: Evaluate the current security maturity of customers, identify vulnerabilities, and develop a strategic roadmap to address gaps.
- IT Infrastructure Analysis: Analyze the existing IT infrastructure, mapping user groups, roles, and access routes, with emphasis on identity lifecycle management processes.
- Zero Trust Architecture Design: Design a zero trust architecture by evaluating and selecting appropriate security technologies and developing a multi-layered model.
- Customer Engagement: Engage with customers to deliver high-quality services that exceed expectations, using deep insights to customize solutions that meet their needs.
- Knowledge Sharing: Continuously grow expertise in Oracle's evolving products and services, and actively share knowledge and delivery insights to support the development of the Consulting Intellectual Property repository.
- Collaboration with Product Management: Collaborate with Oracle Security Product Management to align on product capabilities, relay customer feedback, and contribute to the enhancement of security features.
📝 Enhancement Note: The primary responsibilities of this role revolve around security assessments, architecture design, and customer engagement. The candidate should have a strong understanding of cybersecurity principles and the ability to translate complex architectures into secure, innovative solutions.
🎓 Skills & Qualifications
Education: A bachelor's degree in Computer Science, Information Security, or a related field. A master's degree would be an asset.
Experience: Proven experience (5-10 years) in cybersecurity, with a focus on security assessments, identity lifecycle management, and zero trust architecture.
Required Skills:
- Cybersecurity Expertise: Deep understanding of cybersecurity principles, best practices, and emerging threats.
- Security Assessments: Experience conducting security assessments and identifying vulnerabilities.
- Identity Lifecycle Management: Knowledge of identity lifecycle management processes and tools.
- Zero Trust Architecture: Experience designing zero trust architectures and implementing security technologies.
- Customer Engagement: Excellent communication skills and the ability to engage with customers and stakeholders effectively.
- Consulting Experience: Previous consulting experience would be an asset.
Preferred Skills:
- Oracle Products: Familiarity with Oracle products and services.
- Regulatory Frameworks: Knowledge of regulatory frameworks (e.g., GDPR, HIPAA) and how they apply to cybersecurity.
- Cloud Security: Experience with cloud security and implementing secure solutions on leading cloud platforms.
📝 Enhancement Note: The required and preferred skills for this role are heavily focused on cybersecurity expertise, with a particular emphasis on security assessments, identity lifecycle management, and zero trust architecture. The candidate should also have excellent communication skills and previous consulting experience would be an asset.
📊 Web Portfolio & Project Requirements
Portfolio Essentials:
- Security Assessment Reports: Include reports from previous security assessments, highlighting identified vulnerabilities and recommended solutions.
- Architecture Design Documents: Showcase zero trust architecture design documents, demonstrating your ability to develop multi-layered security models.
- Customer Engagement Case Studies: Provide case studies demonstrating your ability to engage with customers and deliver high-quality services that exceed expectations.
Technical Documentation:
- Methodologies: Document your security assessment methodologies and how you approach zero trust architecture design.
- Tools: List the security technologies you have experience with and how you have implemented them in previous roles.
- Regulatory Compliance: Explain how you ensure compliance with relevant regulatory frameworks in your security assessments and architecture designs.
📝 Enhancement Note: The portfolio for this role should focus on security assessment reports, architecture design documents, and customer engagement case studies. The technical documentation should detail your methodologies, tools, and approach to regulatory compliance.
💵 Compensation & Benefits
Salary Range: €70,000 - €90,000 per year (based on market research for mid-senior level security architects in Vienna, Austria)
Benefits:
- Health Insurance: Comprehensive health insurance plan for employees and their families.
- Retirement Savings: Oracle offers a retirement savings plan with company matching contributions.
- Employee Discounts: Discounts on Oracle products and services for employees.
- Professional Development: Opportunities for professional development, including training and certification programs.
Working Hours: Full-time position with standard working hours (Monday - Friday, 9:00 AM - 5:00 PM). Some flexibility may be required to accommodate customer needs.
📝 Enhancement Note: The salary range for this role is based on market research for mid-senior level security architects in Vienna, Austria. The benefits listed are typical for a large corporation like Oracle and may vary depending on the specific role and location.
🎯 Team & Company Context
🏢 Company Culture
Industry: Oracle is a multinational computer technology corporation that specializes in developing and marketing computer hardware systems and enterprise software products.
Company Size: Oracle is a large corporation with over 130,000 employees worldwide. This means that the security team will be part of a large, global organization with significant resources.
Founded: Oracle was founded in 1977 and has since grown to become one of the largest software companies in the world.
Team Structure:
- Security Team: The security team is part of the larger IT organization and works closely with other teams, such as product development and customer support.
- Hierarchy: The security team has a clear hierarchy, with senior security architects reporting to the director of security.
- Cross-Functional Collaboration: The security team works closely with other teams within Oracle, such as product development, customer support, and sales.
Development Methodology:
- Agile/Scrum: Oracle uses Agile/Scrum methodologies for software development, which means that the security team will work closely with development teams to ensure that security is integrated into the development process.
- Code Review: Oracle has a code review process to ensure the quality and security of the code.
- Deployment Strategies: Oracle uses continuous integration and continuous deployment (CI/CD) pipelines to automate the deployment process.
Company Website: Oracle
📝 Enhancement Note: Oracle is a large corporation with a global presence, which means that the security team will be part of a large, global organization with significant resources. The security team works closely with other teams within Oracle, such as product development and customer support, to ensure that security is integrated into the development process.
📈 Career & Growth Analysis
Web Technology Career Level: This role is at the mid-senior level, with a focus on security architecture and customer engagement. The candidate should have significant experience in cybersecurity, with a strong background in security assessments, identity lifecycle management, and zero trust architecture.
Reporting Structure: The cloud security architect will report to the director of security and work closely with other members of the security team, as well as other teams within Oracle.
Technical Impact: The cloud security architect will have a significant impact on the security of Oracle's products and services. They will be responsible for designing secure, innovative solutions on leading cloud platforms and ensuring that Oracle's customers are protected from cyber threats.
Growth Opportunities:
- Technical Leadership: With experience and strong performance, the cloud security architect may have the opportunity to move into a technical leadership role, such as a senior security architect or security manager.
- Product Management: The cloud security architect may also have the opportunity to move into a product management role, where they would be responsible for defining the security strategy for Oracle's products and services.
- Consulting: The cloud security architect may have the opportunity to move into a consulting role, where they would work with customers to help them implement secure solutions on leading cloud platforms.
📝 Enhancement Note: This role offers significant opportunities for career growth, with the potential to move into technical leadership, product management, or consulting roles. The candidate should have a strong background in cybersecurity and be able to demonstrate their ability to design secure, innovative solutions on leading cloud platforms.
🌐 Work Environment
Office Type: Oracle has a modern, collaborative work environment with open-plan offices and plenty of natural light. The security team has its own dedicated space within the larger IT organization.
Office Location(s): The security team is based in Oracle's headquarters in Vienna, Austria. However, there may be opportunities to work from other Oracle offices or remotely, depending on the specific role and customer needs.
Workspace Context:
- Collaborative Workspace: The security team has a collaborative workspace with plenty of meeting rooms and breakout spaces for informal discussions.
- Development Tools: The security team has access to the latest development tools and technologies, including virtual machines and cloud-based testing environments.
- Cross-Functional Collaboration: The security team works closely with other teams within Oracle, such as product development and customer support. This means that there are plenty of opportunities for cross-functional collaboration and knowledge sharing.
Work Schedule: The security team works a standard work schedule (Monday - Friday, 9:00 AM - 5:00 PM). However, there may be opportunities for flexible working, depending on the specific role and customer needs.
📝 Enhancement Note: Oracle has a modern, collaborative work environment with plenty of opportunities for cross-functional collaboration and knowledge sharing. The security team has its own dedicated space within the larger IT organization and has access to the latest development tools and technologies.
📄 Application & Technical Interview Process
Interview Process:
- Phone Screen: A brief phone screen to assess communication skills and cultural fit.
- Technical Interview: A technical interview to assess cybersecurity expertise, with a focus on security assessments, identity lifecycle management, and zero trust architecture.
- Case Study: A case study to assess the candidate's ability to design secure, innovative solutions on leading cloud platforms.
- Final Interview: A final interview with the hiring manager to assess cultural fit and answer any remaining questions.
Portfolio Review Tips:
- Security Assessment Reports: Highlight reports from previous security assessments, with a focus on the methodology used and the recommendations made.
- Architecture Design Documents: Showcase zero trust architecture design documents, with a focus on the multi-layered model and the security technologies used.
- Customer Engagement Case Studies: Provide case studies demonstrating your ability to engage with customers and deliver high-quality services that exceed expectations.
Technical Challenge Preparation:
- Security Assessment Methodologies: Brush up on your security assessment methodologies and be prepared to discuss how you approach security assessments.
- Zero Trust Architecture: Familiarize yourself with the latest trends in zero trust architecture and be prepared to discuss how you would design a multi-layered security model.
- Customer Engagement: Prepare examples of how you have engaged with customers in previous roles and how you have delivered high-quality services that exceed expectations.
ATS Keywords: Cybersecurity, Security Assessments, Identity Lifecycle Management, Zero Trust Architecture, Customer Engagement, Oracle Products, Consulting, Security Technologies, Cloud Security, Regulatory Frameworks, Agile/Scrum Methodologies, Code Review, Deployment Strategies, CI/CD Pipelines, Professional Development, Technical Leadership, Product Management, Consulting, Collaborative Workspace, Development Tools, Cross-Functional Collaboration, Knowledge Sharing, Security Team, IT Organization, Global Organization, Customer Needs, Security Principles, Best Practices, Emerging Threats, Security Technologies, Security Architecture, Innovative Solutions, Leading Cloud Platforms, Cyber Threats, Security Strategy, Security Products, Security Services.
📝 Enhancement Note: The interview process for this role is designed to assess the candidate's cybersecurity expertise, with a focus on security assessments, identity lifecycle management, and zero trust architecture. The candidate should be prepared to discuss their security assessment methodologies, their approach to zero trust architecture, and their ability to engage with customers and deliver high-quality services that exceed expectations.
🛠 Technology Stack & Web Infrastructure
Security Technologies:
- Identity and Access Management (IAM): Experience with IAM tools and technologies, such as Oracle Identity and Access Management (IAM) and Okta.
- Intrusion Detection Systems (IDS): Experience with IDS tools and technologies, such as Snort and Suricata.
- Security Information and Event Management (SIEM): Experience with SIEM tools and technologies, such as Splunk and IBM QRadar.
- Firewalls: Experience with firewall technologies, such as Cisco ASA and Palo Alto Networks.
- Encryption: Experience with encryption technologies, such as RSA and DigiCert.
Cloud Platforms:
- Amazon Web Services (AWS): Experience with AWS and its security features, such as AWS Identity and Access Management (IAM) and AWS Key Management Service (KMS).
- Microsoft Azure: Experience with Azure and its security features, such as Azure Active Directory (Azure AD) and Azure Key Vault.
- Google Cloud Platform (GCP): Experience with GCP and its security features, such as Google Cloud Identity and Access Management (IAM) and Google Cloud Key Management Service (KMS).
Development & DevOps Tools:
- Version Control: Experience with version control systems, such as Git and Subversion.
- Continuous Integration/Continuous Deployment (CI/CD): Experience with CI/CD tools, such as Jenkins and CircleCI.
- Infrastructure as Code (IaC): Experience with IaC tools, such as Terraform and CloudFormation.
- Containerization: Experience with containerization technologies, such as Docker and Kubernetes.
📝 Enhancement Note: The security technologies, cloud platforms, and development & DevOps tools listed are relevant to the role of cloud security architect. The candidate should have experience with a range of security technologies, cloud platforms, and development & DevOps tools, with a focus on those relevant to the specific role and customer needs.
👥 Team Culture & Values
Web Development Values:
- Security First: Oracle prioritizes security above all else, with a focus on designing secure, innovative solutions on leading cloud platforms.
- Customer Focus: Oracle is committed to delivering high-quality services that exceed customer expectations.
- Collaboration: Oracle values collaboration and knowledge sharing, with a focus on working closely with other teams within the organization.
- Innovation: Oracle encourages innovation and continuous learning, with a focus on staying up-to-date with the latest trends in cybersecurity.
Collaboration Style:
- Cross-Functional Collaboration: The security team works closely with other teams within Oracle, such as product development and customer support.
- Knowledge Sharing: The security team encourages knowledge sharing and continuous learning, with a focus on staying up-to-date with the latest trends in cybersecurity.
- Technical Mentoring: The security team provides technical mentoring and support to other teams within Oracle, with a focus on helping them implement secure solutions on leading cloud platforms.
📝 Enhancement Note: Oracle values security, customer focus, collaboration, and innovation, with a focus on designing secure, innovative solutions on leading cloud platforms. The security team works closely with other teams within Oracle, with a focus on knowledge sharing and technical mentoring.
⚡ Challenges & Growth Opportunities
Technical Challenges:
- Emerging Threats: Staying up-to-date with the latest trends in cybersecurity and emerging threats.
- Cloud Security: Implementing secure solutions on leading cloud platforms, with a focus on identity and access management, intrusion detection, and encryption.
- Regulatory Compliance: Ensuring compliance with relevant regulatory frameworks, such as GDPR and HIPAA.
- Customer Engagement: Engaging with customers and delivering high-quality services that exceed expectations.
Learning & Development Opportunities:
- Certifications: Pursuing relevant certifications, such as Certified Information Systems Security Professional (CISSP) and Certified in Risk and Information Systems Control (CRISC).
- Conferences: Attending cybersecurity conferences and events, such as RSA Conference and Black Hat.
- Technical Mentoring: Providing technical mentoring and support to other teams within Oracle, with a focus on helping them implement secure solutions on leading cloud platforms.
📝 Enhancement Note: The technical challenges for this role revolve around staying up-to-date with the latest trends in cybersecurity and emerging threats, implementing secure solutions on leading cloud platforms, ensuring regulatory compliance, and engaging with customers. The learning and development opportunities for this role revolve around pursuing relevant certifications, attending cybersecurity conferences and events, and providing technical mentoring and support to other teams within Oracle.
💡 Interview Preparation
Technical Questions:
- Security Assessment Methodologies: Be prepared to discuss your security assessment methodologies and how you approach security assessments.
- Zero Trust Architecture: Be prepared to discuss your approach to zero trust architecture and how you would design a multi-layered security model.
- Customer Engagement: Be prepared to discuss your approach to customer engagement and how you have delivered high-quality services that exceed expectations in previous roles.
Company & Culture Questions:
- Security Culture: Be prepared to discuss Oracle's security culture and how you would contribute to it in your role as a cloud security architect.
- Collaboration: Be prepared to discuss your approach to collaboration and how you would work with other teams within Oracle to implement secure solutions on leading cloud platforms.
- Innovation: Be prepared to discuss your approach to innovation and how you would stay up-to-date with the latest trends in cybersecurity.
Portfolio Presentation Strategy:
- Security Assessment Reports: Highlight reports from previous security assessments, with a focus on the methodology used and the recommendations made.
- Architecture Design Documents: Showcase zero trust architecture design documents, with a focus on the multi-layered model and the security technologies used.
- Customer Engagement Case Studies: Provide case studies demonstrating your ability to engage with customers and deliver high-quality services that exceed expectations.
📝 Enhancement Note: The technical questions for this role are designed to assess the candidate's cybersecurity expertise, with a focus on security assessments, identity lifecycle management, and zero trust architecture. The company & culture questions are designed to assess the candidate's cultural fit and how they would contribute to Oracle's security culture. The portfolio presentation strategy is designed to showcase the candidate's security assessment reports, architecture design documents, and customer engagement case studies.
📌 Application Steps
To apply for this cloud security architect position:
- Submit your application through the application link provided.
- Customize Your Portfolio: Tailor your portfolio to highlight your security assessment reports, architecture design documents, and customer engagement case studies, with a focus on the specific requirements of this role.
- Optimize Your Resume: Highlight your relevant experience and skills, with a focus on security assessments, identity lifecycle management, and zero trust architecture.
- Prepare for Technical Interview: Brush up on your security assessment methodologies, your approach to zero trust architecture, and your ability to engage with customers and deliver high-quality services that exceed expectations.
- Research Oracle: Familiarize yourself with Oracle's security culture, collaboration style, and approach to innovation, with a focus on how you would contribute to it in your role as a cloud security architect.
⚠️ Important Notice: This enhanced job description includes AI-generated insights and web development industry-standard assumptions. All details should be verified directly with the hiring organization before making application decisions.
Application Requirements
The candidate should have expertise in cybersecurity and experience in assessing security maturity and identifying vulnerabilities. They should also be able to analyze IT infrastructure and develop strategic roadmaps.