Taal wijzigen

Systems Security Architect


  • Locatie Rotterdam
  • Ervaring 2 - 20 jaar
  • Dienstverband Vast

Systems Security Architect

This organization provides a comprehensive mobile payment solution to banks and retailers worldwide. For this they use Host Card Emulation (HCE) and tokenization to empowering organisations to become their own Token Service Provider (TSP).

Their new invention Unified Payment Platform enable retailers to digitize credit cards, gift cards, loyalty points and coupons into a single secure mobile wallet, creating a frictionless shopping experience for consumers.

The organization has been providing mobile payment solutions since 2007 and has built up a lot of experience  in the field of international implementations. The products are integrated into tens of billions of devices and systems, powering and securing diverse applications, including Big Data, Internet of Things (IoT), mobile, consumer and media platforms. 

Due to the recent growth they are expanding the enthusiastic team. They are looking for a:

Systems security architect in charge of threat modelling and architecture, design and specification of security solutions for the existing and new product lines including IoT Security Services and CryptoManager Infrastructure and Key Provisioning Services.


The successful candidate will be located in the Netherlands, reporting into the Cryptography Products Group -- Security Architecture Team.

The team is in charge of security architecture for all new product introductions, threat modelling, security architecture specifications, security analysis, internal security consulting, external security advice and technical pre-sales support. Security Research and innovation are also part of the main missions of the Security Architecture Team. 


Systems security architect/expert knowledgeable in:

  • Software and Server Systems
  • Cloud infrastructures for the IoT (AWS IoT, Azure, ...)
  • Back-end infrastructures
  • Secure datacenter
  • Familiarity with HSMs
  • CloudHSM or KMS solutions
  • Cryptographic protocols, TLS, IPSEC, etc.
  • Key management and key lifecycle
  • Ability to write specifications and security architecture documents
  • Hands-on prototyping and experimenting with all of the above