Cybersecurity Architect

First InterstateBend, OR
$107,910 - $178,090

About The Position

The Cybersecurity Architect leads and supports the Chief Information Security Officer in maintaining visibility and providing oversight and guidance of technical cybersecurity aspects of projects, products, systems, applications, and services. This position collaborates with the Enterprise Architecture team to understand business goals and objectives and provide leadership to guide technology towards secure configuration and management. Also, this position creates deliverables for managing the security architecture of systems and technology throughout the organization.

Requirements

  • Knowledge and experience with financial regulations such as Payment Card Industry Data Security Standard (PCI-DSS), Sarbanes-Oxley (SOX), Privacy Practices, Gramm-Leach-Bliley Act (GLBA), NIST Cybersecurity Framework (CSF), Center for Internet Security (CIS) Critical Security Control, and other cybersecurity frameworks, architecture, and technology.
  • Experience in using architecture frameworks such as The Open Group’s TOGAF.
  • Direct, hands-on experience or strong working knowledge of managing security infrastructure such as firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), endpoint protection, SIEM and log management technology, and vulnerability management tools.
  • Knowledge on defense in depth and zero-trust network architecture (ZTNA).
  • Full-stack knowledge of IT infrastructure: Applications, Databases, Operating Systems (Windows, Unix, and Linux), Hypervisors, IP Networks (WAN and LAN), Storage Networks (Fibre Channel, iSCSI, and NAS), Backup Networks and Media, Containers/Kubemetes, Public Cloud Services, and Securing Public Cloud Services.
  • Knowledge of various aspects of an enterprise technology architecture like business, information, data, network, and security.
  • Understanding and knowledge of system development life cycle methodologies (such as waterfall, spiral, agile software development, rapid prototyping, incremental, synchronize and stabilize, and DevOps).
  • Understanding and knowledge of IT standards and controls.
  • Excellent understanding of application development methodologies and infrastructure and network architecture.
  • Excellent analytical, planning, organizational, and technical skills.
  • Excellent written and verbal communication skills.
  • Skilled at influencing, guiding, and facilitating stakeholders and peers with decision-making.
  • Ability to articulate new ideas and concepts to technical and nontechnical audiences.
  • Ability to understand the long-term ("big picture") and short-term perspectives of situations.
  • Ability to translate future-state business capabilities and requirements into solution architecture requirements.
  • Ability to propose and estimate the financial impact of solution architecture alternatives.
  • Ability to work creatively and analytically to solve business problems and propose solutions.
  • Ability to quickly comprehend the functions and capabilities of new technologies.
  • Bachelor's Degree in Computer Science, Information Systems, Cybersecurity, or a related field required
  • 4-6 years experience as a Cybersecurity Architect or Engineer, with demonstrated experience designing or building multiple components of IT and/or cybersecurity infrastructure required
  • Regular and Predictable Attendance - Required

Nice To Haves

  • Master's Degree in Computer Science, Information Systems, Cybersecurity, or a related field preferred
  • CISSP Certified Information Systems Security Professional preferred
  • Certified Information Systems Auditor (CISA) preferred
  • Certified Information Security Manager (CISM) preferred
  • Global Information Assurance Certification preferred

Responsibilities

  • Leads the development of roadmaps for strategic planning and long-term goals, ensuring technology is designed and implemented according to cybersecurity best practices and sound enterprise architecture principles for all environments, including cloud and on-premises infrastructure.
  • Creates governing cybersecurity architecture standards, including practices for data encryption and tokenization based on the organization's data classification criteria.
  • Collaborates with the management team to develop or recommend updates to cybersecurity standards to be reviewed and approved by executive management and/or formal authorization by the Chief Information Security Officer (CISO).
  • Leads the creation, development, and maintenance of security architecture artifacts (e.g., models, templates, standards, and procedures), leveraging the Enterprise Architecture tool to integrate security capabilities in projects and operations.
  • Identifies needs and leads performance of appropriate security reviews, identifying gaps in security architecture, and developing a security risk management plan for addressing these gaps.
  • Validates IT infrastructure and other reference architectures for security best practices and recommends changes to enhance security and reduce risks.
  • Establishes and builds relationships with the Enterprise Architecture team to develop and maintain a security architecture process that enables the enterprise to develop and implement security solutions and capabilities aligned with business, technology, and threat drivers.
  • Establishes and builds relationships with the IT management and teams to foster a collaborative environment for defining and ensuring systems are built to baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation, identity, and access management (IAM), and cloud deployments.
  • Guides the collaboration and coordination with the data, security, and architecture teams to document data flows of sensitive information (e.g., PII or ePHI) and recommend controls to ensure adequate security (e.g., encryption and tokenization).
  • Leads the research and coordination with the vendor management (VM) teams’ security assessments of new, prospective, or emerging technologies, especially those with which the organization shares intellectual property (IP) and regulated or protected data. Evaluate statements of work (SOWs) and master services agreements (MSAs) to ensure adequate security protections.
  • Liaises with the internal audit (IA) team to review and evaluate the design and operational effectiveness of security-related controls.

Benefits

  • Generous Paid Time Off (PTO) in addition to paid federal holidays.
  • Student debt employer repayment program.
  • 401(k) retirement plan with a 6% match.
  • medical, dental, vision, short-term and long-term disability benefits and life insurance, flexible spending accounts, health savings account, employee assistance program
  • annual discretionary cash and stock bonuses.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service