About The Position

The Security Architect role is part of our IT job family. This job family includes a collection of roles that are responsible for managing, designing, and implementing security measures to protect our company's computer networks and systems. Job Description: The Security Architect is responsible for the communication and implementation of a secure architecture and strategy to secure information assets and cloud services. They work with the enterprise security architect (or independently) to learn and define security controls for various PaaS services offered by CSP's (Cloud Service Providers). They evaluate security technologies for cloud environments to implement security controls in the most streamlined and integrated manner. The Cybersecurity Architect is responsible for designing, implementing, and maintaining secure architecture across the organization with a strong focus on networking. This role ensures that security is embedded in all aspects of identity, data, applications, and operations, aligning with Zero Trust principles and enterprise governance frameworks.

Requirements

  • BA or BS degree in Information Security, Cyber Security, Computer Science, or related fiel
  • 10+ years of experience in Enterprise Architecture / Security Architecture industry experience
  • Demonstrated experience in delivering enterprise and domain security architectures and strategy.
  • Deep knowledge of system, application, and infrastructure (network, cloud) security architecture.
  • Expertise in network architecture, including Zero Trust architectures, vulnerability assessment, encryption standards, and secure data handling
  • At least 5 years of hands-on networking/cloud networking experience & cloud workloads (Azure, GCP, AWS).
  • Excellent written and verbal communication skills.
  • Ability to communicate effectively with a broad cross-section of personnel to explain and ensure security measures.

Nice To Haves

  • Proficient in Identity and Access Management (IAM) solutions, multi-factor authentication (MFA), and modern security technologies like SIEM, IDS/IPS, DLP, and endpoint protection.
  • Certified in at least one recognized industry security certification: e.g., CISSP, cloud vendor security certifications, etc.

Responsibilities

  • As a member of the Information Security Architecture Team, actively shape enterprise security architecture, aligning with business objectives, enterprise strategies, and the evolving cyber threat landscape.
  • Design and maintain comprehensive security architectures for key security capabilities (i.e. Cloud Security, Network Security, Identity and Access, Endpoint, Logging and Monitoring, etc).
  • Define and vet secure architecture for cloud workloads, networking, data, and applications.
  • Provide technical leadership and security expertise to IT and business teams in designing and implementing secure and resilient solutions according to policy, standards, industry best practices and SDLC processes.
  • Design Zero Trust-aligned architectures based on the cloud Security Benchmark, Cloud Adoption Framework (CAF), and Enterprise-Scale Reference Architectures.
  • Consult on “security by design” into DevOps and CI/CD pipelines using automation policy-as-code, and continuous compliance.
  • Support forums with management teams to communicate security strategies across all business units, influencing decision-making processes by interacting with executive leadership.
  • Collaborate with Detection and Response partners to align detection, response, and identity/device security practices.
  • Lead security risk assessments and threat modeling for new workloads and services.
  • Develop and maintain cloud security governance frameworks aligned to NIST Cybersecurity Framework, Azure Security Benchmark, and CIS Controls.
  • Define and enforce Azure Policy and Blueprints for compliance automation and regulatory reporting (NIST 800-53, ISO 27001, SOC 2, etc.).
  • Support audits, remediation plans and overall maturity.
  • Evaluate emerging AI-based security technologies to strengthen detection, response, and automation.
  • Drive architecture improvements that reduce vulnerabilities, minimize attack surface, and optimize cloud posture.
  • Promote best practices through documentation, training, and architecture reviews.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service