Hallmark-posted 10 days ago
$115,000 - $150,000/Yr
Full-time • Mid Level
Remote • Kansas City, MO
5,001-10,000 employees

The Information Security Architect is responsible for designing, implementing, and managing the security infrastructure of an organization's IT systems. This role involves developing security standards and best practices, ensuring compliance with regulations, and actively protecting the organization's data and networks from security breaches. The ideal candidate will have a deep understanding of information security concepts, experience with security technologies, and the ability to think strategically about the evolving threat landscape.

  • designing, implementing, and managing the security infrastructure of an organization's IT systems
  • developing security standards and best practices
  • ensuring compliance with regulations
  • actively protecting the organization's data and networks from security breaches
  • At least 10 years of combined Information Technology and Information Security experience
  • At least 3 years of experience in information security, network security, or a related field (or equivalent high impact work. i.e. full system overhauls, architecture migrations, cloud migrations etc.)
  • Experience with Cloud computing technologies (Ex: EC2 virtual machines, Virtual Networks, Direct Connect, Firewalls, IAM)
  • Hands-on experience building cloud environments
  • Experience with network communications (TCP/IP, Routing, DNS)
  • Experience collaborating, educating, and developing security architects
  • Certifications: CISSP, CISM, GCP Associate/Professional, CCSK, OSCP
  • Knowledge of NIST Cyber Security Framework
  • CIS Security Framework
  • ISO 27001/27002 Framework
  • GDPR, HIPAA, PII, PCI
  • Knowledge of Cloud Governance
  • Ability to develop automation scripts
  • Cryptography knowledge of encryption algorithms, key management, and secure communication protocols
  • Experience conducting risk assessments, vulnerability analyses, and threat modeling
  • DLP – Data loss protection methods and technologies
  • Cyber Threat Intelligence with the collection, analysis, and dissemination of information about cyber threats and actors
  • Security Engineering best practices
  • Privileged access Management technologies
  • Linux or UNIX–based operating systems, including command line interfaces
  • Enterprise security software vendor assessments
  • Hands-on-keyboard experience conducting penetration testing
  • Hands-on-keyboard experience conducting vulnerability scans
  • Coding skills including any of the following: C#, HTML, Shell, Python, PowerShell
  • Strong problem-solving and troubleshooting skills with experience exercising experienced judgment
  • Advanced administration skills for Windows and/or Unix systems
  • Strong understanding of Red Team, Blue Team and Purple Team testing
  • Strong understanding of threat vectors and Cyber-attack patterns
  • Familiarity with open source, custom or proprietary software
  • Teraform scripting language
  • Zero Trust Tooling (Zscaler, Guardicore, Illumio, etc)
  • AWS, Azure, GCP cloud technologies
  • Checkpoint products (Dome9/Harmony and CloudGuard)
  • Lucid Charts / Visio
  • WAF technologies (Akamai, Incapsula, AWS Shield, etc.)
  • SIEM and logging technologies
  • Proxy technologies
  • Detail oriented
  • Meticulous approach to identifying potential vulnerabilities and ensuring compliance
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service