Information Security Architect

T White ParkerSalt Lake City, UT
Onsite

About The Position

T. White Parker is an IT and management solutions firm with over 20 years of experience in preventing failures and delivering outcomes for our public and private sector clients’ programs, operations, and digital transformations. Within our Zero Trust & Cybersecurity Practice, we don't just support missions, we protect them. Our cyber professionals work directly with senior leaders to shape security architecture and engineering solutions that keep critical operations resilient and secure. We bring the discipline and rigor of high-stakes environments to every engagement, and we hold ourselves to that standard regardless of sector or client. If you're the kind of professional who can walk into a room with a CISO, assess what's broken, and build what's needed to fix it, you'll fit here. We are a small, high-performing team where your expertise will be visible, valued, and consequential. No bureaucracy between you and the work. We hire for careers, not engagements, and offer competitive compensation, unlimited PTO, and a culture built on excellence, integrity, and doing the work right. T. White Parker seeks an Information Security Architect to serve as the primary security architecture authority for a private sector healthcare client in Salt Lake City, UT. This is a client-embedded role spanning four core functions: security architecture and design; AI security architecture; solution review and technical assurance; and governance, risk, and compliance (GRC) advisory. The architect will operate as a trusted advisor to the client’s CISO, CIO, and senior leadership, shaping enterprise security posture, guiding high-impact technology decisions, and building the credibility that earns the client’s trust in our ability to prevent failures and deliver outcomes.

Requirements

  • Bachelor’s degree in Cybersecurity, Information Technology, or related field.
  • 8+ years of relevant and current security architect experience (5+ years of relevant experience with a relevant Master’s degree)
  • Deep understanding of enterprise and federal security standards, including CIS, CSA CCM, ISO/IEC 27001, NIST SP 800 series (27, 30, 37, 53, 60, 171, 207)
  • At least one of the following certifications: CISSP, CISSP-ISSAP, CSSLP, CASP+CE, CISM, CEH, CND, GCIA, GCIH
  • Proven experience in data protection and privacy engineering with an emphasis on PII/PHI, HIPAA compliance, tokenization, and de-identification techniques
  • Excellent oral and written communication, analytical, and problem-solving skills
  • Executive-facing presence and communications skills
  • Exceptional interpersonal and communication skills, with the ability to collaborate effectively across teams and influence stakeholders at all levels
  • Excellent strategic thinking capability to solve problems for the entire organization
  • Self-starter, proactive, detail-oriented, organized, quality-focused, and team player
  • Ability to effectively interface and communicate with stakeholders at all levels
  • Ability to architect identity-driven, Zero Trust environments, secure a Microsoft-heavy enterprise, understand cloud + SaaS risks, design logging and detection visibility, and work with engineers, not just auditors
  • Proficiency in Microsoft Office suite

Nice To Haves

  • Experience and proficient knowledge in Zero Trust, Microsoft 365, Entra ID/Active Directory, Intune, GitLab, SaaS Security, Palo Alto Networks, Jira, Splunk, ELK, SQL databases, SAML/OIDC/OAuth2, PAM, secrets management patterns

Responsibilities

  • Lead the design and enhancement of security architecture and security systems in IT and laboratory instrument systems.
  • Collaborate with systems, application, and data owners and infrastructure teams to architect, design, and implement pragmatic security solutions.
  • Define and document standards in Security Requirement Guides (SRGs) and Security Technical Implementation Guides (STIGs).
  • Provide authoritative guidance on security architecture, including recommendations on controls, design patterns, and risk mitigation strategies.
  • Deliver authoritative guidance for operating system hardening, patching, and technical control selection grounded in STIGs and NIST publications.
  • Evaluate, select, and maintain security frameworks for cloud and on-premises infrastructure, including AWS and Azure environments, ensuring alignment with NIST and enterprise security policy.
  • Ensure proposed IT solutions align with client security policies, SRGs, and applicable regulatory requirements.
  • Review system and cloud (AWS, AZURE) configurations for compliance with NIST and enterprise-level security policies.
  • Partner with IT, Informatics, Legal, Compliance, and business stakeholders to ensure AI adoption aligns with the organization’s security policies and regulatory obligations, with particular attention to use cases involving regulated, research, or protected health information (PHI) data.
  • Define and maintain security architecture principles and guardrails for artificial intelligence and machine learning systems, aligned with the organization’s security policy, risk tolerance, and applicable regulatory obligations, including NIST-based frameworks.
  • Assess AI-related risks, including data leakage, model misuse, training data exposure, intellectual property risks, and third-party AI dependencies.
  • Review AI solution designs to ensure appropriate controls are applied for data classification, identity and access management, model integrity, and logging and auditability.
  • Provide expert-level expertise in architecting, designing, implementing, and maintaining highly available, scalable, and secure AI solutions in the cloud and on-premises.
  • Support enterprise stakeholders by ensuring alignment of proposed IT solutions with established security policies, SRGs, and regulatory requirements.
  • Lead threat modeling exercises to proactively identify vulnerabilities and design mitigations.
  • Champion secure Software Development Life Cycle (SDLC) practices across all development initiatives.
  • Assess vendor and product risks to ensure compliance with security requirements.
  • Design and enforce architecture governance to maintain consistency and compliance across enterprise systems.
  • Participate in architecture review boards, technical design reviews, and proof-of-concept evaluations to assess security impacts, design soundness, and compliance with enterprise security requirements; serve as advisor for high-risk or high-impact technology initiatives.
  • Perform security audits and security risk assessments and support authority-to-operate (ATO) decisions, and security exception evaluations by providing architectural risk analysis and recommendations.
  • Collaborate with GRC functions to ensure architectural decisions align with regulatory, audit, and compliance expectations.
  • Translate security policies, standards, and control requirements into clear, actionable technical guidance for engineering and IT teams; act as a trusted security advisor across IT, Informatics, Engineering, Legal, Compliance, and business stakeholder groups.
  • Proactively ensure clients are ecstatic about T. White Parker’s support and solutions.
  • Stay abreast of industry developments and maintain a command of the expertise required to successfully deliver for the client.

Benefits

  • competitive compensation
  • unlimited PTO
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service