University of Chicago-posted 5 months ago
$123,250 - $145,000/Yr
Full-time • Mid Level
Chicago, IL
5,001-10,000 employees
Educational Services

The University of Chicago Information Technology Services is seeking an Information Security Architect to join our Information Security team. The Information Security Architect oversees enterprise security architecture and information security governance; assesses risk, compliance, and control effectiveness; collaborates with stakeholders across the institution to provide technology solutions and promote security awareness; and oversees the security monitoring infrastructure. This role requires expert technical knowledge, strong collaboration and leadership skills, and a deep understanding of the University's technology, culture, and academic mission. This position reports directly to the Director of Information Security, and works alongside the Security Operations and Engineering, Information Assurance, and Identity and Access Management teams.

  • Designs and oversees the University's enterprise security architecture, ensuring alignment with research requirements, administrative operations, and educational technology needs.
  • Develops and maintains security policies, standards, procedures, and guidelines that provide robust protection, ensure compliance with industry best practices and regulatory requirements, and meet the unique needs of an academic environment.
  • Leads cross-functional teams to conduct in-depth information technology risk and compliance assessments for major IT initiatives.
  • Monitors and assesses the effectiveness of existing security architecture, governance, and operations.
  • Reviews and approves security designs for new projects and system changes.
  • Provides strategic leadership and expert guidance on security trends, technologies, and services.
  • Collaborates with stakeholders including researchers, administrative staff, and IT teams to understand requirements and provide solutions with appropriate security controls.
  • Collaborates with higher education peers in identifying and sharing best practice solutions.
  • Promotes information security awareness across the institution.
  • Designs and oversees the information security and compliance monitoring infrastructure.
  • Provides technical leadership for all phases of the incident response lifecycle.
  • Monitors threat intelligence and emerging security trends to ensure the University's security posture remains robust and adaptive.
  • Uses depth and breadth of IT expertise to develop and implement security and compliance policies, guidelines, and safe practices for university-wide computing and networking systems.
  • Leads teams to conduct in-depth information technology risk assessments; makes recommendations and designs improvements to IT security procedures.
  • Solves complex problems relating to user security needs and supports the implementation of procedures to accommodate them. Ensures that the user community understands and adheres to necessary procedures to maintain security.
  • Performs other related work as needed.
  • Minimum requirements include a college or university degree in related field.
  • Minimum requirements include knowledge and skills developed through 7+ years of work experience in a related job discipline.
  • Certified Information Systems Security Professional (CISSP) - International Information System Security Certification Consortium, SANS GIAC Certification - Global Information Assurance Certification
  • Bachelor's degree in computer science, cybersecurity, information technology, or a relevant field.
  • Three or more years of experience as an architect in information technology.
  • Certification demonstrating broad security industry knowledge, such as CISSP or GSEC.
  • Certification demonstrating expertise in a specific technology domain, such as security architecture or cloud computing.
  • Expertise in common security frameworks and compliance standards, including NIST CSF, NIST 800-53, NIST 800-171, HIPAA, FedRAMP, and CMMC.
  • Expertise in fundamental network and communication technologies including TCP/IP, HTTP, TLS, x.509, and DMARC.
  • Analyze information provided by common security tools used to monitor networks, endpoints, cloud platforms, email security, and vulnerabilities.
  • Create network diagrams, threat models, data flow diagrams, and related artifacts used for risk assessment and threat analysis.
  • Understanding of the Secure Software Development Lifecycle.
  • Understanding of native tools provided by AWS, Azure, and GCP for monitoring, management, and compliance.
  • Understanding of common threat actor tools, techniques, and procedures.
  • Understanding of all phases of security incident response.
  • The University of Chicago offers a wide range of benefits programs and resources for eligible employees, including health, retirement, and paid time off.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service