Information Security Sr Advisor

Elevance HealthIndianapolis, IN
Hybrid

About The Position

Develops, recommends, and implements enterprise information security policies, technical standards, guidelines, procedures, and other elements of an infrastructure necessary to support information security in compliance with established company policies, regulatory requirements, and generally accepted information security controls. This role will be responsible for designing, implementing, and supporting enterprise key management and data protection solutions across hybrid and cloud environments. The ideal candidate will combine deep technical expertise in encryption technologies with strong solution engineering and stakeholder engagement skills.

Requirements

  • Requires BS/BA in information Technology or related field of study and a minimum of 8 years experience in systems administration and security aspects of information systems, access management and network security technologies, network communications, computer networking, telecommunications, systems development and management, hardware, software, data, and people; experience with multiple technical and business disciplines required; requires broad-based experience to plan and design highly complex systems; or any combination of education and experience, which would provide an equivalent background.
  • Must be capable of providing top-tier support for 5 or more of the information security technology common body of knowledge skill sets: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security

Nice To Haves

  • Thales certifications (CipherTrust, Luna HSM, etc.) preferred
  • Experience with container and DevOps environments (Kubernetes, CI/CD pipelines) preferred
  • Familiarity with secrets management tools (HashiCorp Vault, CyberArk, etc.) preferred
  • Experience with tokenization and data masking technologies preferred
  • Security certifications such as CISSP, CISM, or CCSP preferred
  • Hands-on experience with: Thales CipherTrust Manager (CTM)
  • Thales HSMs (e.g., Luna HSM)
  • Enterprise key management and encryption platforms
  • Strong understanding of: Cryptographic algorithms (AES, RSA, ECC, SHA-2/3)
  • PKI concepts and certificate lifecycle management
  • KMIP protocol
  • TLS/SSL and secure communications
  • Experience integrating encryption solutions in cloud environments (AWS KMS, Azure Key Vault, GCP KMS) preferred
  • Knowledge of compliance frameworks and cryptographic regulatory requirements preferred
  • Strong troubleshooting and root cause analysis skills preferred

Responsibilities

  • Leads system and network architecture support for information and network security technologies
  • Leads development and execution of risk assessment methodologies to fit business, regulatory, and technical environment considerations
  • Leads the development of requirements, system architecture, and software design of security products and services
  • Leads the development of strategies for discovery, evaluation and response to new networking attacks
  • Develops security incident response plans and strategies
  • Provides trouble resolution and serves as point of technical escalation on complex problems
  • Creates presentations and seeks IT management approval and acceptance of significant replacements or reconfigurations of major security systems serving the Enterprise
  • Sets vendor strategy and direction
  • May be assigned to project teams for technical consultation to business partners and developers
  • Designs & engineers comprehensive access management and network security technical solutions based on business requirements and defined technology standards; works with architecture to update technology direction & strategy
  • Develops reports supporting strategy and direction for management
  • Capable of serving as technical merger & acquisition lead
  • Acts as a subject matter expert among peers, with manager and senior management
  • Design, deploy, and maintain enterprise encryption and key management solutions using Thales CipherTrust Manager (CTM) and related Thales products (HSMs, key vaults, tokenization, etc.).
  • Architect secure key lifecycle management processes, including key generation, rotation, escrow, revocation, and destruction.
  • Integrate encryption and key management solutions with enterprise applications, databases, cloud platforms (AWS, Azure, GCP), and on-prem systems.
  • Implement and support KMIP integrations and API-based key management solutions.
  • Partner with security architecture, DevOps, infrastructure, and application teams to ensure encryption best practices are embedded into system designs.
  • Conduct encryption posture assessments and recommend remediation plans.
  • Support compliance initiatives (PCI-DSS, HIPAA, SOX, GDPR, etc.) related to data protection and cryptographic controls.
  • Troubleshoot and resolve complex encryption and key management issues.
  • Develop technical documentation, architecture diagrams, and operational runbooks.

Benefits

  • a comprehensive benefits package
  • incentive and recognition programs
  • equity stock purchase
  • 401k contribution
  • paid holidays
  • Paid Time Off
  • incentive bonus programs
  • medical
  • dental
  • vision
  • short and long term disability benefits
  • 401(k) +match
  • stock purchase plan
  • life insurance
  • wellness programs
  • financial education resources
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service