Manages solution design from conception, through ARB, to delivery Primarily responsible for producing architect ure documentation for security applications as assigned and as projects and programs of work dictate Maintains First Horizon’s Security Architect ure Pattern Inventory (across identity, data, application, network, and cloud) as a member of the Core Enterprise Architect ure Team Leads security design workshops and POC efforts for new ( security ) capabilities Validates 3rd Party/Vendor Solutions for security concerns Aligns Information Security Technology strategy and planning with First Horizon’s business goals and objectives Promotes the use of a shared infrastructure and application roadmap to reduce costs and improve how assets are secured Builds and maintains technical trusted advisor relationships with influential technical decision makers within Technology Works with engineers to ensure that technical solutions as delivered align with Information Security Standards and Policies Works with Portfolio technology leaders to include IT Risk and Security Exception initiatives in portfolio roadmap Manage Encryption Standards: key management, tokenization for payments, DLP/classification/handling; architect PCI DSS segmentation boundaries and compensating controls. Manage Network/Zero Trust Standards: microsegmentation across Azure and colocation; secure branch/office connectivity; define workload identity and continuous verification patterns; enforce least privilege. Detection/telemetry: Publish Splunk logging schema, retention, and correlation strategies; onboard logs from Azure, Colo, API Gateways, IAM, CyberArk, MFaaS, and core platforms; drive ATT&CKâaligned detections and forensic readiness. Secure SDLC and supply chain: Operationalize threat modeling; collaboratively define CI/CD control overlays with DevOps; establish artifact signing/SBOM standards; ensure secrets handling and container/Kubernetes baselines where applicable. Governance and risk: Maintain control overlays mapped to FFIEC/GLBA/PCI/NIST; lead design reviews; manage exceptions with remediation timelines; produce audit-ready decision records in partnership with the CISO team. Payments and third-party/SaaS: Define intake and security requirements for MFaaS, Salesforce, ServiceNow, FIS/Fiserv/Bottomline integrations—identity, logging, data handling, and PCI scoping. Physical security integration: Align building access, video, and visitor systems with identity and logging patterns; coordinate incident playbooks with Corporate/Physical Security . Enablement and influence: Mentor senior architect s and engineering associates; lead communities of practice; communicate strategy, benefits, and trade-offs to executives and delivery teams.