Architect, IT Security
Listed on 2026-01-02
-
IT/Tech
Cybersecurity, IT Consultant
Overview
Concentra is recognized as the nation’s leading occupational health care company.
With more than 40 years of experience, Concentra is dedicated to our mission to improve the health of America’s workforce, one patient at a time. With a wide range of services and proactive approaches to care, Concentra colleagues provide exceptional service to employers and exceptional care to their employees.
The Architect, IT Security is responsible for planning, coordinating, and executing projects related to the strategic direction of the Information Security department. This includes identifying necessary resources across functional and technical teams and coordinating the efforts of team members to deliver projects according to plan. The Security Architect should research technologies and solicit input from others to understand the broader business context of situations before finalizing technical recommendations.
Responsibilities of this position include the mentoring of other Information Security staff members.
The Architect, IT Security is challenged with ensuring that projects and new initiatives align with the strategic direction of the Information Security department, while following documented Security and Change Control policies with emphasis on overall data and system integrity. The role is also challenged with evaluating the effectiveness of the state‑of‑the‑art security techniques that are employed to maintain the highest level of security for all platforms and applications maintained by the company.
Responsibilities- Oversee, act and report on any security violations related to the unwarranted access to corporate data.
- Ensure that all issues are resolved in a timely and efficient manner.
- Build team spirit by assisting other staff members and promoting a positive workplace.
- Stay abreast and aware of the rapidly changing environment and recommend cost efficient techniques.
- Recognize potential areas where policies and procedures require change, or where new ones need to be developed, especially regarding future business expansion. Submit recommendations as appropriate.
- Design, implement, and maintain Identity Governance and Administration (IGA) solutions using IBM Security Verify Governance (ISVG).
- Develop and deploy custom integrations with target systems for automated provisioning and deprovisioning of user access.
- Create and manage automation workflows for identity lifecycle management processes to improve operational efficiency and reduce manual efforts.
- Lead and execute ISVG upgrades, including application of fix packs, patches, and configuration updates.
- Administer and optimize the ISVG environment on a Linux‑based platform hosted in AWS (Amazon Web Services).
- Ensure high availability, performance tuning, and disaster recovery readiness of the ISVG infrastructure.
- Collaborate with cross‑functional teams to assess security requirements and develop secure identity solutions aligned with enterprise standards.
- Develop and maintain detailed technical documentation, including architecture diagrams, configuration settings, and operational procedures.
- Conduct regular system health checks, audit logs review, and security assessments to maintain compliance with organizational policies and industry regulations.
- Provide technical leadership and mentoring to junior team members and contribute to the overall security architecture strategy.
- Advance Information Services strategies by researching, recommending, and implementing strategic technical solutions.
- Ensure projects and new initiatives align with the strategic direction of the Information Security department.
- Responsible for ensuring successful integration and/or implementation of applications, systems, and technology.
- Recommends information security and technology strategies, policies, and procedures by evaluating organizational outcomes, identifying problems, evaluating trends, and anticipating requirements.
- Completes projects by coordinating resources and timetables across functional and technical teams.
- Maintains professional and technical knowledge by attending educational workshops, reviewing professional publications, establishing personal networks,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).