Information Security Architect
Listed on 2026-02-19
-
IT/Tech
Cybersecurity, Systems Engineer
Please Note:
This is a Utah-based hybrid position which will require some regular in-office days each week. Additionally, employment with Bamboo
HR is contingent on passing both a background and credit check.
The Information Security Architect will lead hands-on security architecture design across Bamboo
HR’s cloud environment and corporate information systems, partnering with engineering, IT, and security teams to embed security into platforms, processes, and day-to-day technology decisions. A typical day includes leading architecture and design reviews, defining secure cloud and corporate security patterns, advising on identity and data protection strategies, and guiding teams through complex security tradeoffs to enable secure, scalable delivery. The Information Security Architect will own outcomes across cloud and corporate security architecture, delivering scalable designs, standards, and measurable risk reduction.
This role operates with a high degree of autonomy and influence, partnering across engineering, IT, product, and security to embed security into how Bamboo
HR designs, builds, and operates.
- Lead the design and evolution of security architecture across cloud infrastructure, SaaS platforms, and corporate information systems, ensuring solutions are secure-by-design, scalable, and operationally sustainable.
- Own and maintain security architecture standards, reference architectures, and secure design patterns spanning identity and access management, data protection, logging/telemetry, endpoint security, and third-party integrations.
- Conduct and lead security architecture reviews for new systems, material changes, vendor tools, and integrations; document decisions, required control outcomes, and implementation guidance that teams can execute.
- Drive threat modeling and architectural risk assessments for strategic initiatives; translate findings into prioritized remediation plans and architecture improvements that balance risk reduction with usability and delivery velocity.
- Define and validate cloud security control expectations, including IAM, network segmentation, encryption and key management, secrets management, centralized logging, and least-privilege access models; validate adoption through partnership with engineering and IT.
- Influence detection and response architecture in collaboration with Sec Ops to improve visibility, telemetry quality, and response effectiveness; support investigations by providing architectural context and remediation guidance as needed.
- Partner with Security Engineering, Application Security, Security Operations, and GRC to ensure security controls are consistently designed and implemented across prevention, detection, response, and governance/audit domains (e.g., SOC 2, ISO 27001, and customer requirements).
- Create clear and accessible architecture documentation (standards, diagrams, patterns, decision records) and communicate security tradeoffs effectively to both technical and non-technical stakeholders.
- Mentor and guide security practitioners and cross-functional partners by improving shared understanding, raising architectural maturity, and promoting consistent adoption of security patterns and secure-by-default approaches.
- Demonstrate an AI-forward mindset by actively using AI tools to improve productivity, quality, and decision-making in security architecture and engineering workflows, and speak to real-world examples of using AI to conduct work and to design and implement practical, secure solutions.
- Bachelor’s degree in Information Security, Computer Science, Information Systems, or a related field, or equivalent professional experience.
- 6–7+ years of hands-on experience in information security, security engineering, cloud security, or closely related roles.
- Demonstrated experience leading security architecture or design decisions for production cloud and/or corporate environments.
- Strong working knowledge of at least one major cloud platform (AWS, Azure, or GCP), including IAM, networking, encryption, key management, and logging.
- Practical experience across corporate security domains such as identity and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).