Enterprise Security Architect
Listed on 2025-12-02
-
IT/Tech
Cybersecurity, Information Security, IT Consultant
Thank you for your interest in our company! To apply, click on the button above. You will be required to create an account (or sign in with an existing account). Your account will provide you access to your application information. The email address used in establishing your account will be used to correspond with you throughout the application process. Please be sure and check the spam folder.
You may review, modify, or update your information by visiting and logging into your account.
SUMMARY:
In conjunction with and/or at the direction of CISO, responsible for the overall "health & wellness" of security infrastructure related to enterprise networks and data systems; plans, coordinates, and implements security measures to safeguard data information against accidental or unauthorized modification, destruction, or disclosure by performing the following duties.
ESSENTIAL DUTIES & RESPONSIBILITIES:Security Environment Analysis:
- Responsible for the analysis & approval of business requirements associated with information security systems and/or processes.
- Translates security design based on business requirements into functional processes while maintaining controls set forth by information security policies/procedures.
- Develops and recommends new or enhanced security and system designs, including documentation of functional specifications for system configuration and supports system requirements as business processes evolve and system enables are identified.
- Responsible for the documentation and maintenance of security systems to include change management processes and tracking requests ensuring on‑going changes and developments and upgrades to systems are performed.
- Designs and develops tests, document testing results for newly created functionality associated with system maintenance, enhancements and upgrades to ensure all systems changes are successfully implemented.
- Plans, researches, designs, analyzes, estimates, identifies options, recommends, installs, tests, schedules, implements, administers, documents, monitors, tunes performance and maintains all primary and auxiliary technical architecture across all information security system platforms as related to assigned areas of specialty to ensure the integrity, security, availability, reliability, and performance of enterprise network & data systems to meet client needs and expectations.
- Evaluates and recommends new information security system products or services related to technical architecture to management as needed for developing, monitoring, and maintaining line of business & corporate support unit strategic/tactical plans conforming to the vision, mission, values, and objectives of the organization.
- Confers with management, programmers, risk assessment staff, auditors, facilities, and security departments and other personnel to identify and plan for data security for data, software applications, hardware, telecommunications, and computer installations.
- Develops and implements tests of computer systems to monitor effectiveness of security.
- Develops, coordinates, and implements disaster or emergency recovery procedures for information security systems to assure business continuity/disaster recovery.
- Assists in the development of information security policy and procedures.
- Analyze systems, network, and applications security and recommend/develop security measures to protect information against unauthorized access, modification, and/or loss.
- Works closely with Project Management Office (PMO) through Strategic Services to ensure that all new IT‑related projects are reviewed for security prior to rollout.
- Develops and conducts information security risk assessments, reports findings and recommends corrective action, in applicable, to management.
- Coordinates & oversees information security third‑party service providers to validate contracted services are provided according to contract and/or service level agreements.
- Supports Internal Auditor and contracted audit vendors related to information security audits and testing of controls
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).