Consultant, Cyber Architecture
Listed on 2026-01-12
-
IT/Tech
Cybersecurity, IT Consultant, Systems Engineer, Information Security
Presidio, Where Teamwork and Innovation Shape the Future
At Presidio, we're at the forefront of a global technology revolution, transforming industries through cutting‑edge digital solutions and next‑generation AI. We empower businesses–and their customers–to achieve more through innovation, automation, and intelligent insights.
The RoleAs a Consultant, Cyber Architecture at Presidio, you will be directly involved in reviewing and assessing internal and external customer’s security architectures, identifying risks and making recommendations that are aligned to applicable regulatory requirements and consensus‑based security best practices. This role will have continuous opportunities to challenge and expand your skills, and you will be routinely collaborating with other high‑caliber security professionals on the Cybersecurity architecture team as well as those on other teams such as from our Offensive Security group as well as Information Security Governance group.
TravelRequirements
The role is remote for individuals residing in the Continental United States. Travel is required to client locations to deliver professional services when needed (~25%).
Responsibilities- Lead large security engagements in concert with other Presidio cyber security team members.
- Conduct security architecture discussions with customers to determine architectural and hardening risks with appropriate secure design and technology remediation.
- Assist in developing strategic, operational, and tactical recommendations tailored to each customer with the intent to remediate all identified risks and compliance gaps to improve a customer's security posture and compliance position.
- Work closely with organizations to conduct security architecture and controls assessments based on industry control and security frameworks and standards such as CIS 18, NIST 800-53, NIST Cyber Security Framework (CSF), etc.
- Work with other Cyber Architects in a collaborative setting to support and assist on the execution and delivery of key consulting services.
- Meet project critical success targets for timeliness and customer success metrics.
- Maintain high customer satisfaction.
- Bachelor's degree or the equivalent work experience and/or military experience.
- Minimum 6-10 years’ work experience (some prior consulting experience preferred).
- Certifications:
Relevant security industry certification: CISSP, CISM, CompTIA Security+, ISC2 Certified in Cybersecurity, ISACA Cybersecurity Fundamentals, Cloud certifications (AWS, Azure, GCP, CCSK, CCSP). Networking or security vendor professional certification. - Solid verbal and written communication skills, organizational skills, and attention to detail.
- Ambitious and goal‑oriented, with initiative to work until job is complete.
- Ability to maintain composure and professionalism in all client interactions across various industry verticals.
- Ability to manage multiple clients and cyber engagements in parallel.
- Ability and initiative to work collaboratively in a team environment or independently as a given situation dictates.
- Demonstrated passion for technology, solution design, and self‑study.
- Comfortable leading group presentations or whiteboard sessions.
- Cursory architectural and technical knowledge in all of the following areas with in-depth knowledge in a minimum of two areas:
- Cloud Security
- Experience with at least one of the following cloud platforms: AWS, Azure, GCP.
- Security Controls
- Firewalls
- NAC
- IPS/IDS
- Endpoint
- Content Filter
- VPN
- SIEM
- Identity Security
- Identity & Access Management (IAM)
- Privileged Access Management (PAM)
- IDaaS
- Directory Services
- Cloud Security
- Working knowledge of Zero Trust architecture principles and concepts.
- Ability to provide advisory services and make recommendations regarding network segmentation strategies.
- Demonstrated effective decision‑making skills related to designing and implementing secure architectures.
- Experience securing AI/ML systems, including threat modeling, vulnerability assessment (e.g., adversarial attacks, data poisoning), and supporting integration of AI‑powered security controls within enterprise architectures.
- Solid…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).