×
Register Here to Apply for Jobs or Post Jobs. X

Security Architect

Remote / Online - Candidates ideally in
Washington, District of Columbia, 20022, USA
Listing for: AAMC
Remote/Work from Home position
Listed on 2026-01-04
Job specializations:
  • IT/Tech
    Cybersecurity, Data Security
Job Description & How to Apply Below

3 days ago Be among the first 25 applicants

Who We Are

The Association of American Medical Colleges is a not-for-profit association dedicated to transforming health care by supporting the entire spectrum of medical education, medical research, and patient care conducted by our member institutions. We are dedicated to the communities we serve and steadfast in our goal to improve the health of all.

Benefits
  • Remote Work – Fully remote work available for most positions
  • Retirement Savings – Generous 403(b) employer contributions and financial wellness resources, including professional financial advising.
  • Health & Wellness Perks – Fitness and bicycle subsidies, on‑site and virtual wellness programs (live yoga, meditation, mental health webinars, flu shot clinics, and more)
  • Support & Family Care – Employer paid Employee Assistance Program (EAP) and backup care options for children, adults, elders, and even pets

Additional information can be found on our website.

Why us, why now?

The Security Architect leads the design and oversight of enterprise security architecture to protect organizational data, infrastructure, and member information. This role ensures security principles, best practices, controls, and frameworks are embedded into business systems, cloud services, and infrastructure in alignment with regulatory, compliance, and organizational requirements. It provides strategic leadership over data security architecture, including data classification, data protection controls, secure data flows, encryption, tokenization, masking, and access governance across the enterprise.

This is a hands‑on role that performs direct engineering activities across cloud and security platforms, including the implementation of cloud‑native security controls, secure configuration of AWS and SaaS services, hardening of identity and access models (including role‑based access controls (RBAC) and least privilege), and deployment of automated guardrails and security tooling. The position also conducts hands‑on testing, validation, and tuning of cloud security services such as Cloud Security Posture Management, Cloud Infrastructure Entitlement Management, Cloud Workload Protection Platform, logging pipelines, and security detections.

The role also converts best practices into formal security policies and standards. The Security Architect acts as a strategic partner and trusted advisor to IT leadership, providing guidance that balances security, compliance, and operational priorities by understanding problems or opportunities and delivering value‑add solutions. This includes advising on the secure design of data repositories, analytics platforms, and integrations to ensure confidentiality, integrity, availability, lifecycle protection, and appropriate handling of sensitive information across both on‑premises and cloud environments.

How

will you make an impact? Design And Oversee Enterprise Security Architecture
  • Lead the development and enforcement of security principles, best practices, and frameworks across business systems, cloud services, and infrastructure.
  • Ensure alignment with regulatory, compliance, and organizational requirements.
Data Security Leadership And Implementation
  • Lead initiatives for data classification, encryption, tokenization, and access governance.
  • Advise on secure design and handling of sensitive information across enterprise, including analytics platforms and integrations.
  • Ability to map security requirements to the data lifecycle.
Hands‑on Cloud Security Engineering
  • Implement cloud‑native security controls and harden configurations in AWS, Azure, and third‑party SaaS platforms.
  • Deploy automated guardrails, security tooling, infrastructure as code, and logging/monitoring pipelines.
  • Conduct hands‑on testing, validation, and tuning of cloud security services (CSPM, CIEM, CWPP, etc.).
Threat Modeling, Risk Assessment, And Control Validation
  • Conduct threat modeling to identify potential risks across systems and cloud environments.
  • Assess risks, vulnerabilities, and controls; recommend remediation strategies for enterprise and cloud environments.
Policy, Standard, And Framework Development
  • Convert best practices into formal…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary