Security Solutions Architect
Listed on 2025-12-01
-
IT/Tech
Cybersecurity, Systems Engineer, IT Consultant, Data Security
Join to apply for the Security Solutions Architect role at NBCUniversal
.
NBCUniversal is one of the world's leading media and entertainment companies. We create world‑class content, which we distribute across our portfolio of film, television, and streaming, and bring to life through our theme parks and consumer experiences. We own and operate leading entertainment and news brands, including NBC, NBC News, MSNBC, CNBC, NBC Sports, Telemundo, NBC Local Stations, Bravo, USA Network, and Peacock, our premium ad‑supported streaming service.
We produce and distribute premier filmed entertainment and programming through Universal Filmed Entertainment Group and Universal Studio Group, and have world‑renowned theme parks and attractions through Universal Destinations & Experiences. NBCUniversal is a subsidiary of Comcast Corporation.
We are looking for a Security Architect to be part of the Versant Cyber Security Solutions Architecture team. The Security Solutions Architect is an individual contributor who will partner with the various Versant businesses, enterprise IT, and other Cyber Security teams to ensure technology is designed and deployed securely and aligned with Cyber Security and enterprise technology strategies.
The successful candidate will be joining Versant at an exciting time as we evolve our process and services. The Security Solutions Architect will be conducting security consulting engagements across the businesses and drive process improvements in threat modeling and risk evaluation. In addition to consulting engagements, the security architect will create architecture references, design patterns, and security guidance where needed. They will be a subject matter expert on one or more technical security topics such as cloud or networking and will mentor and serve as a reviewer for other team members building threat models.
Finally, a successful candidate must effectively communicate the importance of critical programs and services within the Versant Cyber Security Organization to obtain support, trust, and buy‑in from the business.
- Ensuring completeness of security engagement requests as part of the intake process
- Researching new/emerging technology, previous security reviews, and security posture details from various Versant security tools
- Engaging in Business IT development & integration projects to ensure security features and controls are embedded
- Contributing to the security architecture review process, working alongside the Cyber Security Architecture Team to conduct threat analysis/modeling and recommend security controls to business areas
- Guiding cybersecurity policy and process requirements to business stakeholders
- Staying current with cyber security trends and technologies, as well as the technology used by the company
- Completing full security reviews of typical applications semi‑independently and on time while applying feedback from other team members
- Minimum 4 years working in positions across cyber security disciplines to include but not limited to Cyber‑focused security assurance or architecture, governance, risk, compliance, audit, information security, and technical training.
- Experience with security and enterprise architecture methodologies.
- Experience with cloud‑based application development and hosting.
- Experience using diagramming tools such as Lucidchart or Visio.
- Understanding of end‑to‑end secure development methodologies and have expertise in one or more tools/methods used to identify security flaws in applications including:
Code Reviews, SAST, DAST, and/or Penetration Testing tools. - Experience with threat analysis frameworks and modeling, such as OWASP, MITRE ATT&CK.
- Experience with varied security controls and regulatory frameworks (PCI‑DSS 4.0, SCF, NIST, SOX, GDPR, CCPA, SOC2, CMMC, etc.) and ability to create an environment where compliance flows from security.
- Able to manage and prioritize multiple projects simultaneously.
- Knowledge of the cyber threat landscape including different types of adversaries, campaigns, and the motivations that drive them and the ability to translate this to defending Versant.
- Strong and proven…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).