×
Register Here to Apply for Jobs or Post Jobs. X

Enterprise Cybersecurity Risk Architect

Job in Orlando, Orange County, Florida, 32885, USA
Listing for: Sun Technologies
Contract position
Listed on 2025-12-18
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant, Data Security
Salary/Wage Range or Industry Benchmark: 120 USD Hourly USD 120.00 HOUR
Job Description & How to Apply Below

Enterprise Cybersecurity Risk Architect Required Skills

CISA, CISSP, Python, SIEM, SQL

Location
  • Orlando, Florida
Duration

Expected 12 months contract to hire

Job Description

Pay Rate: $120/hr the pay rate may differ depending on your skills, education, experience, and other qualifications.

Featured Benefits:

  • Medical Insurance in compliance with the ACA
  • 401(k)
  • Sick leave in compliance with applicable state, federal, and local laws

Job Purpose:

Plays a critical lead role and serves as subject matter expert in the development, maintenance, and governance of a cybersecurity risk architecture that supports CLIENT’s enterprise governance and business strategy. Defines, plans, and implements enterprise strategic cybersecurity initiatives to improve existing infrastructure and governance while shaping the long‑term risk architecture vision. Safeguards the integrity and security of the enterprise by leveraging advanced data analytics to monitor, analyze, and report on cybersecurity compliance, specifically concerning security standards and frameworks.

Primary Functions:

  • Develop, plan and maintain an enterprise cybersecurity risk management architecture that supports CLIENT’s cybersecurity and while enabling business strategy.
  • Partner with leadership to design the framework and guidelines to ensure data privacy and compliance.
  • Participate in the development of a comprehensive cybersecurity strategy, with a focus on risk management, threat detection, and incident response.
  • Create procedures and guidance for security risk assessments, testing, and vulnerability scanning to identify and address potential threats.
  • Ensure that procedural framework for governance is in compliance with regulatory requirements.
  • Work with applicable stakeholders to ensure business alignment of the enterprise cybersecurity controls with the business objectives.
  • Define and document relationships between the components on the different architecture layers, providing traceability and justification.
  • Collaborate with IT Security to successfully blend Information Security Management and Enterprise Risk Management.
  • Identify key risks areas and recommends strategies to address and monitor risk.
  • Partner with leadership on Risk Assessment, Business Impact Analysis, and Risk Mitigation activities.
  • Interview leadership and other stakeholders to determine appropriate risk appetite to ensure risk management processes and plans are in line with CLIENT’s risk appetite.
  • Maintain and monitor the Enterprise Cybersecurity Risk Register and other audit/assessment documentation.
  • Perform security reviews, flag compliance issues, identify gaps and trends in security architecture and recommend remediation strategies.
  • Develop and implement a security risk management plan.
  • Apply knowledge of security risk frameworks to guide the development of analytical routines and compliance checks.
  • Preserve information security features by applying an enterprise risk management process and ensuring stakeholder confidence.
  • Partner with manager in security policy development to ensure Information Security Management is integrated throughout the enterprise.
  • Collaborate on enterprise cybersecurity planning, validation of controls, and development of security standards.
  • Stay updated on changes to cybersecurity regulations and standards, incorporating relevant updates into existing routines and practices.
  • Develop and implement data analysis routines to continuously monitor compliance with security standards, best practices, and frameworks.
  • Create automated alerts and dashboards to flag potential compliance issues or security anomalies in technology environments.
  • Develop and execute plans to assess security risk which includes periodic reviews of existing systems and devices, validation appropriate remediate is in place, and ongoing risk assessment.
  • Collaborate with IT and business unit teams to investigate identified issues and develop actionable remediation plans.
  • Ensure alignment of CLIENT’s enterprise cybersecurity risk and governance architecture with the TOGAF architecture framework.
  • Provide recommendations for improving cybersecurity measures and compliance practices based on data analysis and trend…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary