More jobs:
Consultant, Cybersecurity V
Job in
Rosemead, Los Angeles County, California, 91770, USA
Listed on 2026-02-28
Listing for:
TekWissen ®
Full Time
position Listed on 2026-02-28
Job specializations:
-
IT/Tech
Cybersecurity, Systems Engineer, IT Consultant
Job Description & How to Apply Below
Job Description
Tek Wissen is a global workforce management provider headquartered in Ann Arbor, Michigan that offers strategic talent solutions to our clients worldwide.
Job duties may include:
- Manages and oversees large, long range, or multiple complex projects; develops project scope, cost estimates, human resource requirements, work plans, time schedules, communication plans, and makes work assignments to meet project or program objectives
- Bachelor Degree in applicable profession, business, or technical discipline or an equivalent combination of education, training, and experience.
- Project Management certification preferred. Possesses one to three years of project management experience.
- Client is looking for a Cybersecurity Architect to bridge the gap between IT, engineering, product, and Cyber Security teams to evaluate and design security solutions across enterprise Cybersecurity technology environments (on-premises, hybrid, SaaS, and where applicable, cloud).
- You will translate business objectives and regulatory requirements into security architectures, standards, and repeatable patterns that enable delivery teams to build securely.
- Additionally, you will serve as a subject matter expert and technical leader for Cybersecurity architecture and technology.
- Serves as a trusted cyber security architecture subject matter expert (SME), aligning security solutions to strategic objectives, business outcomes, and risk posture across enterprise technology domain
- Partners with business, IT, and cyber stakeholders to elicit and scope end-user requirements; translates needs into clear security architecture guidance, control objectives, and design recommendations
- Evaluates technical feasibility and architecture tradeoffs for proposed solutions, ensuring security requirements are practical, scalable, and consistent with enterprise standards
- Owns, develops, and maintains enterprise security reference architectures, secure design patterns, and guardrails for common capabilities (e.g., identity, network security, endpoint/workload protections, application security, data protection, logging/monitoring, and secure remote access)
- Establishes and governs security architecture principles aligned to recognized security engineering practices (e.g., least privilege, defense-in-depth, secure-by-design, segmentation) and drives adoption through standards, architecture review, and enablement
- Conducts architecture and design reviews for new initiatives and major changes; documents security decisions, assumptions, residual risks, and compensating controls, and recommends actionable remediation paths
- Defines security requirements and control objectives for platforms, systems, and services; ensures requirements are measurable, testable, and traceable through implementation and validation (while not owning delivery execution)
- Collaborates with the Cybersecurity Technology team to shape product/technology roadmaps, maturity paths, and prioritized capability improvements based on threat landscape, business direction, and architecture gaps
- Fosters strong relationships with senior leaders and stakeholders to understand and map business priorities, advising on how to engage security architecture to enable secure, timely outcomes
- Develops and maintains security architecture documentation (standards, patterns, diagrams, decision records) and provides technical guidance, coaching, and mentorship to uplift engineering and cyber team capabilities
- Ten or more years of experience in information technology, information security and/or cybersecurity
- Experience designing security architectures for enterprise-scale environments, including identity, network segmentation, data protection, and security monitoring
- Working knowledge of control design and implementation (e.g., IAM, MFA, encryption, logging/monitoring, vulnerability management, endpoint/workload protections)
- Experience partnering with engineering and infrastructure teams to deliver secure solutions in iterative delivery models; ability to translate security requirements into actionable technical designs
- Ability to communicate complex…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×