Senior Cybersecurity Consultant
Listed on 2026-02-28
-
IT/Tech
Cybersecurity, Systems Engineer, IT Consultant
Trident Consulting is seeking a "
Senior Cybersecurity Consultant
" for one of our client in "
Rosemead, CA
" A global leader in business and technology services.
Please find additional details about the role below:
Job Title:
Senior Cybersecurity Consultant
Location:
Rosemead, CA
Pay rate: $129/hr to $145/hr on W2 (All Inclusive)
Type of Hire:
Contract
Duration:
12+ Months
Schedule:
Monday–Friday, 8:00 AM – 5:00 PM PST
Job duties may include: manages and oversees large, long range, or multiple complex projects; develops project scope, cost estimates, human resource requirements, work plans, time schedules, communication plans, and makes work assignments to meet project or program objectives...Education/
Experience:
Bachelor Degree in applicable profession, business, or technical discipline or an equivalent combination of education, training, and experience. Project Management certification preferred. Possesses one to three years of project management experience.
Southern California Edison (SCE) is looking for a Cybersecurity Architect to bridge the gap between IT, engineering, product, and Cyber Security teams to evaluate and design security solutions across enterprise Cybersecurity technology environments (on-premises, hybrid, SaaS, and where applicable, cloud). You will translate business objectives and regulatory requirements into security architectures, standards, and repeatable patterns that enable delivery teams to build securely.
Additionally, you will serve as a subject matter expert and technical leader for Cybersecurity architecture and technology.
- Serves as a trusted cyber security architecture subject matter expert (SME), aligning security solutions to strategic objectives, business outcomes, and risk posture across enterprise technology domains
- Partners with business, IT, and cyber stakeholders to elicit and scope end-user requirements; translates needs into clear security architecture guidance, control objectives, and design recommendations
- Evaluates technical feasibility and architecture tradeoffs for proposed solutions, ensuring security requirements are practical, scalable, and consistent with enterprise standards
- Owns, develops, and maintains enterprise security reference architectures, secure design patterns, and guardrails for common capabilities (e.g., identity, network security, endpoint/workload protections, application security, data protection, logging/monitoring, and secure remote access)
- Establishes and governs security architecture principles aligned to recognized security engineering practices (e.g., least privilege, defense-in-depth, secure-by-design, segmentation) and drives adoption through standards, architecture review, and enablement
- Conducts architecture and design reviews for new initiatives and major changes; documents security decisions, assumptions, residual risks, and compensating controls, and recommends actionable remediation paths
- Defines security requirements and control objectives for platforms, systems, and services; ensures requirements are measurable, testable, and traceable through implementation and validation (while not owning delivery execution)
- Collaborates with the Cybersecurity Technology team to shape product/technology roadmaps, maturity paths, and prioritized capability improvements based on threat landscape, business direction, and architecture gaps
- Fosters strong relationships with senior leaders and stakeholders to understand and map business priorities, advising on how to engage security architecture to enable secure, timely outcomes
- Develops and maintains security architecture documentation (standards, patterns, diagrams, decision records) and provides technical guidance, coaching, and mentorship to uplift engineering and cyber team capabilities
- Ten or more years of experience in information technology, information security and/or cybersecurity
- Experience designing security architectures for enterprise-scale environments, including identity, network segmentation, data protection, and security monitoring
- Working knowledge of control design and implementation (e.g., IAM, MFA, encryption,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).