×
Register Here to Apply for Jobs or Post Jobs. X

Enterprise Cyber Security Solution Architect

Job in Tampa, Hillsborough County, Florida, 33646, USA
Listing for: Tampa Electric Company
Full Time position
Listed on 2025-12-19
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant, IT Project Manager, Information Security
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

Enterprise Cyber Security Solution Architect

Company: Tampa Electric Company
Location: Ybor Data Center, Ybor City, Florida
Shift: 4 days per week in office / 1 remote

Hiring Manager: Luis Valdes

Recruiter: Mark E Koener

Performance Coach

Manager of the Cyber Fusion Center

Department

Information Security

Position Concept

The Enterprise Cyber Security Solution Architect focuses on implementing safeguards to ensure the delivery of critical infrastructure services and to limit the impact of potential cybersecurity events. Responsible for implementing a robust defense against cyberattacks and ensures the confidentiality, integrity, and availability of an organization’s assets. Developing and managing the organization’s protection mechanisms to safeguard its critical assets. Responsible for designing and implementing technologies and processes for the following cybersecurity controls:
Identity and Access Management (IAM), Data Protection, Application Security, and Infrastructure Security. Collaborates with other teams such as Technology, Legal, and business to identify and reduce cyber risks and positions the company to comply to laws, regulations, and company policies. Helps the organization protect assets from evolving cyber threats, stay in compliance with regulatory mandates, and foster a cyber risk aware culture.

Serves as a solution orientated problem-solver with demonstrated knowledge of information security best practices. Ensures the integrity of the company’s information resources at the network, operating system, and application levels.

Focus Areas
  • Role plays a key part in identifying opportunities to streamline and enhance the organization’s cybersecurity ecosystem.
  • Focus is on integrating tools and capabilities across the Cybersecurity Department to eliminate redundancies, improve interoperability, and drive efficiency.
  • Leveraging automation and consolidation to reduce complexity, strengthen defense capabilities, and achieve measurable cost savings while maintaining robust protection of enterprise assets.
Primary Duties and Responsibilities
  • IAM
    :
    Designs, implements, and manages an organization’s privileged access management (PAM), identity governance and administration (IGA), and other IAM systems to ensure secure and controlled access to resources with a focus on protecting data by managing user identities, credentials, and permissions, and ensuring compliance with relevant security standards and regulations. Responsible for continuous improvement and robust support for IAM toolsets and IGA processes.

    Provide overall direction, guidance, definition, and integration of operational processes of new and existing team members, contractor, and other enterprise identities and associated access.
  • Data Protection
    :
    Designs, implements, and manages data loss prevention (DLP) strategies and technologies to protect sensitive data from unauthorized access, use, or disclosure. Additionally, designs the file integrity monitoring (FIM) architecture, including the choice of FIM tools, agents, monitoring protocols, and baseline creation. Responsible for the deployment and configuration of the FIM solution across the organization’s infrastructure with the intent of protecting critical files and directories from unauthorized modifications.
  • Application Security
    :
    Responsible for the design and implementation of secure applications which include creating secure reference architectures, patterns, and coding guidelines. Collaborate closely with developers to integrate security into the software development lifecycle (SDLC). Educate team members on secure coding practices and other security policies. Develop and maintain security policies and procedures that ensure the organization’s applications are secure and compliant with industry standards and regulatory requirements.
  • Infrastructure Security
    :
    Responsible for ensuring the security of various aspects of the infrastructure, including network security, system security, and application security. Collaborate closely with owners of security controls such as firewalls, intrusion detection systems, VPNs, etc. to ensure security policies and standards are followed and consistently…
  • To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
    (If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
     
     
     
    Search for further Jobs Here:
    (Try combinations for better Results! Or enter less keywords for broader Results)
    Location
    Increase/decrease your Search Radius (miles)

    Job Posting Language
    Employment Category
    Education (minimum level)
    Filters
    Education Level
    Experience Level (years)
    Posted in last:
    Salary