Enterprise Cyber Security Solution Architect
Listed on 2025-12-19
-
IT/Tech
Cybersecurity, IT Consultant, IT Project Manager, Information Security
Enterprise Cyber Security Solution Architect
Company: Tampa Electric Company
Location: Ybor Data Center, Ybor City, Florida
Shift: 4 days per week in office / 1 remote
Hiring Manager: Luis Valdes
Recruiter: Mark E Koener
Performance CoachManager of the Cyber Fusion Center
DepartmentInformation Security
Position ConceptThe Enterprise Cyber Security Solution Architect focuses on implementing safeguards to ensure the delivery of critical infrastructure services and to limit the impact of potential cybersecurity events. Responsible for implementing a robust defense against cyberattacks and ensures the confidentiality, integrity, and availability of an organization’s assets. Developing and managing the organization’s protection mechanisms to safeguard its critical assets. Responsible for designing and implementing technologies and processes for the following cybersecurity controls:
Identity and Access Management (IAM), Data Protection, Application Security, and Infrastructure Security. Collaborates with other teams such as Technology, Legal, and business to identify and reduce cyber risks and positions the company to comply to laws, regulations, and company policies. Helps the organization protect assets from evolving cyber threats, stay in compliance with regulatory mandates, and foster a cyber risk aware culture.
Serves as a solution orientated problem-solver with demonstrated knowledge of information security best practices. Ensures the integrity of the company’s information resources at the network, operating system, and application levels.
- Role plays a key part in identifying opportunities to streamline and enhance the organization’s cybersecurity ecosystem.
- Focus is on integrating tools and capabilities across the Cybersecurity Department to eliminate redundancies, improve interoperability, and drive efficiency.
- Leveraging automation and consolidation to reduce complexity, strengthen defense capabilities, and achieve measurable cost savings while maintaining robust protection of enterprise assets.
:
Designs, implements, and manages an organization’s privileged access management (PAM), identity governance and administration (IGA), and other IAM systems to ensure secure and controlled access to resources with a focus on protecting data by managing user identities, credentials, and permissions, and ensuring compliance with relevant security standards and regulations. Responsible for continuous improvement and robust support for IAM toolsets and IGA processes.
Provide overall direction, guidance, definition, and integration of operational processes of new and existing team members, contractor, and other enterprise identities and associated access.
:
Designs, implements, and manages data loss prevention (DLP) strategies and technologies to protect sensitive data from unauthorized access, use, or disclosure. Additionally, designs the file integrity monitoring (FIM) architecture, including the choice of FIM tools, agents, monitoring protocols, and baseline creation. Responsible for the deployment and configuration of the FIM solution across the organization’s infrastructure with the intent of protecting critical files and directories from unauthorized modifications.
:
Responsible for the design and implementation of secure applications which include creating secure reference architectures, patterns, and coding guidelines. Collaborate closely with developers to integrate security into the software development lifecycle (SDLC). Educate team members on secure coding practices and other security policies. Develop and maintain security policies and procedures that ensure the organization’s applications are secure and compliant with industry standards and regulatory requirements.
:
Responsible for ensuring the security of various aspects of the infrastructure, including network security, system security, and application security. Collaborate closely with owners of security controls such as firewalls, intrusion detection systems, VPNs, etc. to ensure security policies and standards are followed and consistently…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).