Security Architect - Secure Technology, Architecture and Safety
Listed on 2026-01-30
-
IT/Tech
Cybersecurity, Systems Engineer, Security Manager, Cloud Computing
at Oracle in Topeka, Kansas, United States
Job Description About the roleYou will design and govern security reference architectures, standards, and controls for cloud primitives (compute, network, storage), identity and access, data protection, container/Kubernetes platforms, AI/ML systems, and developer platforms. You will lead high-impact design reviews, threat modeling, and cryptographic strategy; guide zero-trust adoption; and drive detection, response, and resilience patterns at scale.
You will collaborate with senior leaders and product teams, mentor engineers, and influence roadmaps through clear writing, principled prioritization, and metrics.
Ideal candidates bring deep experience “building clouds,” large‑scale distributed systems, and security‑by‑design, with a track record of shipping secure platforms. You are practical, inclusive, and customer‑obsessed, balancing rigor with velocity. If you thrive at the intersection of architecture, hands‑on engineering, and incident leadership—and want to make a broad impact across Oracle’s cloud—this role is for you.
About the businessOracle’s Secure Technology, Architecture and Safety (STAS) group sets the strategic technical direction for security across Oracle, shaping the future of secure cloud computing while partnering deeply with engineering and operations. We are seeking a Security Architect (Architect/Distinguished Engineer caliber) to define end‑to‑end security architecture for hyperscale cloud platforms and services, raise the security bar across the software lifecycle, and lead response to complex security incidents.
Whatyou’ll do
- Set strategy:
Define multi‑year security architecture strategy and roadmaps for cloud foundations, identity, data protection, platform security, AI/ML safety, and secure supply chain. - Authoritative design:
Publish security reference architectures, control baselines, patterns, and design blueprints; lead cross‑org design reviews and bar‑raising architecture councils. - Build the cloud securely:
Advise and co‑design core cloud services (compute, networking, storage, virtualization, container/orchestration, service mesh) with secure‑by‑default configurations. - Identity and zero trust:
Advance strong identity, least privilege, policy‑as‑code, workload identity, and continuous verification aligned to zero‑trust principles. - Cryptography and data protection:
Drive KMS / HSM strategy, key lifecycle, envelope encryption, tokenization, privacy‑enhancing technologies, and data governance at scale. - Secure SDLC:
Embed threat modeling, secure coding, SAST / DAST / IAST, fuzzing, software provenance/SBOMs, signing, and deployment gates into developer platforms and CI/CD. - Detection and response:
Partner with SOC and service teams on high‑signal detection, telemetry standards, adversary emulation, incident response playbooks, and chaos/resilience testing. - Risk, compliance, and safety:
Translate regulatory and customer requirements into engineering‑ready controls and evidence; integrate safety‑by‑design for emerging technologies. - Incident leadership:
Lead or advise on significant incidents; perform post‑incident reviews, drive systemic fixes, and establish preventative guardrails and metrics. - Influence at scale:
Produce clear design docs and RFCs; mentor senior engineers; run architecture reviews; build communities of practice; create learning pathways and reusable assets.
- 12+ years in security architecture/engineering for large‑scale distributed systems; significant experience “building clouds” (IaaS/PaaS) or platform engineering.
- Expertise in at least three: identity and access management, network and micro‑segmentation, container/Kubernetes security, virtualization/compute, data protection/crypto, detection/response, supply chain security.
- Hands‑on depth with one or more: OCI, AWS, Azure, GCP;
Kubernetes; service mesh;
Terraform/Policy‑as‑Code; CI/CD;
Linux hardening; observability stacks. - Demonstrated ability to lead cross‑org initiatives, influence without authority, and deliver secure‑by‑default solutions at scale.
- Strong written and verbal communication; ability to produce clear design docs, threat…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).