New
Security Architect
![]() | |
![]() | |
![]() | |
![]() United States, Texas, Carrollton | |
![]() | |
Our advertising client is looking for a Security Architect to help advance their information security and IT infrastructure environment. This is a direct placement, salaried role and will be in hybrid on site work setting in Carrolton, Texas.
*Job Title* Security Architect *Top Skills Details* 1. 10+ years experience in information security, particularly in roles requiring the design and implementation of secure network architectures. 2. Proficiency in cloud infrastructure (GCP, AWS, etc.), various operating systems (Windows, Linux, etc.), programming languages (Python, Java, etc.), understanding of firewall technologies, VPN, IDS/IPS, and security protocols. 3. Certifications like CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), CCSP (Certified Cloud Security Professional), or similar are highly desirable. *Competencies:* Attention to Detail: Precision and attention to detail are crucial in developing systems that close potential security breaches. Adaptability: Ability to adapt to a rapidly changing technology landscape and to respond effectively to security challenges. Leadership: Strong leadership skills to lead and motivate a team of IT professionals in a high-stakes environment. *Description* Position Summary/Objective: The Security Architect plays a critical role in protecting an organization's information and systems by designing, building, and overseeing the implementation of network and computer security for an organization. This role is pivotal in ensuring the security and integrity of company data and infrastructure, requiring a blend of technical expertise, strategic planning, and strong interpersonal skills. Essential Functions: Design Security Systems: Develop and design robust security structures to protect the organization's data and information systems against unauthorized access, modifications, or destruction. Analyze Security Requirements: Assess current technology architecture for vulnerabilities, weaknesses, and for possible upgrades or improvement. Implement Security Solutions: Manage the roll-out of new security technologies and oversee the installation of these systems, ensuring proper protection of the organization's IT assets. Design and implement security into SDLC: Work closely with software engineering teams to define and implement secure coding standards, security testing strategies, and DevSecOps pipelines, ensuring security is integrated into every stage of the SDLC. Develop Security Policies and Procedures: Create and maintain the company's security policies and procedures that instruct staff on proper security measures both in the office and online. Risk Assessment and Mitigation Planning: Perform regular security audits to identify and mitigate risks, ensuring that the organization's systems and data remain secure. Stay Updated on IT Security Trends and News: Keep up-to-date with the latest security systems and standards, as well as government regulations that may affect the company's operations. Security Training and Briefing: Provide training to staff regarding new security policies and protocols. Incident Response: Develop strategies to handle security incidents and trigger investigations in collaboration with relevant internal and external stakeholders. Vendor Management: Manage relationships with security-related vendors and ensure the security of third-party services and technologies integrated into the company's systems. Leadership and Executive Presence: Ability to communicate at the executive leadership level cybersecurity gaps, recommendations, and strategies, and advocate for and justify required resources and funding to accomplish goals. PCI DSS: Knowledgeable and informed on the latest changes and updates to PCI DSS standards to ensure corporate compliance and provide guidance to our brands. *Skills* Security, Information security, Zero Trust Architecture, pci dss, Security architecture, Cyber security, Cloud Infrastructure, Python, Java, VPN, IDS, ips, cism, ccsp, Risk management, GCP, firewall *Top Skills Details* Security,Information security,Zero Trust Architecture,pci dss,Security architecture,Cyber security,Cloud Infrastructure,Python,Java,VPN,IDS,ips,cism,ccsp,Risk management,GCP,firewall *Additional Skills & Qualifications* Education and Experience: Educational Background: Bachelor's or Master's degree in Computer Science, Information Security, or a related field. Professional Experience: 10-15 years experience in information security, particularly in roles requiring the design and implementation of secure network architectures. Technical Skills: Proficiency in cloud infrastructure (GCP, AWS, etc.), various operating systems (Windows, Linux, etc.), programming languages (Python, Java, etc.), understanding of firewall technologies, VPN, IDS/IPS, and security protocols. Certifications: Certifications like CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), CCSP (Certified Cloud Security Professional), or similar are highly desirable. Problem-Solving Skills: Strong analytical and problem-solving skills with a proactive mindset to anticipate potential security issues. Communication Skills: Excellent communication skills for explaining complex security measures to stakeholders and team members of varying technical expertise. Travel: Travel is primarily during business days, out-of-the-area and overnight travel is expected based on individual job responsibilities. Some of the travel may occur on weekends or be international. Company events may include Summits and the Annual Conventions may also include travel. Travel is expected to be less than 10%. Expectations in 3-6 Months: -Conduct a thorough analysis and evaluation of the existing IT and network infrastructure. -Identify gaps and constraints: Pinpoint specific areas within the current infrastructure where security measures are lacking or neglected. -Developed an optimized cybersecurity architecture that aligns with the organization's operational goals and risk tolerance. - Provide a clear, actionable plan that outlines the steps needed to transition from the current state to the desired cybersecurity infrastructure. -Implement Zero Trust Architecture (ZTA) principles to secure a workforce that operates remotely or across multiple locations. -Assessing the current state of security with future brand acquisitions. Identify risks and issues associated with a potential acquisition target's security profile Design a strategy and roadmap for integrating an acquisition into our platform Design a security architecture that facilitates integrating additional brands to our platform that addresses business needs (e.g. scalability, security, business performance) *Pay and Benefits* The pay range for this position is $140000.00 - $175000.00/yr. Here are the adjustments made to our benefit offerings in 2025: Medical Plan design enhancements Contribution updates NEW Health Savings Account (HSA) option Debit Card option for all spending accounts Employer Sponsored Short-Term Disability Holiday enhancements Personal days addition Paid Time Off adjustments *Workplace Type* This is a hybrid position in Carrollton,TX. *Application Deadline* This position is anticipated to close on Mar 19, 2025. About TEKsystems: We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company. The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law. |