CYBERSECURITY ARCHITECT RESUME EXAMPLE

Updated: October 2, 2024 - The Cybersecurity Architect plays a crucial role in aligning security solutions with business needs and requirements. Responsibilities include developing the backlog to prioritize customer value, authoring technical feature requirements, and collaborating with stakeholders to present complex ideas and roadmaps. By fostering a positive culture and driving operational effectiveness through automation, the Cybersecurity Architect ensures effective implementation of cybersecurity initiatives aligned with industry standards.

Tips for Cybersecurity Architect Skills and Responsibilities on a Resume

1. Cybersecurity Architect, Acme Technologies, Austin, TX

Job Summary:

  • Managing the development of the cyber security polices
  • Delivery of Enterprise IT security strategy
  • Implementing a strategy for Cyber Security
  • Assisting the development of new Cyber Security strategies
  • Implement best practice controls to reduce risk from Cyberattacks
  • Improve and co-ordinate the Cyber Security incident plans
  • Develop work plans to proactively reduce Cyber security risk
  • Assist in the development of architectures
  • Develop and implement of projects
  • Provide expert advice to IR in the delivery of Cyber security solutions
  • Meet best practice and regulatory requirements


Skills on Resume:

  • Policy Management (Hard Skills)
  • Security Strategy (Hard Skills)
  • Cyber Implementation (Hard Skills)
  • Risk Control (Hard Skills)
  • Incident Planning (Hard Skills)
  • Risk Reduction (Hard Skills)
  • Architecture Development (Hard Skills)
  • Compliance Standards (Hard Skills)

2. Cybersecurity Architect, Secure Innovations, Denver, CO

Job Summary:

  • Identifying and ensuring business requirements for cybersecurity are met.
  • Improving the security architecture capability.
  • Developing and utilizing design patterns and reference architectures.
  • Completing security architecture risk reviews as part of the third party risk management and risk assessment processes.
  • Participating in mergers and acquisitions due diligence and integration processes.
  • Evaluate and track relevant emerging technologies and threat modeling.
  • Architect and recommend enterprise security solutions which include but are not limited to SIEM, Firewall, IPS/IDS, SOAR, UEBA, NAC, PKI, Antivirus, and EDR
  • Build technical and executive level health monitoring dashboards
  • Manage and maintain Cybersecurity Operations based product and service roadmaps in support of emerging business
  • Develop and maintain architecture documents and SOPs


Skills on Resume:

  • Business Requirements (Hard Skills)
  • Security Architecture (Hard Skills)
  • Design Patterns (Hard Skills)
  • Risk Reviews (Hard Skills)
  • Due Diligence (Hard Skills)
  • Technology Evaluation (Hard Skills)
  • Solution Architecture (Hard Skills)
  • Document Management (Hard Skills)

3. Cybersecurity Architect, TechGuard Solutions, Raleigh, NC

Job Summary:

  • Lead the design, code, test, debug, document, and maintenance of security features across complex cybersecurity, cloud, endpoint software/hardware systems and oversee problem avoidance actions.
  • Evaluate secure design strategies to identify and recommend improvements to potential security design problems.
  • Analyze and revise existing system logic and documentation as necessary
  • Evaluate, recommend, and select new software/hardware.
  • Authorize risk level changes and recommend solutions to minimize and/or prevent system interruption.
  • Perform change and problem management using standard tools and they conform and comply with existing system standards. 
  • Measure performance to ensure proper operation.
  • Lead technical projects utilizing System staff and resources.
  • Follow and ensure adherence to technical standards for programming and design techniques, and train System technical staff on use of software/hardware tools by required standards and procedures.
  • Monitor compliance with internal audit requirements and Information Security Manual guidelines.


Skills on Resume:

  • Secure Design (Hard Skills)
  • Risk Authorization (Hard Skills)
  • System Analysis (Hard Skills)
  • Problem Management (Hard Skills)
  • Performance Monitoring (Hard Skills)
  • Project Leadership (Soft Skills)
  • Compliance Oversight (Hard Skills)
  • Tool Evaluation (Hard Skills)

4. Cybersecurity Architect, NextGen Security, Orlando, FL

Job Summary:

  • Leads the analysis and documentation of the current “As Is” situation and the translation of the business and operation requirements in order to define the future “To Be” situation regarding security systems and processes. 
  • Directs and assists in the maintenance and operations of the Security infrastructure equipment and tools within the organization.
  • Collaborates with IT Project Managers, Stakeholders, and other IT team members for the definition of the complete impact on the Security solutions, budget & planning and the provisioning of the solution as required by the project in order to guarantee a successful roll-out and to maintain operational stability from the digital platforms as the main priority objective.
  • Makes recommendations to IT and business management in order to guarantee the best possible use of IT infrastructure solutions and their associated governance tools.
  • Actively maintain relationship with service providers and vendors in order to evaluate the company’s operational performance metrics from a Cyber Security perspective
  • Develop and maintain Cyber Security knowledge in regards to software and best practice in order to strengthen the overall credibility of the services provided.
  • Perform Application and System administration tasks required to keep the Cyber Lab operational at industry standard level
  • Research and develop solutions to challenging industrial cyber security problems
  • Contribute to the development of the Cyber Security services portfolio
  • Conduct penetration tests and purposefully attempt to exploit system or application weaknesses within the approved rules of engagement boundaries.


Skills on Resume:

  • Process Analysis (Hard Skills)
  • Security Infrastructure (Hard Skills)
  • Stakeholder Collaboration (Soft Skills)
  • IT Recommendations (Hard Skills)
  • Vendor Management (Soft Skills)
  • Cyber Security Knowledge (Hard Skills)
  • System Administration (Hard Skills)
  • Penetration Testing (Hard Skills)

5. Cybersecurity Architect, Quantum Cyber Defense, Salt Lake City, UT

Job Summary:

  • Apply expert knowledge of how cybersecurity systems and services integrate effectively into a wide range of IT infrastructures, from single-site enterprise through multi-location and data centre environments, to cloud and hybrid
  • Develop conceptual designs and architect the best technology and service solutions to meet client security objectives
  • Collaborate with clients to gather requirements and propose a managed security solution
  • Facilitate client presentations and meetings to discuss how CGI’s cybersecurity capabilities will address the clients’ needs
  • Participate in the development of technical cybersecurity service responses to client RFPs
  • Collaborate with the team to design the managed security services solution to satisfy the client requirements
  • Maintain awareness of trends in cybersecurity technology and regulatory requirements
  • Develop recommendations for technical security solutions that align with department vision and the needs of the business
  • Research new technologies, services, standards and recommend and changes
  • Implement and report operational KPIs to leadership
  • Drive continuous improvement for Cybersecurity Operations


Skills on Resume:

  • Security Integration (Hard Skills)
  • Solution Architecture (Hard Skills)
  • Client Collaboration (Soft Skills)
  • Presentation Facilitation (Soft Skills)
  • RFP Development (Hard Skills)
  • Service Design (Hard Skills)
  • Trend Awareness (Soft Skills)
  • KPI Reporting (Hard Skills)

6. Cybersecurity Architect, Red Rock Technologies, Phoenix, AZ

Job Summary:

  • Ensure that all bank technology initiatives and projects comply with all applicable information security policy and regulations
  • Provide input to Information Security policies and standards.
  • Advise application and infrastructure project teams on information security planning, policy, and architecture and provide high-level security requirements to projects.
  • Define security best practices, measures, and mechanisms at all levels of the bank stack.
  • Thoroughly document security practices and promote best practices across the whole organization
  • Compare different systems solutions to make decision on what best fits in environment.
  • Identify potential risks of projects, document and address those risks and work with other teams to resolve the issue.
  • Ensure security by design on enterprise services and products
  • Evaluate security requirements according to internal security standards and guidelines and identify potential non-compliances
  • Support in following up on the recommended mitigations before projects go-live
  • Identify potential technical risks, threat scenarios and compensatory controls
  • Support the risk approval process for projects to live


Skills on Resume:

  • Compliance Assurance (Hard Skills)
  • Policy Input (Hard Skills)
  • Security Advisory (Hard Skills)
  • Best Practices (Hard Skills)
  • Risk Identification (Hard Skills)
  • Security Design (Hard Skills)
  • Requirements Evaluation (Hard Skills)
  • Mitigation Support (Hard Skills)

7. Cybersecurity Architect, Blue Shield Cyber, Sacramento, CA

Job Summary:

  • Represent the team as the main interface for collaboration with SMEs and development teams across multiple organizations.
  • Actively engage with key stakeholders to ensure that delivery is aligned with business needs and security requirements.
  • Help develop the backlog to ensure the highest business value is being delivered to customers.
  • Author technical feature requirements in the form of user stories and acceptance criteria for defined use cases.
  • Align with architects and product owners to develop and present roadmaps, complex ideas and features to a broad audience.
  • Build, integrate and Implement solutions to meet requirements.
  • Cultivate a positive culture where there is a sense of purpose, ideas are heard, and decisions are transparent.
  • Actively network with key industry contacts to understand standard methodologies and emerging trends for the domain and how they can be used within the company.
  • Define and standardize Key Performance Indicators.
  • Drive operational effectiveness through automation.
  • Assist with coordinating the resolution of audit and compliance findings.


Skills on Resume:

  • Stakeholder Engagement (Soft Skills)
  • Backlog Development (Hard Skills)
  • Requirement Authoring (Hard Skills)
  • Roadmap Presentation (Soft Skills)
  • Solution Implementation (Hard Skills)
  • Positive Culture (Soft Skills)
  • KPI Standardization (Hard Skills)
  • Operational Automation (Hard Skills)

8. Cybersecurity Architect, Ironclad Security Systems, Nashville, TN

Job Summary:

  • Partner with enterprise architects and other senior executives in complex engagements and opportunities to understand business requirements, solutions, and evaluate existing cybersecurity risks.
  • Deliver strategies and solutions to meet security requirements and regulations.
  • Provide risk-based security recommendations, guidance, and consulting to executive leaders to reduce risks to Dell Technologies and customers.
  • Work on complex projects and manage multiple work streams.
  • Provide technical and consultative cybersecurity guidance for teams developing infrastructure solutions and services.
  • Conceptualize, plan, research, design, and implement robust security architectures for on-premise and cloud environments related to enterprise-scale digital initiatives and platforms.
  • Analyze and review Threat Models and guide as a security consultant on new technology implementations
  • Well versed in tools and techniques to secure all sorts of digital identities, assets, technology, application, and platforms online, cloud, mobile, and the world of connected devices
  • Proficient in vulnerability testing, risk analyses, security assessments, security standards, security protocols security systems, authentication protocols, public key infrastructures (PKIs), certification authorities (CAs), digital signatures, and cryptography


Skills on Resume:

  • Executive Collaboration (Soft Skills)
  • Security Strategies (Hard Skills)
  • Risk Recommendations (Hard Skills)
  • Project Management (Hard Skills)
  • Cybersecurity Guidance (Hard Skills)
  • Security Architecture (Hard Skills)
  • Threat Analysis (Hard Skills)
  • Vulnerability Testing (Hard Skills)

9. Cyber Security Architect, CynergisTek, Austin, TX

Job Summary: 

  • Analyze existing security policies and systems and recommend changes or improvements, balancing business needs with risk assessment.
  • Design security architecture and develop detailed designs.
  • Build security practices into agile development methods.
  • Manage the relationship and oversee work with a managed services provider.
  • Prepare reports and action plans if a security breach does occur.
  • Organize and conduct tests, including penetration tests, and “ethical hacks” of the existing security and systems architecture.
  • Monitor the network and provide proactive response to alerts of abnormalities or problems.
  • Upgrade systems regularly to remain competitive in the field of security.
  • Assure systems and policies are documented according to current SOC 2 control criteria and conduct SOC 2 examinations on critical control components.
  • Keep technical knowledge current through continuing education.
  • Provide system updates and recommend secure coding practices.
  • Provide regular communication to stakeholders on systems security status and threats.
  • Implement security awareness programs for the organization.
  • Work with development teams to support efforts to improve system security.
  • Familiarity with CIS Controls and cisecurity.org


Skills on Resume: 

  • Policy Analysis (Hard Skills)
  • Security Design (Hard Skills)
  • Agile Security (Hard Skills)
  • Penetration Testing (Hard Skills)
  • Network Monitoring (Hard Skills)
  • SOC 2 Compliance (Hard Skills)
  • Vendor Management (Soft Skills)
  • Security Training (Soft Skills)

10. Cyber Security Architect, Verity Solutions, Denver, CO

Job Summary: 

  • Responsible for designing, building, and testing security systems to protect business and customer data.
  • Stay up-to-date with the latest security standards, systems, and authentication protocols, as well as best-practice security products
  • Responsible for security blueprints and principles for projects and other changes
  • Involve in designing security services Disaster Recovery (DR) and Business Continuity Planning (BCP)
  • Design, build, and implement enterprise security systems for a production environment
  • Identify and design security architecture elements to mitigate emerging security threats in alignment with Deakin’s long-term security strategy and roadmaps
  • Define and maintain a framework of security patterns, blueprints, services and guardrails to empower the business to rapidly and safely innovate within a hybrid cloud environment
  • Provide strategic advice and high-level guidance on security strategies to manage identified risks and ensure adoption and adherence to standards
  • Obtains and acts on vulnerability information and conducts security risk assessments, business impact analysis and accreditation on complex information systems
  • Contributes to the development of information security policy, standards and principles
  • Establishing disaster recovery procedures and conducting a breach of security drills
  • Planning, researching, and designing reliable, powerful, and flexible security architectures for all IT projects.
  • Securing IoT devices as well as the Cloud infrastructure.
  • Performing vulnerability testing on the completed infrastructure, including risk analyses and security assessments.


Skills on Resume: 

  • Security Design (Hard Skills)
  • Threat Mitigation (Hard Skills)
  • DR/BCP Planning (Hard Skills)
  • Risk Assessment (Hard Skills)
  • Security Strategy (Soft Skills)
  • Cloud Security (Hard Skills)
  • Vulnerability Testing (Hard Skills)
  • Strategic Guidance (Soft Skills)

11. Cyber Security Architect, SecureIT, Raleigh, NC

Job Summary: 

  • Provides high-level support policy and program assistance to Cybersecurity Lead and management for security policy, compliance efforts, and strategic initiatives.
  • Define security architecture principles to guide the development of the Cybersecurity framework, blueprint and controls/control objectives
  • Define the Cybersecurity architecture framework across the organization, including the hierarchy of control objectives, controls and specific technical and procedural controls to meet requirements and provide guidance for the implementation and maintenance
  • Prepare the cost estimates and other potential integration concerns for all cybersecurity measures.
  • Determine Cybersecurity architecture requirements across JHAH and identify relevant policies, regulatory and legal requirements that are relevant to development/maintenance of Cybersecurity architecture
  • Align, coordinate and integrate with enterprise architecture including corporate, IT frameworks and requirements
  • Align across all Cybersecurity capabilities to define Cybersecurity architecture, provide guidance/expertise and support development.
  • Identify types of threats available (e.g. from the threat feeds), threat actors, any identified intentions that are relative to business requirements and compare them to the latest risk analysis report.
  • Create and maintain data flow diagrams and attack trees for applications considered to be critical to the organization.
  • Work with different teams to define threat assessment methodologies for penetration testing, social engineering, and source code analysis.
  • Perform penetration tests, vulnerability testing, including risk analysis, and security assessments, on the complete infrastructure.
  • Defining, creating, implementing, and maintaining all needed corporate security policies and procedures, making sure that all employees abide by them.
  • Network security architecture development and definition.
  • Lead technical defense-in-depth reviews to evaluate and identify opportunities to enhance security controls
  • Evaluate and/or design new technologies, processes, standards, and frameworks on an ongoing basis
  • Build strong relationships with peers and stakeholders across the organization


Skills on Resume: 

  • Policy Compliance (Soft Skills)
  • Security Architecture design (Hard Skills)
  • Threat Assessment (Hard Skills)
  • Penetration Testing (Hard Skills)
  • Risk Analysis (Hard Skills)
  • Network Security (Hard Skills)
  • Stakeholder Collaboration (Soft Skills)
  • Technical Reviews (Hard Skills)

12. Sr Staff Cyber Security Architect, Fortify24, Orlando, FL

Job Summary: 

  • Ensure security is designed and integrated into digital products leveraging cloud, on-prem and at customer location deployment models.
  • Provide security leadership and domain expertise (IaaS & PaaS) in the cloud cyber security in AWS
  • Lead various cloud security aspects like network, compute, storage, database, and PaaS in the cloud domain.
  • Expert guidance on Application security to engineering teams by leveraging secure development life cycle.
  • Perform Threat Modeling and Architecture risk analysis on digital software products.
  • Lead Secure code reviews, Vulnerability analysis and Remediation for digital products.
  • Provide incident handling support for security-related incidents reported for software products.
  • Influence developers to write secure code and implement secure engineering practices.
  • Validates and attest security controls effectiveness in the digital products.
  • Collaborate and partner with product and engineering partners like managers, architects, and developers in the roadmap planning, prioritization, and implementation.
  • Function as cyber security leader in daily Sprint stand up and provide ownership for all aspects of security lifecycle in the product release.
  • Define and maintain IT security requirements and Security Reference Architectures
  • Provide technical and architectural security guidance in the area of Identity and Access Management to the SAP Global Security organization, product/ project teams and functional organizations
  • Provide professional advice to internal and external parties


Skills on Resume: 

  • Cloud Security (Hard Skills)
  • Application Security (Hard Skills)
  • Threat Modeling (Hard Skills)
  • Secure Code Review (Hard Skills)
  • Incident Handling (Hard Skills)
  • Developer Collaboration (Soft Skills)
  • Access Management (Hard Skills)
  • Security Leadership (Soft Skills)

13. Cyber Security Architect, DataDefenders, Salt Lake City, UT

Job Summary: 

  • Researches and stays at the forefront of attacker tools, tactics, and procedures and uses this knowledge to continuously evolve the Kal Tire cyber security standards, monitoring, and defensive solutions.
  • Define and own the Information Systems cyber security principles that are used to guide decision-making when designing new solutions.
  • Participates in projects to evaluate and define cyber security requirements and ensures all requirements are fully implemented.
  • Performs risk assessments, threat modeling, privacy assessments and information security reviews on all technology and systems.
  • Performs regular penetration, vulnerability assessments and audits of the cyber security practices and solutions.
  • Develops, trains, and tests the major cyber security incident response plan including simulation tests and tabletop exercises.
  • Owns all processes and procedures for the resolution and investigation of cyber security incidents.
  • Participates in the change management process to ensure cyber security concerns are addressed.
  • Researches and coordinates cyber security training for technical and non-technical stakeholders.
  • Facilitates the cyber security working group that includes key members from across Information Services teams.
  • Facilitates cyber security governance meetings that are composed of senior leaders from the Information Services Management team
  • Define and implement dashboards and reporting with key monitoring metrics and alerting for all levels of the organization.
  • Monitor or participate in ever-emerging global cyber regulations (NERC CIP, EU NIS, Israel, etc.).
  • Build confidence as customer-facing SME, answering questions and inspiring confidence, including the opportunity to present to and influence executive stakeholders.


Skills on Resume: 

  • Threat Research (Hard Skills)
  • Risk Assessment (Hard Skills)
  • Penetration Testing (Hard Skills)
  • Incident Response (Hard Skills)
  • Cybersecurity Governance (Soft Skills)
  • Security Training (Soft Skills)
  • Change Management (Soft Skills)
  • Stakeholder Communication (Soft Skills)

14. Cyber Security Architect, RedTeam Security, Nashville, TN

Job Summary: 

  • Review security architecture, identify design gaps, and recommend security requirements to internal and external teams
  • Design and evaluate secured cloud architectures and interfaces between internal and external environments, particularly hybrid cloud environments (IaaS, SaaS, etc.)
  • Being the subject matter expert on topics related to cyber security for both IT and OT environments
  • Support in creating a security governance framework to adequately measure the security maturity within internal and external business systems/processes
  • Working independently to take up tasks and leading projects that would improve the overall cyber security maturity of the organization
  • Validating security configurations of and access to security infrastructure technology, including firewalls and anti-malware/endpoint protection systems
  • Security assessments of current and prospective vendors and partners, especially those with which share intellectual property (IP), as well as regulated or other protected data, e.g. software as a service (SaaS) providers, cloud hosting providers, manufacturers, suppliers, etc.
  • Initiate and build an overall asset protection program including Zero Trust design principles
  • Support in creating a well-defined cyber security strategy and roadmap
  • Participate in internal and external working groups representing cybersecurity
  • Attend customer meetings and workshops to learn messaging and negotiation.
  • Collaborate with product managers, regulatory and compliance leaders, and technical architects to understand how cybersecurity is managed, both procedurally and commercially.
  • Assess incoming technical and operational cybersecurity requirements and legal obligations.
  • Build expertise marking up and revising contracts, negotiating with stakeholders, articulating cybersecurity in layperson terms, and attesting to compliance with recognized standards.
  • Author documents and answer questionnaires to attest to security trust and compliance.


Skills on Resume: 

  • Security Architecture (Hard Skills)
  • Cloud Security (Hard Skills)
  • IT/OT Expertise (Hard Skills)
  • Governance Framework (Soft Skills)
  • Vendor Assessment (Hard Skills)
  • Project Leadership (Soft Skills)
  • Zero Trust (Hard Skills)
  • Stakeholder Collaboration (Soft Skills)

15. Cyber Security Architect, Avertium, Scottsdale, AZ

Job Summary: 

  • Subject matter expert for cyber security, regulatory compliance requirements, corporate policies, and customer obligations.
  • Analyse problems, threats and risks in the field of IT/OT security of machinery and equipment.
  • Conduct audits and assessments, as well as threat and risk analysis (TARA) for cyber security assessments.
  • Develop security concepts and strategies for machines and systems (IEC62443).
  • Implement cyber security measures over the entire life cycle of the products.
  • Create blueprints and prototypes to test the measures up to production readiness.
  • Integrate new cyber security requirements into existing processes.
  • Define requirements for the development of technical security standards for application and technology platforms in the context of the Industrial Internet of Things (IIoT) as well as requirements for the end-to-end solutions for the Internet of Things from the edge to the cloud level.
  • Assessment of safety in the product development and management process.
  • Collaborate with high-caliber security experts to maintain and expand a robust security infrastructure that prevents cyberattacks from affecting the enterprise business and CI/CD activities
  • Liaise with international vendors, of state-of-the-art cybersecurity products, and evaluate their product suitability to meet the business needs of both the company and its customers
  • Ensure that security is embedded by design in end-to-end IT solutions that integrate either with on-premise installations or with cloud infrastructure
  • Design the security architecture of large projects and address all the relevant regulatory and contractual requirements
  • Design and develop security solutions by combining cutting-edge cybersecurity technologies


Skills on Resume: 

  • Cybersecurity Expertise (Hard Skills)
  • Risk Analysis (Hard Skills)
  • Security Audits (Hard Skills)
  • Security Concepts (Hard Skills)
  • IIoT Security (Hard Skills)
  • Vendor Collaboration (Soft Skills)
  • Security Architecture (Hard Skills)
  • Regulatory Compliance (Soft Skills)

16. Cyber Security Architect, Blackmere Consulting, Tampa, FL

Job Summary: 

  • Manage Security studies and standards
  • Assess & validate Architecture, against Security Policy
  • Integrate Security into standard designs
  • Support level 3/4 expertise for security solutions
  • Manage & budget support on Security projects
  • Produce all Information System Security and Compliance Questionnaire at the initial phase of all projects
  • Perform risk analysis and identify mitigation plan when relevant
  • Make sure that all IT partners/providers respect the security policy when they deliver services (e.g. Cloud or SaaS provider)
  • Make the right decision considering the residual risk and the asset value
  • ISS Run Q&A and industrialization
  • Building client relationships and establishing credibility by demonstrating knowledge of various aspects of cyber security, and identifying opportunities where PwC can assist.
  • Supporting senior members of the team in developing client proposals and solution offerings.
  • Supporting the development of security architecture-related toolkits, methodologies, and accelerators.
  • Helping retain and develop other cyber security team members.
  • Maintaining the cyber security relevant processes of medical device software and cloud services/infrastructure
  • Monitoring of security quality in medical device software and cloud services


Skills on Resume: 

  • Security Standards Management (Hard Skills)
  • Architecture Assessment (Hard Skills)
  • Security Integration (Hard Skills)
  • Risk Analysis (Hard Skills)
  • Vendor Compliance (Soft Skills)
  • Client Relationship Building (Soft Skills)
  • Security Toolkits Development (Hard Skills)
  • Quality Monitoring (Hard Skills)

17. Cyber Security Architect, Trustwave, Chicago, IL

Job Summary: 

  • Security architecture of the proposed solutions from RFP to delivery and production
  • Hands-on ability that can work with other teams to accomplish various jobs, and to thrive in a collaborative and fast-paced R&D and lab/testing/customer environment
  • Establishing the IT and security architecture and low-level design of the customer IT/Security solutions, upgrading and installing new hardware and software
  • Performing troubleshooting to resolve IT and security issues, and maintaining the network and servers
  • Provide guidelines for securing systems including networks, authentication systems, encryption, SSDLC
  • Lead inspections, audits and certification processes
  • Ensure the security of data, network access and backup systems
  • Identify problematic areas and implement strategic solutions in time
  • Provide guidelines for monitoring the systems for security vulnerabilities
  • Prepare system security reports by collecting, analyzing, and summarizing data and trends
  • Involve third parties to augment the security measures
  • Manage SSAT documentation
  • Creation and prototyping of security concepts and requirements for medical devices and cloud services
  • Review, design, and implement architecture from security perspective of medical device software and cloud services


Skills on Resume: 

  • Security Architecture (Hard Skills)
  • Collaborative Problem-Solving (Soft Skills)
  • IT Design (Hard Skills)
  • Troubleshooting (Hard Skills)
  • Security Guidelines (Hard Skills)
  • Audit Leadership (Hard Skills)
  • Vulnerability Monitoring (Hard Skills)
  • Documentation Management (Soft Skills)

18. Cyber Security Architect, DataRisk Management, Charlotte, NC

Job Summary: 

  • Develops security designs and implementable solutions based on sound enterprise architecture practices
  • Providing expert security architecture guidance to technical and non-technical stakeholders
  • Identifying and implementing process improvements with an emphasis on automation
  • Leading threat modeling exercises around cloud native, SaaS, and cloud-first technologies
  • Developing and refining security architecture artifacts (models, templates, and standards) with consumable documentation
  • Driving IdAM and RBAC best practices and provide oversight, guidance, and design support of security-related initiatives such as network segmentation, IAM, and cloud
  • Provides substantive contributions to the program's strategic roadmap, technical direction, and development of program-wide standards and best practices
  • Keeps current on developments and changes to threat environments as input into security strategy plans and architecture artifacts
  • Define and integrate security-by-design & privacy-by-design requirements and considerations into systems during their implementation, deployment, and support
  • Provide consultancy on IAM Best Practices to different stakeholders/teams
  • Conducts or facilitates threat modeling of services and applications that tie to the risk and data associated with the service or application
  • Coordinates with appropriate compliance and privacy officers to understand sensitive data across systems and recommends controls to ensure this data is adequately secured
  • Collaborates with other architects and security practitioners to share best practices and insights
  • Act as an SME in application and infrastructure projects to provide security planning advice
  • Evaluate and recommend new, disruptive, innovative security technologies


Skills on Resume: 

  • Security Design (Hard Skills)
  • Stakeholder Guidance (Soft Skills)
  • Process Improvement (Hard Skills)
  • Threat Modeling (Hard Skills)
  • Security Artifacts (Hard Skills)
  • IAM Practices (Hard Skills)
  • Strategy Contribution (Soft Skills)
  • Technology Evaluation (Hard Skills)

19. Cyber Security Architect, CipherTechs, Miami, FL

Job Summary: 

  • Monitor assigned tickets and tasks and provide service or escalation
  • Adhere to departmental policies for reporting and managing requests and change control.
  • Monitor and evaluate threat intelligence, formulate and implement strategies to protect the organization
  • Perform and/or support information security risk assessments and audits to ensure that information systems are adequately protected and meet SSH’s security framework and standards.
  • Administration of information security controls and tools, e.g. access controls, endpoint protection, anti-virus/malware, data loss prevention, e-mail security, encryption, patching, vulnerability, web application gateways, perimeter firewalls and security log management and monitoring tools, used in governance, risk management, and compliance of protected data.
  • Conducts audits of the security levels, and security practices and provides updated status reports.
  • Mitigate security event alerts and vulnerabilities through security incident event management (SIEM) tools or other external sources.
  • Develop and maintain technical documentation used for information security operations procedures, which outline decision support (e.g., security control administration, best practices, events of interest and incident handling, and escalation).
  • Design of state-of-the-art security controls in collaboration together with the projects
  • Be responsible for security Infrastructure Design - Vulnerability Scanning, Security Information and Event Management (SIEM), Identity Solutions (Active Directory, LDAP, etc.)
  • Lead and contribute to creation and maintenance of enterprise security reference architectures and designs for Factories, Labs, Functions, and Programs.
  • Gather business requirements from technical resources to define use cases and develop security solutions
  • Align information security objectives and designs to industry requirements such as NIST SP 800-171, NIST SP 800-82, CMMC


Skills on Resume: 

  • Ticket Monitoring (Hard Skills)
  • Threat Intelligence (Hard Skills)
  • Risk Assessment (Hard Skills)
  • Security Controls Administration (Hard Skills)
  • Audit Conducting (Hard Skills)
  • Incident Management (Hard Skills)
  • Technical Documentation (Soft Skills)
  • Security Design (Hard Skills)

20. Cyber Security Architect, NetDefense, Bellevue, WA

Job Summary: 

  • Design, build, and integrate dynamic Cyber defense, coordinate and maintain security toolsets to support organizations' continuous monitoring and ongoing authorization programs, establish a framework by which cyber risk can be measured and quantified in the marketplace.
  • Determines security requirements by evaluating business strategies and requirements
  • Researching information security standards and studying architecture/platform
  • Conducting system security and vulnerability analyses and risk assessments
  • Identifying integration issues and preparing cost estimates.
  • Implements security systems by specifying intrusion detection methodologies and equipment
  • Creating, transmitting, and maintaining keys and providing technical support, completing documentation.
  • Verifies security systems by developing and implementing test scripts.
  • Maintains security by monitoring and ensuring compliance with standards, policies, and procedures
  • Conducting incident response analyses and developing and conducting training programs.
  • Responsible for the design, development, implementation, and integration of DoD IA architectures, systems, or system components for use within computing, network, and enclave environments.
  • Ensure that the architecture and design of development and operational systems are functional and secure.
  • Design and develop security architectures for Cloud and Cloud hybrid-based systems
  • Design and implement Cloud-Native architectures that will allow business requirement to be met with minimal degree of risk to the organization
  • Promote a DevSecOps culture within the organization
  • Guide in designing Security Services for Redhat OpenShift and other DevOps pipeline products


Skills on Resume: 

  • Cyber Defense Design (Hard Skills)
  • Security Requirements Evaluation (Hard Skills)
  • Vulnerability Analysis (Hard Skills)
  • Incident Response (Hard Skills)
  • Security Compliance (Hard Skills)
  • Cloud Security Design (Hard Skills)
  • DevSecOps Promotion (Soft Skills)
  • Integration Support (Soft Skills)