INFORMATION SECURITY ARCHITECT RESUME EXAMPLE

Published: Aug 22, 2025 - The Information Security Architect designs, implements, and enhances security architectures across client-server, cloud, and SaaS environments. This role ensures that security is embedded throughout the system development life cycle and that controls align with industry standards. The architect also involves collaborating with leadership, supporting project teams, addressing compliance requirements, and strengthening the overall security posture of the organization.

Tips for Information Security Architect Skills and Responsibilities on a Resume

1. Information Security Architect, Blue Ridge IT Solutions, Asheville, NC

Job Summary: 

  • Assist in the development of security baselines and standards to include technical configuration standards
  • Assist with the development and documentation of the overall IT Security Architecture as a dedicated team member for new solutions
  • Consult with the Corporate Project Office and lines of business to align projects and initiatives with information security strategy and architecture
  • Facilitate engagement between clients and the information security services catalog
  • Assist in the development of security standards applicable to all technologies in the IT and product portfolio
  • Maintain professional accreditation and participate in relevant training
  • Assist in monitoring emerging risks and trends
  • Assist the IT Risk and Compliance team in developing education and awareness program materials
  • Partner with the IT Risk and Compliance team to develop methodologies for monitoring and reporting on compliance with architectural and security requirements
  • Perform assessments of existing and new solutions to ensure adherence to approved architecture standards


Skills on Resume: 

  • Security Standards (Hard Skills)
  • IT Architecture (Hard Skills)
  • Project Alignment (Soft Skills)
  • Client Engagement (Soft Skills)
  • Risk Monitoring (Hard Skills)
  • Compliance Reporting (Hard Skills)
  • Solution Assessment (Hard Skills)
  • Awareness Training (Soft Skills)

2. Information Security Architect, SunHaven Data Systems, Tallahassee, FL

Job Summary: 

  • Ensure that projects and corporate architectures adhere to the client's Information Security policies and standards
  • Work collaboratively with the project team to ensure that solutions follow the defined Solution Development Lifecycle process (SDLC)
  • Work with business and IT partners to help identify their requirements
  • Contribute security architecture components to the architecture definition deliverables to address the overall roadmap
  • Identify control gaps and remediation options and communicate them back to relevant stakeholders for guidance and direction
  • Provide guidance, direction and oversight on the controls within the information security framework to support business and operational objectives
  • Validate that security requirements are addressed through review, contribution and validation requirements
  • Participate in peer review and enterprise architecture reviews
  • Contribute to corporate information security strategic planning activities, roadmap development and associated activities
  • Participate in security impact analyses undertaken by the Business
  • Research new procedures and tools and participate in the research and development of security frameworks, standards and procedures
  • Participate in project and team meetings (information security office and corporate architecture)
  • Develop specifications and requirements for the procurement process
  • Participate in the delivery of the roadmap and high-level awareness training to internal teams


Skills on Resume: 

  • Security Compliance (Hard Skills)
  • SDLC Alignment (Hard Skills)
  • Requirements Gathering (Soft Skills)
  • Architecture Contribution (Hard Skills)
  • Control Analysis (Hard Skills)
  • Security Oversight (Soft Skills)
  • Impact Assessment (Soft Skills)
  • Strategic Planning (Soft Skills)

3. Information Security Architect, CoreTech Analytics, Des Moines, IA

Job Summary: 

  • Perform a forensics analysis on system failures and provide details of the discovery
  • Perform counterfeit analysis on HPE computer hardware devices such as hard disks and RAM
  • Provide detailed reports of the discoveries made on each task and provide recommendations on how to resolve/prevent current/future incidents
  • Responsible for the implementation of a solutions architecture across a group of specific business applications or technologies based on enterprise business strategy, business capabilities, and business requirements
  • Develop the architecture for a broader scope of projects, working closely with product architects, platform architects, and other solution architects who manage and design architecture for a single project or initiative
  • Analyze the segment-IT environment (run, grow, and transform the business) to detect critical deficiencies, and recommend solutions for improvement (systems of record, differentiation, and innovation)
  • Define the principles, guidelines, standards, and solution patterns to ensure solution decisions are aligned with the enterprise's future-state architecture vision
  • Design and direct the governance activities associated with ensuring local and remote access architecture assurance and compliance
  • Analyze requests for local and remote access to different platforms and business groups
  • Determine whether the application is complete in all its parts and its validity
  • Establish processes to monitor the handling of each case
  • Identify the different areas incumbents in providing such requests and channel them to everyone concerned
  • Analyze, evaluate, and process requests from users, business units, and partners regarding problems accessing applications, communication problems, among others
  • Audit and document to remove inactive or expired network management accounts and/or any other condition that requires implementation of control procedures
  • Plan, develop, and suggest changes to network and security technologies
  • Develops and designs requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), firewalls, Network Access Control (NAC), telecommunication devices, and Network Devices
  • Audits and maintains access profiles to network environments
  • Oversee vendor management and relationships including evaluation, contracting, invoicing, and recommendations
  • Prepares production reports, statistics and makes presentations to internal or external users 


Skills on Resume: 

  • Forensics Analysis (Hard Skills)
  • Hardware Inspection (Hard Skills)
  • Incident Reporting (Hard Skills)
  • Solution Architecture (Hard Skills)
  • System Evaluation (Hard Skills)
  • Access Governance (Soft Skills)
  • Network Design (Hard Skills)
  • Vendor Management (Soft Skills)

4. Information Security Architect, TriAxis Technologies, Little Rock, AR

Job Summary: 

  • Contribute to the engagement, development, and maintenance of a strategic Information Security architecture that is aligned to the overall business strategy to support the delivery of the Central Bank's Information Security strategy and plan
  • Coach and mentor the Information Security Specialists on the architecture and projects team as a subject matter expert on Information Security Architecture
  • Contribute to influencing, developing, communicating, and championing Technical Information Security to ensure the Central Bank’s information and data systems are protected from risk, fraud, and unauthorized access
  • Support the Information Security Manager
  • Ensuring new project solutions are fully aligned with the Information Security strategy so they are appropriately safeguarded
  • Provide Information Security review and input to strategically important, highly sensitive, or technically complex IMTD projects which require a significant level of experience and input to contribute to the success of these strategic projects
  • Provide architectural and security SME input into Information Security improvement projects, providing Information Security guidance to other Enterprise Architecture disciplines including Infrastructure and Technology/Application/Process / and Data
  • Contribute input into the Information Technology roadmap and support their definition, ownership, development, and maintenance of the Information Technology Security roadmap
  • Ensure they both meet current and future business needs and support the delivery of the Central Bank’s Information Security strategy and plan
  • Identify architectural changes within the current information security architecture, either through control gaps or upcoming regulations
  • Articulate the business case for projects to close identified gaps
  • Work with business and IMTD stakeholders to define, implement and improve the Central Banks' IT systems, processes, and information security capabilities
  • Keep abreast with developments in the IT industry, banking, and regulatory sectors to ensure that the architectures are kept in line with industry standards
  • Identify and assess new and emerging technologies and promote awareness among staff and business to develop and maintain the integrity of the Central Bank's Information Security


Skills on Resume: 

  • Security Strategy (Soft Skills)
  • Team Mentoring (Soft Skills)
  • Risk Prevention (Hard Skills)
  • Project Alignment (Hard Skills)
  • Security Review (Hard Skills)
  • Architecture Guidance (Soft Skills)
  • Roadmap Support (Hard Skills)
  • Tech Awareness (Soft Skills)

5. Information Security Architect, NovaBridge Solutions, Reno, NV

Job Summary: 

  • Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
  • Ensure that project roll-outs meet security standards and are effectively integrated with current applications
  • Responsible for designing and communicating security requirements and controls that will adequately support the enterprise
  • Assist the Information Security team with reporting and auditing requirements as well as writing and completing documentation for various processes and communications
  • Acts as a liaison between association stakeholders and the technical organization by planning, conducting, and directing the analysis of complex business problems
  • Guides stakeholders regarding security controls and best practices
  • Identify and communicate current and emerging security threats
  • Builds close working relationships with key stakeholders to enable support for security initiatives
  • Review existing security architecture, identify design gaps and recommend security enhancements
  • Lead SAP landscape security strategy and risk management plan
  • Define frameworks, standards, and tools to be used across all University environments
  • Serve as an Information Security expert and trusted advisor on the University’s Core System Replacement Programme


Skills on Resume: 

  • Design Review (Hard Skills)
  • Security Integration (Hard Skills)
  • Control Design (Hard Skills)
  • Audit Support (Hard Skills)
  • Stakeholder Liaison (Soft Skills)
  • Threat Awareness (Hard Skills)
  • Risk Strategy (Hard Skills)
  • Trusted Advisor (Soft Skills)

6. Information Security Architect, TerraLink Systems, Boise, ID

Job Summary: 

  • Produce security architecture design artifacts
  • Ensure alignment between security architecture frameworks and standards and the overall business strategy
  • Identify, resolve, and manage security strategy and architecture issues, ensuring they are identified, resolved, and managed
  • Communicate complex and technical issues to diverse audiences, orally and in writing, in an easily understood, authoritative, and actionable manner
  • Provides technical security advice to assist with prioritization of vulnerabilities and risks, recommend corrective actions, and advise on the feasibility and impact of related risk mitigation steps
  • Responsible for implementing specific mitigation steps and corrective actions
  • Review and understand the current state processes, tools, and identified information security risks and apply information security best practices to develop risk mitigation solutions appropriate for UCI DFA environment
  • Assist with ongoing security assessments of units, information systems, and/or networking infrastructure components and help determine vulnerabilities and risks
  • Collect information, examine, analyze, and report to management regarding the causes, effects, and implications of such security incidents
  • Managing the technical aspect in vulnerability management including system design, cross-team integration, and collaboration
  • Defining and managing the Vulnerability Management architecture artifacts and roadmap within the given functional and technical standards
  • Reviewing vulnerabilities' data from multiple sources (i.e., external/internal penetration testing, internal/external vulnerability scanning, etc.) across multiple technologies
  • Design and determine the Threat analysis and risk rating of threats and vulnerabilities to business assets
  • Effectively communicate the risks of identified vulnerabilities and recommendations of cost-effective security controls to mitigate identified risks
  • Identifying and controlling anomalies, patterns in vulnerability scan, penetration test, and alerting results that may indicate pre-incident indicators


Skills on Resume: 

  • Architecture Design (Hard Skills)
  • Strategy Alignment (Hard Skills)
  • Issue Resolution (Hard Skills)
  • Technical Communication (Soft Skills)
  • Risk Mitigation (Hard Skills)
  • Security Assessment (Hard Skills)
  • Threat Analysis (Hard Skills)
  • Vulnerability Management (Hard Skills)

7. Information Security Architect, IronCrest Cyber Group, Erie, PA

Job Summary: 

  • Implement secure solutions that suit the company’s risk appetite and increase the organization’s security posture
  • Assist with operational departments to innovate and preserve the security strategy and framework for business units and company-wide projects
  • Perform incident response and remediation procedures
  • Install and maintain appropriate security technologies, systems, tools, and countermeasures for risk mitigation and vulnerability management
  • Maintain knowledge of current security and technology products, threats, and trends
  • Assist in security standards, procedures, and policy development
  • Provide security guidance and training to business and IT employees
  • Assist all company employees and customers in a prompt, professional, and courteous manner
  • Adhere to company security practices according to policy and adopt a security framework
  • Uphold system and application hardening procedures
  • Comply with all banking regulations and legal statutes
  • Maintain the confidentiality of the company and customer information


Skills on Resume: 

  • Secure Solutions (Hard Skills)
  • Security Strategy (Soft Skills)
  • Incident Response (Hard Skills)
  • Tech Maintenance (Hard Skills)
  • Threat Awareness (Hard Skills)
  • Policy Development (Hard Skills)
  • Security Training (Soft Skills)
  • Customer Support (Soft Skills)

8. Information Security Architect, Zenith Edge Technologies, Albuquerque, NM

Job Summary: 

  • Provide advice, guidance and policy interpretation to a wide audience of internal and external entities (teams, projects, suppliers, customers and partners)
  • Produce detailed technical standards content, based on established security policies and practices
  • Provide security consultancy for business as usual activities and to ensure that security-related capabilities are fit for purpose and in line with the agreed operating model and risk appetite within BUPA
  • Obtain and act on vulnerability information and conduct security risk assessments, business impact analysis and accreditation on complex information systems
  • Contributing to the investigation of major breaches of security and recommending appropriate control improvements
  • Contribute to the development of information security policy, standards, and guidelines and work with a wide range of stakeholders
  • Ensure that policies and standards are being effectively implemented
  • Responsible for technical consulting of projects and existing systems regarding confidentiality, integrity, availability of assets, information, data and IT services within the organization
  • Create security profiles for applications and services
  • Identify and assess threats and support with development of appropriate security countermeasures and evaluation of their effectiveness
  • Incorporates security architectures like infrastructure and network into conceptual designs
  • Develops and recommends security designs and frameworks for technology systems by defining processes and architecture for creating secure networks, building firewalls and implementing intrusion-detection systems
  • Provides Information Security subject matter expertise in various risk assessments


Skills on Resume: 

  • Policy Guidance (Soft Skills)
  • Standards Development (Hard Skills)
  • Security Consulting (Soft Skills)
  • Risk Assessment (Hard Skills)
  • Incident Investigation (Hard Skills)
  • Policy Implementation (Hard Skills)
  • Asset Protection (Hard Skills)
  • Architecture Design (Hard Skills)

9. Information Security Architect, PixelCore Data Group, Fargo, ND

Job Summary: 

  • Maintain active engagement with Global and regional Enterprise Architecture and Infrastructure operations functions
  • Contribute to the thought-leadership of the Information Security group mandate and advancement of its practice at a global level
  • Maintains security by monitoring and ensuring compliance with standards, policies, and procedures
  • Conducting incident response analyses
  • Developing and conducting training programs
  • Define high-level migration plans to address the gaps between the current and future state, typically in sync with the budgeting or other planning processes
  • Lead the analysis of the current technology environment to detect critical deficiencies and recommend solutions for improvement
  • Lead the analysis of the technology industry and market trends to determine their potential impact on Information Security and Privacy within the organization
  • Assist with designing the governance activities associated with ensuring compliance with Information Security Policies
  • Works closely with the Enterprise Risk Management team to document security risks and the appropriate mitigation plans across Finning globally
  • Oversee or consult on technology implementation projects, particularly for new or shared infrastructure solutions


Skills on Resume: 

  • Global Collaboration (Soft Skills)
  • Thought Leadership (Soft Skills)
  • Standards Compliance (Hard Skills)
  • Incident Analysis (Hard Skills)
  • Security Training (Soft Skills)
  • Migration Planning (Hard Skills)
  • Tech Evaluation (Hard Skills)
  • Risk Mitigation (Hard Skills)

10. Information Security Architect, HarborPoint Systems, Mobile, AL

Job Summary: 

  • Consult on application or infrastructure development projects to harmonize systems or infrastructure
  • Facilitate the research, evaluation and selection of hardware and software technology and product standards, as well as the design of standard configurations
  • Identify the organizational impact (e.g., on skills, processes, structures and culture) and financial impact of the Information Security Program
  • Document necessary Information Security design and analysis work, possibly including project postmortem documentation and metric collection
  • Understand, advocate and augment the business and IT strategies and, more specifically, Information Security Program development and service delivery
  • Participate in and lead design sessions with Finning personnel as well as external parties
  • Stay abreast of IT-related best practices and manage key consultative relationships internally to ensure that Finning is seen as the best practice leader within the area of responsibility
  • Regularly participate with standards bodies in setting industry-wide standards as well as bringing the best practice knowledge to Finning projects and initiatives
  • Provide leadership and mentoring to internal security team resources, key stakeholders, and outsourcing partners
  • Drive technical results independently with minimal guidance from the Director, Information Security and CISO


Skills on Resume: 

  • System Consulting (Hard Skills)
  • Tech Evaluation (Hard Skills)
  • Impact Analysis (Hard Skills)
  • Security Documentation (Hard Skills)
  • Program Development (Soft Skills)
  • Design Leadership (Soft Skills)
  • Best Practices (Soft Skills)
  • Team Mentoring (Soft Skills)

11. Information Security Architect, SkyStream Consulting, Cedar Rapids, IA

Job Summary: 

  • Work closely with digital teams, product managers, risk managers, technical leads, and developers to ensure that design solutions meet security standards and policies
  • Ensure Data Privacy through reviews, audits, and implementing secure best practices
  • Architects frictionless preventative and detective security controls to be built into hybrid-cloud environments for Azure and on-prem environments and works to guide continuous improvement
  • Provides Cybersecurity integration and automation architectures for the next-gen cloud native security stack that is identity and API driven
  • Work with the respective technology teams to design a robust, reliable, and integrated IT security architecture covering the entire enterprise and addressing issues as prioritized by Information Security
  • Collecting, generating, and analyzing innovative ideas and technologies to use across the business
  • Engage with and support IT and security teams, project managers, and business users in the security architecture and prioritization of security controls
  • Conduct security architecture and risk reviews to ensure the selection of security controls and solutions is consistent with the enterprise architecture, including reference models and segment and solution architectures
  • Calibrate security control systems with the desired risk posture for the enterprise and customers
  • Optimize security tool deployments and introduce scalable processes across IT and InfoSec capabilities
  • Mentor and collaborate with other Information Security team members across the broad spectrum of information security programs, such as Threat and Vulnerability Management, Security Response, Information Protection, Governance and Compliance, and Identity and Access Management
  • Serve in an advisory capacity to senior business leaders on emerging threats, technologies and areas of concern related to security architecture
  • Supporting on-call incident response operations from a security engineering and architecture perspective


Skills on Resume: 

  • Security Design (Hard Skills)
  • Data Privacy (Hard Skills)
  • Cloud Security (Hard Skills)
  • Security Automation (Hard Skills)
  • Enterprise Architecture (Hard Skills)
  • Innovation Strategy (Soft Skills)
  • Risk Alignment (Hard Skills)
  • Leadership Advisory (Soft Skills)

12. Information Security Architect, Granite Harbor IT, Manchester, NH

Job Summary: 

  • Responding to disruptive forces by helping business leaders within the domain facilitate the decision-making process and providing actionable recommendations on initiatives and policies to help drive prioritised targeted business outcomes
  • Helping domain area business leaders enable their target prioritised future-state business capabilities through the choice of initiatives to invest in and working together with other lead architects to ensure the domains align and join up effectively
  • Assist business leaders within the domain to understand, monetise and operationalise existing, new and emerging technologies
  • Guide and motivate the solution and project architects and align architectural designs within the domain to key standards
  • Analyse the Pets at Home security area strategy and how it can optimise use of technology innovation
  • Support Cyber security area strategy development with technology identification and opportunities that can deliver value as part of a prioritised business agenda
  • Engage key stakeholders within the domain to identify technology-enabled innovation opportunities that enable and drive business strategy and focus on growing revenue, optimising costs and mitigating risks
  • Work with business and IT leaders to help describe and understand innovation that will enhance the operation of the domain area
  • Seek ways to drive adoption of new technology and reuse existing technology for enabling business capabilities, value streams and business processes within the domain
  • Research and provide information on emerging technology trends and disruptions and competitors' practices relevant to the domain
  • Work with the IT Business Partner in the domain area to provide internal management consultancy services to business leaders, business units and lines of business
  • Helping them with design thinking, business modeling, ecosystem modelling, innovation management and IT investment analysis
  • Consult with technical subject matter experts to develop technical solutions
  • Advises on options, risks, costs versus benefits, and impact on other business processes and system priorities
  • Lead architecture governance and assurance within the domain to identify business, information, solutions, technical and security architecture issues at the front end of the project life cycle, and with product managers and product owners at the different stages of the product lifecycle


Skills on Resume: 

  • Business Strategy (Soft Skills)
  • Technology Adoption (Hard Skills)
  • Innovation Leadership (Soft Skills)
  • Architecture Alignment (Hard Skills)
  • Stakeholder Engagement (Soft Skills)
  • Emerging Trends (Soft Skills)
  • IT Consulting (Soft Skills)
  • Governance Oversight (Hard Skills)

13. Information Security Architect, Orbitline Technologies, Columbia, SC

Job Summary: 

  • Define architectural standards for security solutions and services based on frameworks such as TOGAF or SABSA and leveraging either existing or to be built design artefacts and standards
  • Ensuring that security happens in the PS world
  • Communications around secure service delivery and educating stakeholders to ingrain security in the customization and adoption phase
  • Drafting and writing material around the introduction of OWASP, SANS Top 20, CIS and such standards
  • Ensure open (but secure) interfaces for overall program activities and alignment and improvements
  • Help form a security design review board that ensures alignment, communication, security control points, and improves speed to market and also security by design and build
  • Define code review standards and help select tools to support these efforts
  • Develop an architectural current state diagram and topology across the customization/services area


Skills on Resume: 

  • Security Standards (Hard Skills)
  • Secure Delivery (Soft Skills)
  • Stakeholder Education (Soft Skills)
  • Standards Writing (Hard Skills)
  • Interface Security (Hard Skills)
  • Design Review (Hard Skills)
  • Code Quality (Hard Skills)
  • Future Planning (Soft Skills)

14. Information Security Architect, NexaField Solutions, Lubbock, TX

Job Summary: 

  • Document and address the organization's information security, architecture, and systems security engineering requirements throughout the acquisition life cycle
  • Employ secure configuration management processes
  • Ensure that system(s) and architecture(s) are consistent with the organization's cybersecurity architecture guidelines
  • Identify and prioritize critical business functions in collaboration with organizational stakeholders
  • Perform security reviews, identify gaps in security architecture and develop a security risk management plan
  • Define and document how the implementation of a new system or new interfaces impacts the security posture of the current environment
  • Evaluate security architectures and designs to determine the adequacy of security controls or response to requirements contained in acquisition documents
  • Plan, design, test and enhance the operational security and resiliency of computer, VoIP, network infrastructure, backups and network-connected medical devices, or other roles and responsibilities as directed by the Chief Information Security Officer (CISO)


Skills on Resume: 

  • Security Engineering (Hard Skills)
  • Config Management (Hard Skills)
  • Architecture Alignment (Hard Skills)
  • Business Prioritization (Soft Skills)
  • Risk Planning (Hard Skills)
  • Impact Analysis (Hard Skills)
  • Control Evaluation (Hard Skills)
  • Operational Resilience (Hard Skills)

15. Information Security Architect, ArrowShield Tech, Topeka, KS

Job Summary: 

  • Serve as an information security expert, helping project teams comply with enterprise and IT security policies, regulations, and recommend strategic solutions
  • Support the adoption and expansion of new services that align with Harvard Kennedy School’s mission
  • Seek opportunities to research, design, and advocate new technologies, architectures, products, policies, processes, or procedures that will support security requirements for the University, business partners, and vendors
  • Recommend mitigation steps to reduce the business impact of emerging information security threats and vulnerabilities
  • Ensure accurate and timely reporting
  • Prepare specialized and ad hoc reports
  • Act as a trusted advisor to Faculty/staff/students
  • Abide by and follow the Harvard University IT Code of Conduct
  • Develop an understanding of user needs and recommend solutions that meet Harvard University's Information Security Policy
  • Manage critical monitoring and alert systems (White Hat, Tenable, Splunk, CrowdStrike) to ensure health and accuracy
  • Collaborate with HKS IT staff to quickly remediate identified vulnerabilities
  • Lead the security incident response process, working closely with the Support, Application, and Operations Teams while communicating clearly with the impacted users
  • Design and develop reports to measure progress and to support strategic decision-making
  • Recognize and respond to information security incidents, in partnership with Harvard University IT
  • Improve the information security awareness level at HKS through education and training in cooperation with HKS IT, HUIT, and other trainers
  • Participate actively in the information security community at Harvard University, attending school-wide security meetings, learning lessons from others, and sharing information on lessons learned at HKS
  • Create and communicate best practices and standards for secure computing
  • Identify and maintain an inventory of high-risk information, high-risk data that includes the owner and data location


Skills on Resume: 

  • Security Compliance (Hard Skills)
  • Tech Advocacy (Soft Skills)
  • Threat Mitigation (Hard Skills)
  • Trusted Advisor (Soft Skills)
  • Monitoring Tools (Hard Skills)
  • Incident Response (Hard Skills)
  • Security Awareness (Soft Skills)
  • Data Inventory (Hard Skills)

16. Information Security Architect, Vanguard Logic Systems, Charleston, WV

Job Summary: 

  • Defining security requirements by evaluating business strategies and requirements
  • Researching information security standards
  • Providing consulting services and security support to internal business and technology customers
  • Serving as the lead security liaison on assigned projects
  • Providing input and recommendations to the development teams related to architecture, design, coding practices and SDLC elements that could potentially impact the application or solution from a security perspective
  • Validating controls for Encryption, Access Control, Web Application Vulnerability Detection, OWASP top 10 and other common web application security parameters
  • Reviewing application architecture and design from an application and infrastructure security perspective, ensuring alignment with the organization's security standards and industry best practices
  • Assisting with the development of secure coding standards
  • Ensuring that development is done by industry standards for secure development
  • Facilitating Periodic static code analysis utilizing the existing standard service offering
  • Facilitating dynamic and/or manual security testing utilizing existing standard service offering
  • Reviewing, developing, testing, and implementing security plans, products, and control techniques
  • Reviewing and documenting the circumstances surrounding security gaps and defining corrective actions
  • Maintaining awareness of security and technology trends and sharing that knowledge with others
  • Evangelizing security policies, standards, and non-functional requirements
  • Documenting processes, procedures, assessment outputs, and working papers documentation to support existing SDLC and governance requirements
  • Representing security and IT risks among other company risk departments and committees
  • Evaluating the effectiveness of awareness and training programs and making recommendations for improvement


Skills on Resume: 

  • Security Requirements (Hard Skills)
  • Standards Research (Hard Skills)
  • Security Consulting (Soft Skills)
  • Code Review (Hard Skills)
  • Secure Development (Hard Skills)
  • Security Testing (Hard Skills)
  • Gap Remediation (Hard Skills)
  • Risk Communication (Soft Skills)

17. Information Security Architect, RiverGuard Security, Baton Rouge, LA

Job Summary: 

  • Provide guidance and expertise regarding the security architecture for application development or infrastructure initiatives
  • Collaborate with solution architects and security teams
  • Implement and maintain the organizational compliance requirements related to contractual obligations
  • Analyze and configure corporate systems to improve their security
  • Analyze data loss prevention measures
  • Verify security, availability, and confidentiality of corporate data
  • Monitor for emerging threats, assess risks and recommend relevant controls and mitigation strategies
  • Support security-related projects
  • Monitor, review and respond to security events received from SOC and track through to resolution


Skills on Resume: 

  • Security Guidance (Hard Skills)
  • Team Collaboration (Soft Skills)
  • Compliance Management (Hard Skills)
  • System Hardening (Hard Skills)
  • Data Protection (Hard Skills)
  • Threat Monitoring (Hard Skills)
  • Project Support (Soft Skills)
  • Incident Handling (Hard Skills)

18. Senior Information Security Architect, BlueOrbit Technologies, Lincoln, NE

Job Summary: 

  • Evaluate, design, operate, and maintain the company’s security architecture that protects existing and future systems and data in compliance with security policies and information protection strategies
  • Track developments and changes in the digital business and threat environments to ensure that they are adequately addressed in security strategy plans and architecture artifacts
  • Plan, implement, and maintain security solutions for applications and infrastructures in on-premises and cloud environments (Microsoft Azure, Amazon Web Services)
  • Research, design, and advocate for new security technologies, architectures, and products that will support security requirements for the enterprise
  • Collaborate with internal and external stakeholders on the implementation of technical architecture components
  • Define baseline security configuration standards for operating systems (e.g., OS and platform hardening), network segmentation, data protection, and cloud services
  • Administer, monitor, and perform security operations tasks around Tivity Health’s technical security solutions (e.g., firewalls, anti-malware, logging/monitoring systems (SIEM), data loss prevention (DLP) solutions, etc.)
  • Review information security-related events from multiple sources and work with other team members to respond appropriately
  • Conduct and/or oversee information security technical assessments (e.g., vulnerability scans, application code reviews, third-party penetration tests, etc.), evaluate findings, document results and report to management, and provide recommendations for remediation
  • Provide initial triage of reported information security incidents and work together with other incident response team members and IT outsourced partners to provide a rapid response to security threats


Skills on Resume: 

  • Security Architecture (Hard Skills)
  • Threat Tracking (Hard Skills)
  • Cloud Security (Hard Skills)
  • Tech Research (Soft Skills)
  • Stakeholder Collaboration (Soft Skills)
  • Baseline Standards (Hard Skills)
  • Security Operations (Hard Skills)
  • Incident Response (Hard Skills)

19. Senior Information Security Architect, SecureNest Systems, Spokane, WA

Job Summary: 

  • Conduct incident investigations utilizing forensic toolsets
  • Analyze business impact and exposure based on emerging security threats, vulnerabilities, and risks
  • Conduct accurate evaluations of the level of security 
  • Identify and remediate gaps and appropriately protect the enterprise, coordinating with other teams for risk mitigation
  • Lead in evidence collection for audits and assist in company audits/assessments such as SOX, SOC2, HIPAA, HITRUST, etc.
  • Assist with vendor and product/solution security assessments
  • Maintain tracking of information security corrective actions and exceptions
  • Provide security metrics that can be used by various groups and teams including senior management
  • Write and contribute to the creation and maintenance of information security-related documentation (e.g., policies, procedures, standards, work instructions, etc.)
  • Lead and/or assist in the implementation of Tivity Health’s Information Security projects as directed
  • Provide technical guidance and training to IT staff
  • Create and maintain relationships with various teams (e.g., programmers, auditors, IT support, management, etc.) to facilitate the implementation and maintenance of information security controls


Skills on Resume: 

  • Forensic Analysis (Hard Skills)
  • Threat Evaluation (Hard Skills)
  • Gap Remediation (Hard Skills)
  • Audit Support (Hard Skills)
  • Vendor Assessment (Hard Skills)
  • Security Metrics (Hard Skills)
  • Policy Writing (Hard Skills)
  • Team Collaboration (Soft Skills)

20. Information Security Architect, Titan Peak Cybersecurity, Billings, MT

Job Summary: 

  • Assists in designing and implementing security strategies
  • Defines security baselines and standards to include technical configuration standards
  • Supports the implementation of security controls, guidelines, recommendations, and best practices
  • Aligns assigned projects with information security standards and compliance objectives
  • Assists with the development, enhancement, and documentation of Information Technology (IT) security architecture
  • Integrates security design requirements into the system development life cycle
  • Drives significant projects and initiatives to ensure security objectives are achieved
  • Facilitates engagement between clients and the information security services catalog
  • Ensures compliance with architectural and security requirements
  • Performs assessments of existing and new solutions to ensure adherence with approved architecture standards
  • Maintains a strong knowledge of emerging risks and trends
  • Assists the IT Risk and Compliance team in developing education and awareness program materials


Skills on Resume: 

  • Security Strategy (Hard Skills)
  • Baseline Standards (Hard Skills)
  • Control Implementation (Hard Skills)
  • Compliance Alignment (Hard Skills)
  • Architecture Development (Hard Skills)
  • SDLC Integration (Hard Skills)
  • Client Engagement (Soft Skills)
  • Risk Awareness (Soft Skills)

21. Information Security Architect, IronBridge Technologies, Roanoke, VA

Job Summary: 

  • Monitor and report all IS issues within the company, the group companies and the HQ based in Tokyo
  • Proactively lead the Incident Management processes to restore a normal service operation to minimise impact on business operations
  • Work closely with their customers and provide support on all IS issues including revision of policies and practices and provide customers with advice for improvement
  • Communicate to customers the impact of the IS threats and assist them with the implementation of new or revised procedures and/or IS plans to meet their needs
  • Conduct internal and customer audits, provide all parties with guidance on IS and changing trends/legislation
  • Be the first point of contact for all IS-related enquiries from staff and customers
  • Actively participate in IT Risk Assessment
  • Identifying and cataloguing information assets
  • Identifying threats and vulnerabilities
  • Analysing internal controls and determining the likelihood of an incident occurring again
  • Assessing the impact the threat may have on business operations, prioritising risks to IS and designing controls
  • Design, implement and review internal and external system security assessment support
  • Systematically assess the company’s and the group companies' IS management process in line with the ISO 27001 certification through internal audits
  • Revision of customers' ISO 27001
  • Review, assess and audit new and existing suppliers
  • Design and implement IS training for internal and the group companies as well as customers 
  • Provide IS induction and training to new employees and expatriates


Skills on Resume: 

  • Incident Management (Hard Skills)
  • Customer Support (Soft Skills)
  • Threat Communication (Soft Skills)
  • Audit Execution (Hard Skills)
  • Risk Assessment (Hard Skills)
  • Asset Identification (Hard Skills)
  • Control Design (Hard Skills)
  • Security Training (Soft Skills)

22. Information Security Architect, Pinnacle Data Systems, Springfield, MO

Job Summary: 

  • Design information security solutions that balance business requirements with information and cybersecurity requirements
  • Review current system security measures, recommend and implement enhancements to improve or maintain the information security posture
  • Plan, research, and design robust security architectures for IT projects
  • Define and document security requirements by evaluating business strategies and requests
  • Document and update security standards, policies, and procedures
  • Maintain security by monitoring and ensuring compliance with standards, policies, and procedures
  • Identify security gaps and design solutions to minimize risk to the organization
  • Provide guidance and assistance to members of the security operations and engineering team
  • Participate in security vulnerability assessments and penetration tests on Bank systems and applications


Skills on Resume: 

  • Security Design (Hard Skills)
  • System Review (Hard Skills)
  • Architecture Planning (Hard Skills)
  • Requirements Definition (Hard Skills)
  • Policy Documentation (Hard Skills)
  • Compliance Monitoring (Hard Skills)
  • Risk Mitigation (Hard Skills)
  • Team Guidance (Soft Skills)

23. Information Security Architect, Secure Valley Systems, Dover, DE

Job Summary: 

  • Incorporate relevant IS market trends and general technology trends
  • Design new/changed IS solutions and ensure alignment with Global AholdDelhaize enterprise architecture standards, policies, and procedures
  • During IT solution development and implementation, ensure that the solution is developed in line with the approved solution design and that the solution design is maintained consistently
  • Ensure all security and compliance aspects are taken into account in Enterprise Architecture (secure by design, compliant by design)
  • Advice on Information Security technology and solutions
  • Perform regular vendor analysis and bake-offs to preselect technology building blocks
  • Understand the business objectives and ensure that the usage of Security Architecture does not interfere with the business objectives and processes
  • Support the Business Security Advisors in delivering end-to-end evangelism and incorporation of proportional and enabling security to business processes
  • Promote, evangelize and disseminate within the business and the rest of the organizational units, the benefits of security and the need to utilize defined building blocks


Skills on Resume: 

  • Market Awareness (Soft Skills)
  • Solution Design (Hard Skills)
  • Architecture Alignment (Hard Skills)
  • Secure Compliance (Hard Skills)
  • Security Advisory (Soft Skills)
  • Vendor Evaluation (Hard Skills)
  • Business Alignment (Soft Skills)
  • Security Evangelism (Soft Skills)

24. Information Security Architect, DataWarden Solutions, Lexington, KY

Job Summary: 

  • Identify and communicate current and emerging security threats
  • Plan, research and design robust security architectures
  • Set security standards and define best practices for the enterprise
  • Provide security direction for teams across the enterprise
  • Design systems and solutions with an understanding of the impact on the business, customers, and resources available to affect change
  • Review and evaluate existing systems, solutions, and practices
  • Design improvements within the appropriate context of the current and future states
  • Present and explain solutions across all levels of management
  • Identify security design gaps in existing and proposed architectures and recommend changes or enhancements


Skills on Resume: 

  • Threat Awareness (Hard Skills)
  • Security Architecture (Hard Skills)
  • Standards Definition (Hard Skills)
  • Enterprise Guidance (Soft Skills)
  • Business Impact (Soft Skills)
  • System Evaluation (Hard Skills)
  • Design Improvement (Hard Skills)
  • Solution Presentation (Soft Skills)

25. Information Security Architect, PrismCore Cyber Solutions, Anchorage, AK

Job Summary: 

  • Facilitating project teams through Information Security due diligence
  • Performing risk assessment and risk management, primarily associated with Microsoft 365
  • Develop and deliver security artifacts and security requirements to project teams
  • Influence project teams and other stakeholders on security controls
  • Support and collaborate with Security Consulting and project team members
  • Support the ongoing development and maintenance of Workday Trust Program content for the public sector business
  • Deliver customer-facing presentations on Workday architecture, information security, and compliance
  • Collaborate with a variety of teams including Workday Sales and Legal, to support public sector evaluation and contract negotiations
  • Drive understanding and resolution of customer security concerns
  • Respond to written customer information security and compliance inquiries
  • Assist presales engineers with security and compliance requirements in RFIs and RFPs


Skills on Resume: 

  • Risk Assessment (Hard Skills)
  • Security Requirements (Hard Skills)
  • Stakeholder Influence (Soft Skills)
  • Project Support (Soft Skills)
  • Public Compliance (Hard Skills)
  • Customer Engagement (Soft Skills)
  • Security Response (Hard Skills)
  • Contract Support (Soft Skills)

26. Information Security Architect, Sandstone Security Group, Cheyenne, WY

Job Summary: 

  • Develop and maintain a security architecture process that enables the enterprise to implement solutions that are secure and aligned with business needs
  • Integrate risk management and governance into the architecture process to identify risks early, bring visibility and support decision-making using objective data
  • Accountable for securing enterprise information by analyzing IT architectures, threats and current security controls to identify gaps and recommend changes to enhance security and reduce risk 
  • Lead the development and maturity of the program through a multiyear roadmap
  • Influence and communicate effectively with non-technical audiences including senior management
  • Prepare reports including presentations, metrics, and other documentation required to guide outcomes and communicate status
  • Participate in business case development, project sizing, design and implementation
  • Drive objectivity and build consensus among stakeholders with different perspectives and motivators
  • Participates in vendor selections
  • Remains current on IT Security/Architecture trends


Skills on Resume: 

  • Security Architecture (Hard Skills)
  • Risk Integration (Hard Skills)
  • Gap Analysis (Hard Skills)
  • Program Leadership (Soft Skills)
  • Executive Communication (Soft Skills)
  • Outcome Reporting (Hard Skills)
  • Stakeholder Consensus (Soft Skills)
  • Trend Awareness (Soft Skills)

27. Information Security Architect, VertexLink Systems, Missoula, MT

Job Summary: 

  • Act as security design authority for projects within the Digital Risk Management portfolio
  • Engage from the idealization through the system development lifecycle in project execution
  • Design and lead the implementation of an Enterprise Architecture that supports the organization's Objectives and Key Results
  • Drive alignment and governance across the various architectural domains
  • Understand, advocate and support the enterprise's IT strategy, along with assisting in the development and implementation/realization of the various IT roadmaps
  • Reviewing current system security measures and recommending and implementing enhancements
  • Analyze the current IT environment to detect critical deficiencies and recommend solutions for improvement
  • Work in a global organization with onshore as well as offshore resources
  • Actively engages in driving strategic initiatives and the related goals, to ensure the optimal outcome
  • Establishing disaster recovery procedures and conducting breach of security drills
  • Serve as an escalation point for security incidents and provide thorough post-event analyses
  • Support a standard QA process with the project development teams
  • Support Governance, Risk, and Compliance efforts including GDPR and SOX
  • Support standard security testing labs
  • Support Identity and Access Management


Skills on Resume: 

  • Security Authority (Hard Skills)
  • Architecture Design (Hard Skills)
  • IT Alignment (Soft Skills)
  • Security Review (Hard Skills)
  • Global Collaboration (Soft Skills)
  • Disaster Planning (Hard Skills)
  • Incident Response (Hard Skills)
  • Compliance Support (Hard Skills)

28. Information Security Architect, Enclave Cyber Strategies, Concord, NH

Job Summary: 

  • Work closely with customers, software developers, enterprise architects, information security, ethics, compliance and data privacy department, and other key stakeholders
  • Build information security strategies and programs
  • Develop and implement enterprise-level policies and standards
  • Drive the framework University’s systems, infrastructure, cloud environments and solutions as it relates to security standards and compliance
  • Develop and/or review system designs and architectures
  • Make security-related recommendations that are aligned with regulatory and compliance requirements
  • Provide guidance and consultation to the Enterprise Architecture team
  • Agile release teams and ongoing projects and initiatives, integrating optimal security controls 
  • Perform information security risk assessments and provide clear recommendations for effective remediation of identified risks
  • Maintain a strong understanding of information security technologies, concepts and trends based on changing threat landscapes


Skills on Resume: 

  • Stakeholder Engagement (Soft Skills)
  • Security Strategy (Hard Skills)
  • Policy Development (Hard Skills)
  • Compliance Framework (Hard Skills)
  • Architecture Review (Hard Skills)
  • Regulatory Alignment (Hard Skills)
  • Risk Assessment (Hard Skills)
  • Threat Awareness (Soft Skills)

29. Information Security Architect, AxisSentinel Consulting, Bismarck, ND

Job Summary: 

  • Conduct security design reviews and risk analysis
  • Identify potential security weaknesses in the design, implementation and operation of infrastructure and applications
  • Work closely with numerous teams across application delivery and infrastructure functions including networks, platforms and end user computing
  • Define security requirements that contribute to the secure design and implementation of the solution, in addition to providing technical security expertise in support of audit-related activities
  • Provide consult across the broad spectrum of information security domains, including Cloud and emerging technologies, while appreciating the wider global regulatory and cyber threat landscape 
  • Guide to technology and business stakeholders on internal and external audit processes
  • Representing the APAC Technology and Change practices and processes to auditors 
  • Ensuring effective and appropriate risk reporting practices are followed and controls are in place
  • Provide BAU support for information security services required by stakeholders including but not limited to local admin access, USB access, web URL checks, and email quarantine release
  • Participate enthusiastically and effectively in Agile ceremonies with information security, business stakeholders and delivery teams, contributing to planning and resourcing
  • Champion information security and raise awareness about its role, objectives and initiatives


Skills on Resume: 

  • Design Review (Hard Skills)
  • Security Analysis (Hard Skills)
  • Cross-Team Collaboration (Soft Skills)
  • Requirement Definition (Hard Skills)
  • Tech Consulting (Soft Skills)
  • Audit Support (Hard Skills)
  • Risk Reporting (Hard Skills)
  • Security Advocacy (Soft Skills)

30. Information Security Architect, Quantum Harbor Systems, Helena, MT

Job Summary: 

  • Owns security architecture, identifies design gaps and risks, recommends enhancements, and mitigates strategies (immediate, short, and long-term)
  • Ensures alignment between Information Security architecture and the overall IS organization’s (Infrastructure and Applications) strategy and goals
  • Communicates security architecture and technologies for both technical audiences as well as CalOptima’s business partners
  • Diagrams and documents the overarching security landscape, using threat modeling frameworks and methodologies
  • Develops architectural standards that will adhere to compliance requirements, especially the Health Insurance Portability and Accountability Act (HIPAA) and data privacy (California Consumer Privacy Act - CCPA)
  • Document security standards and policies
  • Aligns security projects/programs to the internal InfoSec roadmap
  • Works closely with executives, business managers, audit, and legal counsel to understand corporate requirements related to security and regulatory compliance, and to map those requirements to current data security projects and initiatives
  • Designs, deploys, and measures the effectiveness of proven best practices and controls to protect sensitive data (member, provider, and corporate)
  • Evaluates suspected security breaches and recommends corrective actions (including incidents involving outside vendors or partners)
  • Supports and assists with the review of applications and/or technology environments during the development or acquisition process 
  • Assure compliance with corporate data security policies and directions 
  • Assist in the overall integration process regarding CalOptima’s technology environment
  • Hires, trains, reviews, manages, and sets goals for assigned staff


Skills on Resume: 

  • Security Ownership (Hard Skills)
  • Strategic Alignment (Soft Skills)
  • Architecture Communication (Soft Skills)
  • Threat Modeling (Hard Skills)
  • Compliance Standards (Hard Skills)
  • Policy Documentation (Hard Skills)
  • Stakeholder Collaboration (Soft Skills)
  • Team Leadership (Soft Skills)

31. Information Security Architect, Lighthouse Security Advisors, Montgomery, AL

Job Summary: 

  • Stay current on IT security trends and news
  • Maintain executive reporting and KPI metric data
  • Monitor and enforce active phishing campaigns
  • Support the user community to effectively report phishing-related incidents
  • Investigate security incidents, test and evaluate new technology
  • Gather feedback from end users to continue to improve systems and processes
  • Support team members with research and implementation of security tools and technology
  • Reporting directly to the Chief Information Security Officer
  • Align standards, frameworks and security with the overall business and technology strategy
  • Design security architecture elements in applications and services to mitigate threats
  • Propose solutions that balance business requirements with information security requirements
  • Identify security design gaps and recommend updates or enhancements
  • Provide security consulting for projects
  • Work closely together with IT and business stakeholders to propose and implement solutions that support the “secure digital journey” of the organization


Skills on Resume: 

  • Security Trends (Soft Skills)
  • KPI Reporting (Hard Skills)
  • Phishing Response (Hard Skills)
  • Incident Investigation (Hard Skills)
  • Tool Implementation (Hard Skills)
  • Architecture Design (Hard Skills)
  • Security Consulting (Soft Skills)
  • Stakeholder Engagement (Soft Skills)

32. Information Security Architect, FortressGrid Systems, Shreveport, LA

Job Summary: 

  • Translate complex business and technical requirements into effective and comprehensible solutions
  • Contributes to the development and maintenance of the information security strategy
  • Works closely with enterprise architects, other functional area architects and security specialists
  • Ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements
  • Serves as a security expert in application development (including dev/sec/ops), database design, network and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices
  • Researches, designs, and advocates new technologies, architectures, and security products supporting security requirements for the enterprise and its customers, business partners and vendors
  • Executes projects as a project leader and lead engineer
  • Analyzes business impact and exposure, based on emerging security threats, vulnerabilities and risks
  • Identifies regulatory, governance, and policy gaps and proposes relevant solutions


Skills on Resume: 

  • Solution Design (Hard Skills)
  • Strategy Development (Soft Skills)
  • Team Collaboration (Soft Skills)
  • Risk Mitigation (Hard Skills)
  • Security Expertise (Hard Skills)
  • Tech Research (Hard Skills)
  • Project Leadership (Soft Skills)
  • Regulatory Analysis (Hard Skills)

33. Senior Information Security Architect, Ridgefield Data Services, Trenton, NJ

Job Summary: 

  • Develop, implement, and improve security architecture plans for systems based on several platforms, including traditional client-server, cloud-based, and SaaS
  • Provide expertise in recommending security controls, settings, monitoring, and security improvements for cloud and SaaS based environments
  • Collaborate with the CISO to select and implement security tools and monitoring mechanisms to execute the day-to-day accountabilities of the department
  • Partner with project teams to provide architectural guidance
  • Ensure security is an attribute of all systems, and that security is included in all phases of the system life cycle development
  • Addressing security questionnaires and Requests for Proposals on matters related to cloud-based computing and SaaS environments
  • Briefing customers, the Executive Leadership Team, and the Board of Directors on key elements of cloud and SaaS security architecture and posture
  • Working with the CISO to identify and implement appropriate security controls as identified via standard security controls frameworks such as ISO 27001, NIST, and CIS/SANS
  • Performing analysis of customer and industry-specific compliance requirements and gap analysis of Nuix systems as they relate to such compliance requirements
  • Identify opportunities to deploy security technologies and processes to enhance overall Nuix operations and competitive market position
  • Assist with improving Nuix and Ringtail online documentation
  • Participate in the team training program and stay up-to-date on new applications, technologies, and environments
  • Participate in the team after-hours on-call rotation or weekend coverage based on business needs


Skills on Resume: 

  • Architecture Planning (Hard Skills)
  • Cloud Security (Hard Skills)
  • Tool Implementation (Hard Skills)
  • Lifecycle Security (Hard Skills)
  • Proposal Support (Soft Skills)
  • Executive Briefing (Soft Skills)
  • Compliance Analysis (Hard Skills)
  • Team Training (Soft Skills)

34. Information Security Architect, Lakefront Security Group, Madison, WI

Job Summary: 

  • Implementing, managing, and developing security tools with an emphasis on Splunk
  • Access, implement and optimize complex security-focused deployments of Splunk
  • Support security deployments by unlocking the full Splunk potential to help achieve the cybersecurity strategy
  • Developing and implementing a data leak prevention program
  • Perform audits and vulnerability assessments
  • Develop, perform, and analyze vulnerability assessments and penetration tests using generally accepted tools, and recommend remediations
  • Review and enhance security policies that cover physical and logical access to systems and the management of private data
  • Perform IT risk assessments, incident investigations, root cause analyses, and forensics
  • Partner with internal teams to ensure successful security and compliance programs that align with client and regulatory compliance requirements
  • Assist with the remediation of control deficiencies identified during the audit process
  • Develop technical solutions to help mitigate security vulnerabilities
  • Perform security engineering for complex, multi-platform systems, datacenters, GCP and multi-cloud environments
  • Participate in the Security Incident Response Team (SIRT) activities, helping SIRT to detect, respond, contain, eradicate and recover from security incidents promptly, within the Cloud Operations and Corporate IT environments


Skills on Resume: 

  • Splunk Management (Hard Skills)
  • DLP Program (Hard Skills)
  • Vulnerability Testing (Hard Skills)
  • Policy Enhancement (Hard Skills)
  • Risk Investigation (Hard Skills)
  • Compliance Support (Soft Skills)
  • Security Engineering (Hard Skills)
  • Incident Response (Hard Skills)

35. Information Security Architect, HorizonEdge Security, Wichita, KS

Job Summary: 

  • Provide design and best practices in building a secure DFINITY Infrastructure
  • Execute audit against the distributed system, including CI/CD, staging and production environments (when Production is ready)
  • Develop security tools, e.g., automating key rotations, auto-recovery
  • Creates DFINITY bug bounty program i.e., bugcrowd, hackerone, etc.) 
  • Manage and support 3rd party and internal pen test teams, i.e., (NCC Group, Bishopfox, etc.)
  • Conduct and manage testing and whitehat efforts
  • Engage in hands-on, in-depth analysis, review, and design of the software, including technical review and analysis of source code with a security perspective
  • Reviews of in-house developed code, as well as reviews of technologies provided by third-party vendors
  • Improve system security with vulnerability monitoring and intrusion detection systems
  • Conduct ongoing security analysis of IT architecture and designs, facilitate and perform various security tests and reviews of code, products, services and infrastructure (DFINITY data centers)
  • Guide software development teams through the Security Development Lifecycle (SDL) by participating in design reviews, threat modeling, and in-depth security penetration testing of code and systems
  • Support and manage product security process activities including threat and attack tree modelling, security requirements definition with the research team, and develop cyber test planning and penetration testing
  • Collaborate with engineering/development teams to evolve the SW assurance process to address security risks, identify and eliminate bugs that may have been missed in the review process
  • Use Everything-As-Code methodologies to ensure traceability, configurability, immutability, repeatability, and governability
  • Implement automation for repeatable software assurance tasks
  • Maintain and optimize cyber security test suites, and proactively work to reduce manual SwA activities
  • Identify appropriate hardware and software design changes to deliver cyber-secure systems and assist IT, datacenter, Infra and product teams to quantify residual product cyber risk
  • Identify cyber threats and help IT, datacenter, Infra and product teams design, deliver and deploy secure systems
  • Drive continuous improvement activities to define, measure, visualize and improve key cybersecurity metrics


Skills on Resume: 

  • Infrastructure Security (Hard Skills)
  • Security Auditing (Hard Skills)
  • Tool Development (Hard Skills)
  • Bug Bounty (Hard Skills)
  • Penetration Testing (Hard Skills)
  • Code Review (Hard Skills)
  • SDL Guidance (Hard Skills)
  • Cyber Risk Analysis (Hard Skills)

36. Information Security Architect, SecureTrak Solutions, Sioux Falls, SD

Job Summary: 

  • Reviews and solution architecture, and provide security guidelines, all in a regulated ecosystem
  • Control and manage mitigation plan implementation as part of the above security guidelines
  • Identify, research, explore and lead the evaluation and implementation of new security projects and existing best-of-breed security technologies within the security organization
  • Create strategic solutions within Credorax's corporate and production environments
  • Work closely with the product team to enhance Credorax’s product security
  • Work with IT teams on new innovative infrastructure projects, including VM environments, network infrastructure, storage systems, DB platforms, and cloud environments, and provide security guidance for all related fields and layers respectively
  • Work with R&D teams to enhance application security within Credorax software
  • Assist in establishing and developing the next-gen security monitoring and operations center
  • Providing expertise in compliance programmes for regulatory and compliance frameworks such as PCI DSS/PSD2/27001
  • Creating, reviewing and maintaining security policy, standards and procedures
  • Coordinating internal and external reviews for security frameworks, e.g, PCI-DSS
  • Defining and running security processes
  • Conducting annual reviews on currently on-boarded vendors
  • Reporting security status and events to management


Skills on Resume: 

  • Architecture Review (Hard Skills)
  • Mitigation Planning (Hard Skills)
  • Tech Evaluation (Hard Skills)
  • Product Security (Hard Skills)
  • Infrastructure Guidance (Hard Skills)
  • App Security (Hard Skills)
  • Compliance Expertise (Hard Skills)
  • Vendor Review (Hard Skills)