Cyber Security Architect - SR
Taylor, TX
Full Time Senior-level / Expert USD 122K - 207K
At ERCOT, our diverse and dynamic work environment provides a platform on which employees can work together to build the future of the Texas power grid and wholesale market utilizing the latest technologies and resources. We encourage you to join our talented, dedicated workforce to develop world-class solutions for today and tomorrow’s energy challenges while learning new skills and growing your career.
ERCOT is committed to fostering diversity and inclusion at all levels of our company. It is the cornerstone of our corporate values of accountability, leadership, innovation, trust, and expertise. We accept and celebrate those that join us and recognize that individuals with a wide variety of talents, ideas, and experiences propel the innovation that drives our success. A diverse and inclusive workforce strengthens us and allows for a collaborative environment to solve the challenges that face our industry today and in the future.
ERCOT offers the flexibility to work both in and out of the office within the state of Texas, providing our employees with an enhanced work life balance.
JOB SUMMARY
Develops and executes architecture strategy and support strategic system development initiatives. Provides design recommendations. Develops enterprise level applications and custom integration solutions including major enhancements, interfaces, functions and features.
JOB DUTIES
- Understands and applies principles, theories and concepts related to the profession and ERCOT's culture.
- Exercises judgment within defined procedures and practices to determine appropriate action.
- Impact is generally limited to specific assignments or projects.
- May respond to inquiries and/or provide assistance and/or guidance to lower level workers.
- Represents the Critical Infrastructure Security Department (CISD) by providing expert technical and architecture consulting on security requirements
- Analyzes complex systems architecture (application, network, system, and database, process) to identify design gaps and recommend security enhancements
- Understands current as well as emerging security threats and design security architecture to mitigate threats where possible
- Works with project stakeholders to identify appropriate security requirements, engineer practical security solutions and implement measurable security guidelines
- Works with project managers and stakeholders to develop practical, effective implementation plans with measurable project milestones for all security solutions
- Reviews current security policy and standards to ensure technical security requirements, guidelines and best practices are communicated and put into practice for each assigned project
- Supports stakeholders across the organization as a technical expert on information security architecture Ensures the design of business solutions meets security mandates.
- Analyzes complex projects to identify potential vulnerabilities, security control points, and risk mitigation measures to ensure compliance with Security Policy, Standards and technical security requirements Securely achieves the functional requirements of business initiatives.
- Consults on projects to provide security expertise on how to implement best security practices for application, database and system technologies
Knowledge of:
- Intranet, Extranet, Internet, eCommerce, EDI links with parties within and outside of the organization; Local and wide area networks, Internet connectivity diagrams
- Applications and software inventories and diagrams
- access authentication methods
- computer algorithms
- cryptology
- database systems
- embedded systems
- encryption algorithms (e.g., IPSEC, AES, GRE, IKE, MD5, SHA, 3DES)
- fault tolerance
- system components are installed, integrated, and optimized
- traffic flows across the network (e.g., Transmission Control Protocol (TCP) and Internet Protocol (IP), Open System Interconnection Model (OSI), Information Technology Infrastructure Library, v3 (ITIL)
- Interfaces between applications - that is: events, messages and data flows
- Data classifications, Databases and supporting data models
- Hardware, platforms, hosting: servers, network components and security devices and where they are kept
- Local and wide area networks, Internet connectivity diagrams
- Develops the ERCOT Cyber security Architecture Strategy
- Serves as the information security subject matter expert, providing advisory and consulting service and functioning as a high-level security consultant to all projects and provide security expertise on how to implement best security practices for application, database and system technologies
- Partners with stakeholders across the organization to securely achieve the functional requirements of business initiatives as the technical expert on information security architecture
- Works on the most complex issues where analysis of situations requires an in-depth evaluation of variable factors. Has the ability to resolve complex issues in creative and effective ways
- Maintains knowledge of emerging trends and industry best practices
- Leads projects or provides guidance to and coordinates activities of other workers
- Experience designing and implementing security solutions
- Demonstrated superior knowledge of security principles and technologies
EXPERIENCE REQUIRED
Senior Security Architect requirements:
- Requires minimum 5 years related work experience in excess of degree requirements
Security Architect Level 2 requirements:
- Requires minimum 2 years related work experience in excess of degree requirements
EDUCATION
- Bachelor's Degree : Computer Science, MIS or related field (Required)
- Master's Degree : Computer Science, MIS or related field (Preferred)
- or a combination of education and experience that provides equivalent knowledge to a major in such fields is required
Certifications (all levels)
- CISSP, CISA, ISSAP, SANS GIAC or other security certifications (preferred)
The foregoing description reflects the minimum qualifications and the essential functions of the position that must be performed proficiently with or without reasonable accommodation for individuals with disabilities. It is not an exhaustive list of the duties expected to be performed, and management may, at its discretion, revise or require that other or different tasks be performed as assigned. This job description is not intended to create a contract of employment with ERCOT. Both ERCOT and the employee may exercise their employment-at-will rights at any time.
Expected Salary Range:
$122,262 - $207,828Are you an ERCOT Employee? If so please log in to Workday to apply.
Tags: AES CISA CISSP Compliance Computer Science E-commerce Ecommerce Encryption GIAC ITIL SANS Strategy Vulnerabilities
Perks/benefits: Career development Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Systems Security Officer (ISSO) jobs
- Open Principal Security Engineer jobs
- Open Information Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Cyber Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Staff Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open Senior Information Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Senior Penetration Tester jobs
- Open IT Security Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Security Specialist jobs
- Open Senior Information Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Engineer jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open Security Operations Analyst jobs
- Open Cybersecurity Specialist jobs
- Open Windows-related jobs
- Open CISM-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open ISO 27001-related jobs
- Open Agile-related jobs
- Open Application security-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open IAM-related jobs
- Open Analytics-related jobs
- Open CISA-related jobs
- Open Threat intelligence-related jobs
- Open SaaS-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Malware-related jobs
- Open Forensics-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open CEH-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs