Information Security Architect
San Diego, California, United States - Remote
Applications have closed
EVOTEK™ is North America's premier enabler of digital business with a focus on innovation. With technology offerings in data center and cloud, EVOTEK is uniquely equipped to enable customers with the industry shift from traditional IT computing to secure multi-cloud. With services practices in cybersecurity, mobility, platform engineering and AIOps, EVOTEK is moving up the value chain, closer to the part of digital business that matters most. EVOTEK was named to Inc. Magazine’s “Best Places to Work” in 2018 and 2020. For five consecutive years, from 2016-2020, EVOTEK was listed in The San Diego Business Journal's “Best Places to Work” and recognized in CRN's “Solution Provider 500” list, CRN's “Next-Generation 250” list, CRN’s “Triple Crown” and highlighted as CRN's “Top 150 Growth Companies”, holding the #1 spot in 2017 as the fastest growing system integrator in the country. In 2020, EVOTEK was named to the Inc. 5000 list as one of the fastest growing companies in America.
The Security Architect will perform design, review, provide implementation and testing oversight, and validation of security systems withing client IT infrastructure. This often includes reviewing current security posture (including security solutions, security measures, policies, and standards), identifying areas of weakness, and responding promptly to potential security concerns and breaches of client environments.
Additionally, the Security Architect is expected to advise clients on security subjects, providing guidance on a wide range of security concepts, best practices, and can serve in a security leadership role approving or denying changes to client environments as engagements require.
This individual is expected to stay abreast of current and emerging security concepts, attacks, vulnerabilities, and best-practices.
Additional Responsibilities include:
- Responsible for sharing concerns and guidance with clients and internal team members on these subjects in a timely and effective manner.
- Reviewing and/or designing secure architectural designs for client organizations based on client requirements, security architectural best practices, and operational needs. This work may be performed across on-prem, cloud or hybrid cloud environments in existence or planned.
- Security architects provide the following services for our clients:
- Provide security architecture advisory and guidance.
- Assess project requirements related to security requirements standards and provide architectural recommendations.
- Identify architectural security risks associated with proposed changes/solutions and compensating/mitigating controls where necessary.
- Identify gaps in existing security related capabilities to meet client requirements.
- Assess and/or create low level and high-level architecture designs.
- Assess and/or create reference and solution architectures.
- Facilitate and advise on the collection of business requirements pertaining to security.
- Contribute to strategic planning/road mapping initiatives related to security architecture.
- Review of the current environment, specifically reviewing administrative, technical, and physical controls based on the client’s industry and risk tolerances.
- Work closely with client teams on the selection of security tools and solutions, as well as architecting the implementation of said tools.
- Conduct assessments on tools and environments based on industry best practices and standards.
Requirements
- 10+ years’ experience in Technology and Cybersecurity.
- 5+ years’ experience in security architecture.
- Deep experience in either infrastructure related security or application security as a primary focus.
- Familiarity with security in non-primary area (infrastructure security or application security).
- Experience with one or more security best practice frameworks and controls (e.g., NIST CSF, CIS Controls, HITRUST CSF, etc.).
- Experience with architectural methodologies and frameworks (e.g., SABSA, TOGAF, Zachman) is a plus.
- Ability to operate within a Waterfall, Agile or hybrid solutions delivery/project management model.
- Familiarity with current and evolving security related compliance requirements (e.g., GDPR, CCPA, HIPAA, PCI, etc.).
- Knowledge of DevOps / DevSecOps concepts and frameworks is a plus.
- The ability to interact with a wide range of people from different backgrounds and experience levels.
- Excellent teaching, problem-solving, communication, and interpersonal skills.
- Excellent documentation skills. Including, but not limited to: Architectural High-Level and Low-Level diagrams [HLDs and LLDs], Network diagrams, Data-flow diagrams, Requirement’s artifacts (e.g., non-functional, and technical requirements) and Security Policy and Standards documentation.
Benefits
- Strong company culture.
- Competitive compensation.
- Benefits package that includes 100% paid medical, dental and vision for the employee.
- 401(k) with employer match.
- Flexible PTO policy.
- Flexible working arrangements.
- Annual company overnight retreat (employee + significant other).
Equal Opportunity Employer
EVOTEK believes that everyone has the ability to make an impact, and we are proud to be an equal opportunity employer committed to providing employment opportunity regardless of sex, race, creed, color, gender, religion, marital status, domestic partner status, age, national origin or ancestry, physical or mental disability, medical condition, sexual orientation, pregnancy, military or veteran status, citizenship status, and genetic information.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Agile Application security CCPA Cloud Compliance DevOps DevSecOps GDPR HIPAA HITRUST IT infrastructure NIST Teaching TOGAF Vulnerabilities
Perks/benefits: 401(k) matching Competitive pay Flex hours Flex vacation Health care Startup environment Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Security Operations Engineer jobs
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Product Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Cybersecurity Consultant jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open Senior Security Architect jobs
- Open Security Operations Analyst jobs
- Open Clearance-related jobs
- Open Windows-related jobs
- Open ISO 27001-related jobs
- Open Application security-related jobs
- Open Network security-related jobs
- Open Agile-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open IDS-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open Malware-related jobs
- Open Kubernetes-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open IPS-related jobs