Information Security Architect
Kennesaw, Georgia, United States
LendingPoint
JOB SUMMARY: Responsible for planning, designing, implementing, and maintaining the organization's information security architecture. Work closely with various stakeholders across the organization to understand security needs and develop solutions that meet both security and business objectives.
ESSENTIAL JOB FUNCTIONS:
- Develop and maintain comprehensive security architecture frameworks that align with business objectives and regulatory requirements. Design secure solutions for networks, systems, applications, and data storage environments.
- Conduct thorough risk assessments to identify potential vulnerabilities and threats. Develop strategies to mitigate risks effectively while balancing business needs and security requirements.
- Research and evaluate new security technologies, tools, and methodologies to enhance the organization's security posture. Make recommendations for the adoption or integration of security solutions based on thorough assessments of their effectiveness and alignment with organizational needs.
- Develop incident response plans and procedures to effectively address security incidents, breaches, or vulnerabilities. Lead incident response efforts to contain, investigate, and remediate security incidents promptly.
- Collaborate with IT operations, development, and other teams to ensure security is integrated throughout the entire IT lifecycle.
- Stay up-to-date on the latest security threats and vulnerabilities and recommend appropriate security controls.
- Respond to security incidents and participate in incident response activities, including investigation, containment, eradication, and recovery.
- Document security architecture design decisions, procedures, and security processes for future reference and knowledge transfer.
MINIMUM QUALIFICATIONS: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the minimum knowledge, skill, and/or ability required.
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field (Master's degree preferred).
- Minimum 5+ years of experience in information security architecture or a related role.
- Strong understanding of security principles, frameworks, methodologies, and industry best practices.
- Proven experience with security technologies, including firewalls, IDS/IPS, data encryption, and IAM solutions.
- Proven ability to document technical concepts in a clear, concise, and professional manner.
- Ability to work independently and as part of a team.
COMPETENCIES:
- Customer Service: Exceptional attitude and a passion for providing outstanding service to internal customers.
- Attention to Detail: Thoroughness in accomplishing a task through concern for all the areas involved, no matter how small. Monitors and checks work or information and plans and organizes time and resources efficiently
- Analytical Skills: Collects and researches data; Designs workflows and procedures; Identifies data relationships and dependencies.
- Communications: Exhibits good listening and comprehension. Expresses ideas and thoughts in verbal and written form. Keeps others adequately informed. Selects and uses appropriate communication methods.
- Managing People: Develops subordinates’ skills and encourages growth; provides direction and guidance; reacts well under pressure; motivates others to perform well and exhibits confidence in self and others.
- Problem Solving: Ability to solve issues efficiently and quickly.
- Relationship Management: Manages interactions to service and support to the organization; establishes credibility with all interactions.
- Teamwork: Contributes to building a positive team spirit. Exhibits objectivity and openness to others' views.
SUPERVISORY RESPONSIBILITY
None
PHYSICAL DEMANDS
While performing the duties of this job, the employee is regularly required to stand, walk, reach and sit for a minimum of 8 hours with or without reasonable accommodation. The employee is required to use hands to finger, handle, or feel objects and/or tools. The employee is required to talk or hear with or without reasonable accommodation and must sometimes lift and move up to 10 pounds.
WORK ENVIRONMENT
While performing the logistics duties of this job, the employee is frequently exposed to moderate noises such as computers, printers, and other light traffic noise in an office setting.
This role is in-office. Remote work may be performed from a pre-approved location, as arranged, and scheduled by team management and approved by department leadership.
OTHER DUTIES
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change or be supplemented at any time with or without notice.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Computer Science Encryption Firewalls IAM IDS Incident response IPS Risk assessment Vulnerabilities
Perks/benefits: Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Penetration Tester jobs
- Open Cloud Security Architect jobs
- Open Security Operations Engineer jobs
- Open Principal Security Engineer jobs
- Open Information Security Officer jobs
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Senior Product Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Chief Information Security Officer jobs
- Open IT Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Security Specialist jobs
- Open Senior Network Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Cybersecurity Consultant jobs
- Open Security Consultant jobs
- Open IT Security Analyst jobs
- Open Senior Information Security Analyst jobs
- Open Security Operations Analyst jobs
- Open Manager Pentest H/F jobs
- Open Information Security Architect jobs
- Open Information System Security Officer jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open SOC-related jobs
- Open Analytics-related jobs
- Open CISA-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open GCP-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Threat intelligence-related jobs
- Open DoD-related jobs
- Open Vulnerability management-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open CEH-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open SaaS-related jobs
- Open Malware-related jobs
- Open Kubernetes-related jobs
- Open Java-related jobs
- Open TS/SCI-related jobs
- Open EDR-related jobs