We are seeking a high-caliber Cybersecurity Consultant to join our Cybersecurity Engineering Organization.
This role is perfect for a technical "all-rounder" who has transitioned from hands-on development and networking into strategic security architecture. The person will be the bridge between complex compliance requirements (NIST CSF 2.0, ISO 27001) and practical, technical remediation.
Position s Contributions to Work Group:
Perform security Architectural reviews of IT applications to ensure they are resilient by design, focusing on hybrid architecture and large-scale SaaS integrations.
Perform assessment of architectural artifacts (e.g. architecture diagrams) for compliance with security policies, identification of risks and potential areas of improvement
Design and validate secure integration patterns for multiple large-scale SaaS platforms within our hybrid environment.
Leverage your background in IT network support to ensure application traffic flows are secured via proper segmentation and zero-trust principles.
Conduct cybersecurity risk assessments to identify potential vulnerabilities and work with business to implement strategies to mitigate risks.
Utilize tools like ServiceNow and Azure DevOps for workflow automation, ticketing, and project tracking.
Typical task breakdown:
Review and assess architectural artifacts (e.g. architecture diagrams) to follow security polices & controls, identification of risks and potential areas of improvement and documenting the risks/control gaps.
Collaborate with peer Cybersecurity professional in the assessment of IT solution for security posture
Interaction with team:
Working and interacting with global internal business partner.
Education & Experience Required:
Associates degree required in IT or related field, Bachelor's degree preferred.
8+ years of hands-on IT Architect, including 2 3 years in a cybersecurity; if the candidate is a ROCKSTAR and has right under 8 years, go ahead and submit them.
Prior experience/roles include IT Architect, Cloud Architect would be ideal
Cybersecurity Certifications such as CISSP, CCSP, GIAC cert.
Those with P.H.D. s are likely overqualified
Persons with prior roles exclusively in Security & Vulnerability Operations, Incident Response, GRC organizations would not be ideal candidates
Technical Skills Required:
Proven expertise applying industry standards including NIST CSF, ISO 27001, and OWASP principles to enterprise solution designs and security control mapping.
Deep technical understanding of Cloud (Virtual Networks, NSGs, Private Links) and on-premises infrastructure (firewalls, DMZs) to evaluate boundary protection and data flow security
Proficiency in performing Threat and Risk Analysis (TRA) and threat modeling to proactively identify and mitigate application-level risks early in the development lifecycle.
Desired Technical Skills:
Ability to audit system designs against architectural patterns like Zero Trust, Micro-segmentation, and Defense-in-Depth to identify single points of failure or insecure trust boundaries.
Deep understanding of secure identity management, least privilege enforcement, and designing authentication/authorization patterns for connected systems
Knowledge of implementing and reviewing Encryption at Rest (AES-256, Key Vault/HSM management) and Encryption in Transit (TLS 1.2+, mTLS) within complex application architectures.
Skill in analyzing application entry points such as Public IPs, Load Balancers, and Edge Gateways to minimize the attack surface and ensure proper traffic inspection.
Ability to interpret and critique complex network diagrams and data flow maps to pinpoint architectural vulnerabilities.
Prior role as a Network Security Architect/Engineer would be preferred
Skills:
Verbal and written communication skills, problem solving skills, customer service and interpersonal skills.
Expert ability to work independently and manage one s time.
Expert leadership and mentoring skills necessary to provide support and constructive performance feedback.