Hiring!! Cybersecurity Architect - Remote - USA (EST/CST)
Remote • Posted 1 hour ago • Updated 1 hour agoDice Job Match Score™
📋 Comparing job requirements...
Job Details
Skills
- cybersecurity
- Threat Analysis
- information security
Summary
Hi,
We are constantly on the lookout for professionals to fulfil the staffing needs of our clients, and we currently have a few job openings that may interest you.
However, if you are not interested at this time, feel free to refer this position to someone you may know to be a fit.
Title: Cybersecurity Senior Architect, Application Threat Modeler
Location: Remote - USA
Duration: Long Term
JD:
Bizz purpose: The business purpose is the sustain and mature the threat modeling program, by conducting threat modeling exercises for applications going through TDLC releases.
Role & Responsibilities:
- The Cybersecurity Sr. Architect conducts threat modeling activities utilizing the Process of Attack Simulation Threat Analysis (PASTA) methodology to create an offensive security perspective for technology delivery teams with the goal of creating visibility and context to threats and vulnerabilities to applications and solutions. Analyze business requirements, while validating security specifications, and assess security solutions that support core organizational functions, and assure their confidentiality, integrity and high availability. Principally works, under limited supervision, with Corporate Information Security (CIS) personnel, Line of Business (LOB) personnel, external vendors, and internal IT Services personnel including Enterprise Architects, Application & Data Services personnel and other IT Operations Services teams. A threat model is an output of an exercise performed on an application or solution to determine weaknesses that could potentially be exploited by a threat actor. It allows for the application teams to pinpoint design and implementation issues that requires remediation or mitigation.
- Threat Modeling & Risk Identification; Conduct structured threat modeling for applications, APIs, and services across the Technology Delivery Lifecycle (TDLC)
Identify potential threats, attack vectors, design flaws, and vulnerabilities that may impact delivery timelines, system security, or regulatory compliance
Assess risks to confidentiality, integrity, availability, and resiliency of business-critical systems. - Integration into TDLC
Embed security-by-design practices into each TDLC phase (requirements, design, build, test, deploy)
Collaborate with delivery teams to ensure security controls and mitigations are defined early and consistently implemented
Track and validate mitigation strategies throughout delivery cycles to ensure secure releases. - Risk Communication & Reporting
Document threat models, risk scenarios, and security design considerations in clear, actionable reports.
Deliver tailored risk communication to technical teams, product owners, and executive stakeholders
Provide risk ratings and recommendations to support informed go/no-go release decisions. - Collaboration & Influence
Partner with architects, engineers, product managers, and delivery leads to balance security and business objectives.
Act as a subject matter expert on secure application design, emerging attack vectors, and industry frameworks (e.g., STRIDE, PASTA, OWASP).
Mentor TDLC team members on threat modeling practices and proactive risk identification. - Continuous Improvement
Refine threat modeling processes, frameworks, and automation for scalability across delivery portfolios.
Incorporate real-world threat intelligence, incident data, and vulnerability management findings into TDLC risk assessments.
Contribute to the creation of reusable playbooks, secure design patterns, and threat libraries for enterprise-wide adoption.
Required Skills/ Experience:
- 8+ years of demonstrated experience of systems engineering and/or architecture in at least one of the information security areas: network security, access management, end point protection, data loss prevention, vulnerability management, application security, forensics, web security, mainframe, incident response and/or cyber threat management in a medium to large corporation.
- Highly experienced in network security architecture, including design tools, methods, and techniques and the application of Defense-in-Depth principles; knowledge of network design processes, including understanding of security objectives.
- Specialized depth and thorough Knowledge of The Open Group Architecture Framework (TOGAF), including infrastructure, data, information security, applications, architectural concepts, and associated disciplines
- Deep knowledge of:
- Mainframe security, including access control, monitoring, integration with non-mainframe technologies, and virtualization;
- Authentication and authorization technologies including remote access;
- Application security and the security development lifecycle and ability to apply to client-server and web-based application development environments;
- Enterprise databases and database security, including database activity monitoring and database access control technologies;
- Encryption methods and technologies for data-in-transit and data-at-rest scenarios;
- Incident response processes;
- Denial of Service prevention mechanisms;
- Firewall technologies and intrusion prevention methods;
- Cloud technologies and hosting;
- Operating system hardening;
- Virtualization technologies;
- Mobile technologies;
- Encryption and key management technologies;
- Endpoint Protection (includes malware);
- Data Loss Protection technologies
5. Experience with peripheral component interconnect and other security audit processes, evidence gathering and development/management of remediation plans used in resolution of finding
Nice to have Skills/ Experience:
- Degree in a related field from an accredited program or equivalent experience.
- Industry certifications in cyber security and forensics, such as CISSP, CFCE, GCFE, GCFA, GCIH and other related credentials preferred.
- Industry certifications in general technology (MCP, MCSE, Network+, etc).
- Industry certifications in networking, such as CCNA, CWNA, and cloud security (AWS, Azure,and Google Cloud Platform)
--------
Thanks.
Regards,
Ashish
Email ID:
- Dice Id: 91170994
- Position Id: 2026-465
- Posted 1 hour ago
Similar Jobs
It looks like there aren't any Similar Jobs for this job yet.
Search all similar jobs