The Cyber Security Architect is responsible for defining, governing, and safeguarding the enterprise security architecture across on-premises, cloud, and hybrid environments. This role provides architectural authority, strategic guidance, and risk-based recommendations to ensure cybersecurity controls are consistently designed, compliant, and aligned with business objectives, regulatory requirements, and DCI’s operating model.
This is a pure architecture and advisory role focused on design, assessment, governance, and decision support, not operational execution.
Key Responsibilities (In Scope)
Security Architecture & Strategy
· Assess and document the current-state cybersecurity architecture across:
o Identity & Access Management (IAM)
o Privileged Access Management (PAM)
o Endpoint Detection & Response (EDR)
o Security Operations Center (SOC)
o SIEM
o Vulnerability Management
o Governance, Risk & Compliance (GRC)
o Cloud Security
o Network and segmentation controls
· Define, maintain, and evolve the target-state and transition security architecture, aligned with:
o DCI’s operating model
o Regulatory, compliance, and audit requirements o Business and technology strategy
· Act as the single architectural authority for cybersecurity design to ensure controls are implemented consistently, without overlaps or gaps.
Risk Identification & Advisory
· Identify architectural and systemic risks related to:
o Managed Security Service Provider (MSP) tool ownership o Control-plane dependencies o SOC continuity and resilience
· Review security configurations conceptually for:
o Design correctness
o Logical data flows
o Architectural integrity (Excludes day-to-day administration changes.)
· Identify and prioritize high-risk architectural gaps, including but not limited to:
o Privileged access exposure
o Network segmentation gaps
o Endpoint protection weaknesses
o Audit and logging gaps
o Protocol mismatches
o Tiered architecture vulnerabilities
o Hybrid and cloud integration risks
Design Principles & Governance
· Define and maintain enterprise security architecture principles, standards, and reference architectures.
· Ensure Zero Trust and Secure-by-Design principles are implemented incrementally and safely, minimizing business disruption.
· Provide architectural oversight to ensure alignment with risk tolerance and budget constraints.
Leadership & Stakeholder Support
· Support executive and technology leadership with:
o Architecture options and alternatives
o Risk trade-off analysis
o Cost vs. benefit perspectives
o Environmental, operational, and cultural fit considerations
· Coordinate with security vendors and third parties on:
o Architecture alignment
o License usage monitoring
o Compliance and entitlement oversight
Required Skills & Experience (Suggested)
· Strong experience in enterprise security architecture across on-prem, cloud, and hybrid environments.
· Deep understanding of IAM, PAM, SOC, SIEM, EDR, vulnerability management, and cloud security architecture.
· Proven ability to perform risk-based security design and executive advisory.
· Experience working with MSPs and third-party security vendors.
· Strong knowledge of Zero Trust, defense-in-depth, and regulatory compliance frameworks.
· Ability to communicate complex architectural concepts clearly to technical and non-technical stakeholders.
Thanks & Regards
Mohit Saxena
Sr. IT Recruiter
Quantum World Technologies Inc.