Cybersecurity Architect || Houston TX (Onsite)

0 views
Skip to first unread message

Mohit

unread,
3:39 PM (6 hours ago) 3:39 PM
to recruiter...@googlegroups.com, acrux-active-c...@googlegroups.com, swar...@googlegroups.com, c2c-daily-req...@googlegroups.com, magric...@googlegroups.com, c2c-daily-req...@googlegroups.com, c2crequir...@googlegroups.com, c2cgrou...@googlegroups.com, mydailyreq...@googlegroups.com, allurgentru...@googlegroups.com, c2c-3-daily-c2...@googlegroups.com, krishv...@googlegroups.com, shaik...@googlegroups.com, c2chotlist-requ...@googlegroups.com, it-requirem...@googlegroups.com, c2c-hot...@googlegroups.com, rajeshk...@googlegroups.com, hotlist-...@googlegroups.com
Role -  Cybersecurity Architect
Location - Houston TX (Onsite)

JD:

The Cyber Security Architect is responsible for defining, governing, and safeguarding the enterprise security architecture across on-premises, cloud, and hybrid environments. This role provides architectural authority, strategic guidance, and risk-based recommendations to ensure cybersecurity controls are consistently designed, compliant, and aligned with business objectives, regulatory requirements, and DCI’s operating model.

 

This is a pure architecture and advisory role focused on design, assessment, governance, and decision support, not operational execution.

 

 

Key Responsibilities (In Scope)

 

Security Architecture & Strategy

 

· Assess and document the current-state cybersecurity architecture across:

 

o Identity & Access Management (IAM)

o Privileged Access Management (PAM)

o Endpoint Detection & Response (EDR)

o Security Operations Center (SOC)

o SIEM

o Vulnerability Management

o Governance, Risk & Compliance (GRC)

o Cloud Security

o Network and segmentation controls

 

· Define, maintain, and evolve the target-state and transition security architecture, aligned with:

 

o DCI’s operating model

o Regulatory, compliance, and audit requirements o Business and technology strategy

 

· Act as the single architectural authority for cybersecurity design to ensure controls are implemented consistently, without overlaps or gaps.

 

 

Risk Identification & Advisory

 

· Identify architectural and systemic risks related to:

o Managed Security Service Provider (MSP) tool ownership o Control-plane dependencies o SOC continuity and resilience

 

· Review security configurations conceptually for:

o Design correctness

o Logical data flows

o Architectural integrity (Excludes day-to-day administration changes.)

 

· Identify and prioritize high-risk architectural gaps, including but not limited to:

o Privileged access exposure

o Network segmentation gaps

o Endpoint protection weaknesses

o Audit and logging gaps

o Protocol mismatches

o Tiered architecture vulnerabilities

o Hybrid and cloud integration risks

 

Design Principles & Governance

 

· Define and maintain enterprise security architecture principles, standards, and reference architectures.

· Ensure Zero Trust and Secure-by-Design principles are implemented incrementally and safely, minimizing business disruption.

· Provide architectural oversight to ensure alignment with risk tolerance and budget constraints.

 

 

Leadership & Stakeholder Support

 

· Support executive and technology leadership with:

o Architecture options and alternatives

o Risk trade-off analysis

o Cost vs. benefit perspectives

o Environmental, operational, and cultural fit considerations

 

· Coordinate with security vendors and third parties on:

o Architecture alignment

o License usage monitoring

o Compliance and entitlement oversight

 

 

Required Skills & Experience (Suggested)

 

· Strong experience in enterprise security architecture across on-prem, cloud, and hybrid environments.

· Deep understanding of IAM, PAM, SOC, SIEM, EDR, vulnerability management, and cloud security architecture.

· Proven ability to perform risk-based security design and executive advisory.

· Experience working with MSPs and third-party security vendors.

· Strong knowledge of Zero Trust, defense-in-depth, and regulatory compliance frameworks.

· Ability to communicate complex architectural concepts clearly to technical and non-technical stakeholders.

 



Thanks & Regards

Mohit Saxena

Sr. IT Recruiter

Quantum World Technologies Inc.

moh...@quantumworldit.com

Reply all
Reply to author
Forward
0 new messages