Network Security Architect

Naperville Processing Center

Apply now Apply later

About Northern Trust:

Northern Trust, a Fortune 500 company, is a globally recognized, award-winning financial institution that has been in continuous operation since 1889.

Northern Trust is proud to provide innovative financial services and guidance to the world’s most successful individuals, families, and institutions by remaining true to our enduring principles of service, expertise, and integrity. With more than 130 years of financial experience and over 22,000 partners, we serve the world’s most sophisticated clients using leading technology and exceptional service.

Major Duties :1. Works with management and the architecture team develop the security strategy and plan and ensures objectives are met.
2. Provides leadership and guidance to staff, fostering an environment that encourages employee participation, teamwork, and communication.
3. Contributes to the Security Incident Response team and communicates incidents to senior management in Information Technology and Corporate Risk Management
4. Specialist on the Vulnerability Management program
5. Interfaces frequently with information security industry groups to stay abreast of emerging security trends
6. Seasoned multi-disciplinary expert with extensive technical and / or business knowledge and functional expertise
7. Focus of role is on execution of strategic direction of business function activities
8. Carries out complex initiatives involving multiple disciplines and/or ambiguous issues
9. Displays a balanced, cross-functional perspective, liaising with the business to improve efficiency, effectiveness and productivity
10. Helps establish overall enterprise information security architecture (EISA) by aligning business processes, IT software and hardware, local and wide area networks, people, operations, and projects with the organization¿s overall security strategy
11. Evaluates proposals to determine if proposed security solutions effectively address enterprise requirements, as detailed in solicitation documents
12. Identifies alternative functional security strategies to address organizational IT security concerns
13. Interprets and/or approves security requirements relative to the capabilities of new information technologies
14. Leads and aligns IT security priorities with the organization¿s mission and vision
15. Manages the monitoring of external threat intelligence data sources to maintain enterprise situational awareness
16. Assists in monitoring and evaluating the effectiveness of the enterprise's information security safeguards to ensure they provide the intended level of protection
17. Helps provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to appropriate senior management

Requirements/Responsibilities-

  • In-depth knowledge of various cybersecurity frameworks, standards, and SSDLC
  • Hands on experience working with IPS/IDS, Network load balancer, next generation firewalls, Z-Scaler, and networking technologies
  • Experience in securing the cloud networking and hybrid configurations
  • Experience working with teams that handle infrastructure components including Storage systems, database technologies, directory services, and virtualization
  • Experience working with Microsoft Azure, AWS, hybrid, and multi-cloud systems
  • Knowledge of network architecture concepts including topology, protocols, and components
  • Experience working with  tools related to Privilege access management, Threat hunting, data protection, encryption, Authentication/Authorization, Vulnerability management systems, Cloud Security Posture Management.
  • Knowledge related to WAF, App Proxy, and CDN
  • Knowledge of network traffic analysis methods
  • In-depth understanding related to SEIM and strong experience related to Microsoft Defender, Entra, KQL, APIM, endpoint protection, scripting, CoPilot
  • Ability to establish security patterns related to cloud/ hybrid architecture and work with various tech teams to assist with the implementation as needed
  • Very good understanding of zero-trust architecture and working experience with relevant tools/technologies
  • Knowledge related AI/ML, DevSecOps, CI/CD Pipeline, IaC, and relevant tools
  • Very good understanding of concepts related to docker, container, serverless computing, and Kubernetes
  • Must be able to represent the team in technical discussions and drive towards deliverables with minimal guidance


Experience :A College or University degree and/or relevant proven work experience in the area of Information Security is required. Industry certification such as CISSP, CISM, CISA, GIAC is preferred.

Working with Us:

As a Northern Trust partner, greater achievements await. You will be part of a flexible and collaborative work culture in an organization where financial strength and stability is an asset that emboldens us to explore new ideas.

Movement within the organization is encouraged, senior leaders are accessible, and you can take pride in working for a company committed to assisting the communities we serve! Join a workplace with a greater purpose.

We’d love to learn more about how your interests and experience could be a fit with one of the world’s most admired and sustainable companies! Build your career with us and apply today. #MadeForGreater

Reasonable accommodation

Northern Trust is committed to working with and providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation for any part of the employment process, please email our HR Service Center at MyHRHelp@ntrs.com.

We hope you’re excited about the role and the opportunity to work with us. We value an inclusive workplace and understand flexibility means different things to different people.

Apply today and talk to us about your flexible working requirements and together we can achieve greater.

Apply now Apply later
  • Share this job via
  • 𝕏
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0

Tags: AWS Azure CDN CI/CD CISA CISM CISSP Cloud CSPM DevSecOps Docker Encryption Firewalls GIAC IDS Incident response IPS Kubernetes Monitoring Network security Risk management Scripting Security strategy SSDLC Strategy Threat intelligence Vulnerability management

Perks/benefits: Flex hours

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.