Principal Security Architect
Midvale, Utah
Beyond, Inc.
Welcome to Beyond+ | Helping you make the most of your home, from furnishing, financing, protection, and beyondWe Go Beyond:
At Beyond, we believe that everyone should “Be You!”. Beyond is a community that upholds a culture of understanding, acceptance, and respect. We believe a person’s individuality is at the core of diversity, and those traits, beliefs, and characteristics should be valued and embraced. Living by this ethos is essential to the success of our business. Our goal is to foster a more diverse environment where every employee visibly demonstrates inclusive behaviors and respect for individuals.
Alternate or Industry Titles
Security Architect
JOB PROFILE SUMMARY
The Principal Security Architect will work closely with cybersecurity leadership to proactively manage, investigate, and implement comprehensive security measures to protect Beyond’s people, processes, and technology. The Principal Security Architect is a technical leader that also plays a pivotal role in shaping security strategy and driving continuous improvement. This role is integral to the Cybersecurity team and will collaborate with Privacy and Compliance to ensure the organization adheres to all regulatory and security requirements.
JOB DESCRIPTION
Job Scope: Responsible for safeguarding network systems, applications, and services by identifying, mitigating, and remediating security risks. This role includes automating security operations, enhancing tool efficiency, and ensuring seamless integration of security measures across the organization. Staying current with the latest trends in cybersecurity, the architect will research new technologies and provide strategic advice on risk management and operational efficiencies to continually enhance Beyond’s security posture.
ESSENTIAL JOB DUTIES
Research and recommend new security technologies, tools, and products that align with organizational goals.
Mentor and develop security staff, as well as training operational IT and business teams on Beyond’s security practices.
Create and evangelize technical security standards that are shared across cross-functional teams.
Create and maintain detailed architecture documentation, ensuring systems and processes are well-documented for compliance and operational continuity.
Contribute to the development and execution of security infrastructure projects and long-term strategic roadmaps.
Collaborate with cross-functional teams, including cybersecurity, IT operations, and software engineering, to implement and manage security initiatives effectively.
Lead the design and documentation of disaster recovery, business continuity, and incident response plans, ensuring readiness for potential disruptions.
Continuously monitor security feeds and threat intelligence sources to proactively identify, assess, and address vulnerabilities and emerging threats.
Architect and maintain secure environments, working closely with other departments to onboard, sustain, and enhance security operations.
Oversee and coordinate internal and external vulnerability assessments, penetration testing, and remediation efforts.
Provide expert guidance and training to business units on secure practices, identifying areas for improvement and promoting a culture of security awareness.
Perform other duties as required, including leading special projects, as assigned by leadership.
IMPACT
The Principal Security Architect serves as a technical advisor to Beyond’s operations teams, serving as a bridge between cybersecurity and dev functions. The architect leads product Proof of Concepts (POCs) and technical decision-making processes as well as implements strategic initiatives set by cybersecurity leadership. The architect stays current with security threats and industry trends, adapting security architecture and strategies to mitigate new risks.
SKILLS
Experience with the following:
Public Cloud Security: AWS, GCP, Azure, Oracle Cloud
Network Security
Web Application Firewall (WAF)
Security Information and Event Management (SIEM)
Endpoint Detection and Response (EDR)
Digital Forensics and Incident Response (DFIR)
Threat and Vulnerability Management
Penetration Testing and Vulnerability Assessment
Security Architecture and Design
Incident Management
Security Automation
EDUCATION/LICENSING/CERTIFICATION:
Graduation from an accredited institution with a bachelor’s degree in a technical discipline, Information Systems, Computer Science, Computer Engineering or a related field or any combination of education and/or experience.
CERTIFICATIONS (any of the following are acceptable)
SANS/GIAC (GSEC, GCIH, GCIA, etc.)
Public Cloud Security or DevOps certifications
CEH, CHFI, OSCP, CISSP, CISM
Relevant network or coding certifications
PHYSICAL REQUIREMENTS
Must be able to sit and/or stand for long periods at a time.
EQUAL EMPLOYMENT OPPORTUNITY
It is company policy to provide equal employment opportunity for all applicants and associates. This policy includes our commitment to ensure that all employment decisions are made without regard to race, color, religion, gender, national origin, disability, pregnancy, veteran status (including Vietnam era veterans), age, sexual orientation, gender identity, or any other non-job-related characteristic protected by law.
Who We Are:
We’re a passionate group of collaborative problem solvers and creative innovators, working on cutting-edge technology. From building award-winning retail applications (with amazing AR functionality) to creating leading blockchain and machine learning technologies, each of us embodies a unique value and contributes a diverse perspective to the team.
What We Offer:
401k (6% match)
Flexible Schedules
Onsite Health Clinic
Tuition Reimbursement, Leadership Development Program, & Mentorship Program
Onsite Fitness Center
Employee Resource Groups (LatinX, Black Employee Network, LGBTQIA+, Women’s Network, Women In Tech)
And More…
*Benefits vary based on position, tenure, location, and employee election
Physical Requirements:
This position requires you to sit, stand and perform general office functions. You may also be required to lift up to 25 pounds occasionally. Bending, stooping and reaching are also frequently required.
Equal Employment Opportunity:
It is our policy to provide equal employment opportunity for all applicants and associates. This policy includes our commitment to ensure that all employment decisions are made without regard to race, color, religion, gender, national origin, disability, pregnancy, veteran status (including Vietnam era veterans), age, sexual orientation, gender identity, or any other non-job-related characteristic protected by law.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Automation AWS Azure Blockchain CEH CHFI CISM CISSP Cloud Compliance Computer Science DevOps DFIR EDR Firewalls Forensics GCIA GCIH GCP GIAC GSEC Incident response Machine Learning Network security Oracle OSCP Pentesting POCs Privacy Risk management SANS Security strategy SIEM Strategy Threat intelligence Vulnerabilities Vulnerability management
Perks/benefits: 401(k) matching Career development Fitness / gym Flex hours Health care
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.