Cybersecurity Architect
Dyersburg, TN, United States
ERMCO-ECI
ABOUT US OUR MISSION OUR VISION OUR VALUES OUR HISTORY PRODUCTS DISTRIBUTION TRANSFORMERS TRANSFORMER COMPONENTS CAREERS OUR TEAM OUR LEADERSHIP CONTACT US Discover Transformers and Components Built to Keep Your Community Powered. Ensure that...Overview
Job Summary
The Cybersecurity Architect plays a critical role in defining and implementing the organization’s cybersecurity strategy, architecture, and processes. This role ensures that security solutions align with business objectives, risk management strategies, and industry best practices, providing a robust cybersecurity framework across all environments, including on-premises and cloud infrastructure.
Responsibilities
Security Strategy & Architecture
- Develop and maintain a security architecture framework that integrates business, technology, and threat considerations.
- Design cybersecurity strategies and roadmaps based on enterprise architecture best practices.
- Establish and document cybersecurity configurations, standards, and procedures for systems, networks, and identity and access management (IAM).
- Define and implement security best practices for data encryption and network segmentation.
- Evaluate and document security requirements throughout the system development lifecycle.
- Conduct security assessments and risk management reviews to identify vulnerabilities and recommend mitigation strategies.
Security Assurance & Compliance
- Continuously monitor the cybersecurity landscape and recommend security enhancements.
- Validate IT infrastructure, security configurations, and security controls to ensure adherence to security best practices.
- Support security risk assessments, threat modeling, and penetration testing initiatives.
- Work closely with internal audit teams to evaluate the effectiveness of security controls.
- Ensure compliance with regulatory standards such as ISO 27001 and NIST CSF.
Collaboration & Stakeholder Engagement
- Act as a liaison between cybersecurity, IT, and business teams to align security strategies with business objectives.
- Collaborate with vendor management teams to assess third-party security risks.
- Engage with facility and operations teams to evaluate security risks in operational technology (OT) and Internet of Things (IoT) systems.
- Assist in business continuity planning and incident response strategies.
Qualifications
Education & Certifications
- Bachelor’s in Computer Science, Information Systems, Cybersecurity, or a related field.
- Certifications: CISSP Certification Required, (CISM, CISA, or GIAC nice to have).
- Experience with security architecture frameworks such as Zachman, or TOGAF nice to have.
Technical Expertise
- Extensive experience in security infrastructure, including firewalls, IPS, WAF, SIEM, endpoint protection, and log management.
- Strong knowledge of cloud security (AWS, Azure, GCP) and hybrid environments.
- Hands-on experience with vulnerability management and threat modeling.
- Expertise in IAM solutions such as Active Directory, LDAP, AWS IAM, Okta, or Azure AD.
- Familiarity with IT service management (ITIL), including change, configuration, asset, and incident management.
Business & Analytical Skills
- Ability to translate complex security issues into business-friendly language.
- Experience in security budgeting, cost analysis, and ROI assessments for security investments.
- Strong project management skills for security initiatives and technology deployments.
Key Competencies
- Strategic Thinking: Ability to assess evolving threats and align security initiatives with business objectives.
- Problem-Solving: Strong analytical skills to assess security risks and propose effective solutions.
- Communication & Leadership: Ability to engage with technical and non-technical stakeholders and provide security guidance.
- Adaptability: Ability to thrive in a fast-paced environment with evolving cybersecurity challenges.
- Continuous Learning: Commitment to staying current with cybersecurity trends, technologies, and best practices.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory AWS Azure CISA CISM CISSP Cloud Compliance Computer Science Encryption Firewalls GCP GIAC IAM Incident response Internet of Things IoT IPS ISO 27001 ITIL IT infrastructure LDAP NIST Okta Pentesting Risk assessment Risk management Security assessment Security strategy SIEM Strategy TOGAF Vendor management Vulnerabilities Vulnerability management
Perks/benefits: Career development
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.