About the RoleAs a Security Architect, your role involves designing, reviewing, and enhancing security frameworks, ensuring alignment with business goals for both existing and new security solutions. You'll be accountable for implementing and upholding technical security measures in line with best practices and organizational needs. Effective collaboration with various teams and stakeholders will be essential to safeguard company assets and data. This role demands both active, hands-on participation and forward-thinking strategy to uphold, shape, and develop security architecture while we expand and evolve.Duties and Responsibilities:Conduct Threat Modeling & Architectural Assessments to cover all Information Security domains to ensure Security by DesignAssess technologies and solutions to develop and enrich security capabilitiesIdentify security gaps and communicate associated business risks to relevant stakeholdersCraft solutions that harmonize business needs with security and compliance requirementsVerify the effectiveness of security controls in mitigating identified risksAssist engineering projects across the Software Development Life Cycle (SDLC) and collaborate to prioritize product security elements effectivelyApply expertise in information security and application development to instigate organizational shifts aimed at managing and resolving security weaknesses and vulnerabilitiesContribute to the creation of security policies, standards, and guidelinesDevise and implement frameworks for data classification, retention, and disposal to ensure alignment with data privacy regulationsSpearhead initiatives for data security awareness and trainingQualifications and Skills:10+ years of experience in Information Security with at least 2 years as a Security ArchitectBachelor's Degree in Computer Science or related field, or an additional 3 years of pertinent work involvement preferredStrong knowledge of prevalent security architectures, frameworks, standards and emerging threats along with strategies and technologies for defenseDeep understanding of network protocols, operating systems, databases, applied cryptography, least privilege, zero trust principles, identity & access management, and other core information security conceptsExpertise in cloud computing and its associated best security practices encompassing applications, infrastructure, storage, platforms, and data securityAbility to conduct threat modeling and risk assessmentsCISSP certification, while not required, is highly preferred#LI-Onsite#LI-JS4