Role:- Cyber Security Architect
Location:- Houston TX
Duration:- 6 Months Contract
Job Description:-
The Cyber Security Architect is responsible for defining governing and safeguarding the enterprise security architecture across on-premises cloud and hybrid environments. This role provides architectural authority strategic guidance and risk-based recommendations to ensure cybersecurity controls are consistently designed compliant and aligned with business objectives regulatory requirements and DCIs operating model.
This is a pure architecture and advisory role focused on design assessment governance and decision support not operational execution.
Key Responsibilities (In Scope)
Security Architecture & Strategy
- Assess and document the current-state cybersecurity architecture across:
- Identity & Access Management (IAM)
- Privileged Access Management (PAM)
- Endpoint Detection & Response (EDR)
- Security Operations Center (SOC)
- SIEM
- Vulnerability Management
- Governance Risk & Compliance (GRC)
- Cloud Security
- Network and segmentation controls
- Define maintain and evolve the target-state and transition security architecture aligned with:
- DCIs operating model
- Regulatory compliance and audit requirements o Business and technology strategy
- Act as the single architectural authority for cybersecurity design to ensure controls are implemented consistently without overlaps or gaps.
Risk Identification & Advisory
- Identify architectural and systemic risks related to:
- Managed Security Service Provider (MSP) tool ownership o Control-plane dependencies o SOC continuity and resilience
- Review security configurations conceptually for:
- Design correctness
- Logical data flows
- Architectural integrity (Excludes day-to-day administration changes.)
- Identify and prioritize high-risk architectural gaps including but not limited to:
- Privileged access exposure
- Network segmentation gaps
- Endpoint protection weaknesses
- Audit and logging gaps
- Protocol mismatches
- Tiered architecture vulnerabilities
- Hybrid and cloud integration risks
Design Principles & Governance
- Define and maintain enterprise security architecture principles standards and reference architectures.
- Ensure Zero Trust and Secure-by-Design principles are implemented incrementally and safely minimizing business disruption.
- Provide architectural oversight to ensure alignment with risk tolerance and budget constraints.
Leadership & Stakeholder Support
- Support executive and technology leadership with:
- Architecture options and alternatives
- Risk trade-off analysis
- Cost vs. benefit perspectives
- Environmental operational and cultural fit considerations
- Coordinate with security vendors and third parties on:
- Architecture alignment
- License usage monitoring
- Compliance and entitlement oversight
Required Skills & Experience (Suggested)
- Strong experience in enterprise security architecture across on-prem cloud and hybrid environments.
- Deep understanding of IAM PAM SOC SIEM EDR vulnerability management and cloud security architecture.
- Proven ability to perform risk-based security design and executive advisory.
- Experience working with MSPs and third-party security vendors.
- Strong knowledge of Zero Trust defense-in-depth and regulatory compliance frameworks.
- Ability to communicate complex architectural concepts clearly to technical and non-technical stakeholders.
Thanks & Regards
Chandra Shekhar Kumar ( Talent Acquisition Lead)
Eniac Systems Inc.
Email:
Phone: 1
Role:- Cyber Security Architect Location:- Houston TX Duration:- 6 Months Contract Job Description:- The Cyber Security Architect is responsible for defining governing and safeguarding the enterprise security architecture across on-premises cloud and hybrid environments. This role provides archit...
Role:- Cyber Security Architect
Location:- Houston TX
Duration:- 6 Months Contract
Job Description:-
The Cyber Security Architect is responsible for defining governing and safeguarding the enterprise security architecture across on-premises cloud and hybrid environments. This role provides architectural authority strategic guidance and risk-based recommendations to ensure cybersecurity controls are consistently designed compliant and aligned with business objectives regulatory requirements and DCIs operating model.
This is a pure architecture and advisory role focused on design assessment governance and decision support not operational execution.
Key Responsibilities (In Scope)
Security Architecture & Strategy
- Assess and document the current-state cybersecurity architecture across:
- Identity & Access Management (IAM)
- Privileged Access Management (PAM)
- Endpoint Detection & Response (EDR)
- Security Operations Center (SOC)
- SIEM
- Vulnerability Management
- Governance Risk & Compliance (GRC)
- Cloud Security
- Network and segmentation controls
- Define maintain and evolve the target-state and transition security architecture aligned with:
- DCIs operating model
- Regulatory compliance and audit requirements o Business and technology strategy
- Act as the single architectural authority for cybersecurity design to ensure controls are implemented consistently without overlaps or gaps.
Risk Identification & Advisory
- Identify architectural and systemic risks related to:
- Managed Security Service Provider (MSP) tool ownership o Control-plane dependencies o SOC continuity and resilience
- Review security configurations conceptually for:
- Design correctness
- Logical data flows
- Architectural integrity (Excludes day-to-day administration changes.)
- Identify and prioritize high-risk architectural gaps including but not limited to:
- Privileged access exposure
- Network segmentation gaps
- Endpoint protection weaknesses
- Audit and logging gaps
- Protocol mismatches
- Tiered architecture vulnerabilities
- Hybrid and cloud integration risks
Design Principles & Governance
- Define and maintain enterprise security architecture principles standards and reference architectures.
- Ensure Zero Trust and Secure-by-Design principles are implemented incrementally and safely minimizing business disruption.
- Provide architectural oversight to ensure alignment with risk tolerance and budget constraints.
Leadership & Stakeholder Support
- Support executive and technology leadership with:
- Architecture options and alternatives
- Risk trade-off analysis
- Cost vs. benefit perspectives
- Environmental operational and cultural fit considerations
- Coordinate with security vendors and third parties on:
- Architecture alignment
- License usage monitoring
- Compliance and entitlement oversight
Required Skills & Experience (Suggested)
- Strong experience in enterprise security architecture across on-prem cloud and hybrid environments.
- Deep understanding of IAM PAM SOC SIEM EDR vulnerability management and cloud security architecture.
- Proven ability to perform risk-based security design and executive advisory.
- Experience working with MSPs and third-party security vendors.
- Strong knowledge of Zero Trust defense-in-depth and regulatory compliance frameworks.
- Ability to communicate complex architectural concepts clearly to technical and non-technical stakeholders.
Thanks & Regards
Chandra Shekhar Kumar ( Talent Acquisition Lead)
Eniac Systems Inc.
Email:
Phone: 1
View more
View less