Cyber Security Architect
Wakefern Food Corp. - jersey city, NJ
Apply NowJob Description
SummaryThe Security Architect main role is to design, implement, and oversee our cybersecurity strategy, ensuring robust protection against evolving threats. The ideal candidate will have 7-10 years of experience in cybersecurity architecture, security operations, and risk management with a strong focus on enterprise security solutions, cloud security, identity & access management (IAM), and security best practices. The Security Architect must have hands-on experience with internet secure gateway, EDR, MDR, ITDR, secure email gateway, firewalls, MFA, scripting, policies, data classification, and cloud security controls. This role requires deep expertise in security frameworks, architecture principles, security automation, and compliance standards (NIST, CIS, ISO 27001, Zero Trust, etc.).Essential Functions Develop and maintain a comprehensive security architecture covering on-premises, cloud, and hybrid environments.Design security solutions that align with business objectives while mitigating risk.Ensure Zero Trust principles, network segmentation, and security best practices are enforced across the enterprise.Architect cloud security strategies, leveraging best practices for Azure and GCP.Lead security investigations, conduct root cause analysis, and document incident response actions.Provide threat intelligence and recommend proactive security measures to mitigate risk.Implement and maintain cloud security controls in Azure and GCP.Optimize cloud security solutions for web and network protection.Ensure Active Directory (AD) and IAM policies align with best practices.Support identity governance, access reviews, and privileged access management (PAM).Oversee the continuous best practice is leveraged for data classification policies and enforce data protection controls.Conduct security assessments and ensure compliance with industry standards (PCI, NIST, CIS).Recommend, evaluate, and implement new security technologies based on business needs and threat landscape.• Work with DevOps and IT teams to integrate security automation, security-as-code, and DevSecOps principles.Additional Functions Threat Modeling & Risk Management:Conduct threat modeling, risk assessments, and security reviews for applications, infrastructure, and networks.Provide technical leadership in responding to security incidents, forensic analysis, and root cause investigations.Develop and maintain security policies, standards, and playbooks for security operations.Collaborate with IT and business units to ensure security compliance with regulatory frameworks (PCI DSS, NIST, ISO 27001, SOC 2).Identity & Access Management (IAM) & Authentication:Design and enhance IAM policies, privileged access management (PAM), and role-based access control (RBAC).Enforce strong authentication and MFA strategies using Okta, Microsoft Authenticator, and AD.Define identity threat detection and response (ITDR) strategies.Security Governance & Compliance:Ensure security controls align with industry frameworks (NIST CSF, ISO 27001, CIS, Zero Trust, MITRE ATT&CK).Assist with audit, regulatory compliance, and security assessments.Conduct penetration testing, redblue teaming exercises, and vulnerability management programs.Provide security guidance for third-party risk management and vendor security evaluations.Leadership & Collaboration:Act as a subject matter expert (SME) in cybersecurity architecture and best practices.Provide mentorship and training to security engineers and analysts.Work cross-functionally with IT, DevOps, and executive leadership to align security strategy with business goals.Develop security roadmaps and strategic initiatives for continuous security improvement.Maintain and fine-tune security configurations across various security platforms.Identify security gaps and recommend security enhancements and process improvements.Develop playbooks and automation scripts to enhance security operations efficiency.Conduct vulnerability assessments and penetration testing to identify security weaknesses in systems and applications.Develop and implement security policies, procedures, and standards to ensure compliance with industry's best practices and regulatory vestigate security breaches and other security incidents to determine the root cause and implement corrective actions.Stay up-to-date on the latest security threats and vulnerabilities and recommend appropriate security measures.Collaborate with other IT teams to ensure that security is integrated into all aspects of the organization's IT infrastructure.Participate in security audits and assessments to identify and address security gaps.Develop and maintain incident response plans and procedures.Evaluate and recommend security technologies and solutions to improve the organization's security posture.Qualifications 7-10 years of experience in cybersecurity architecture, security operations, or cloud security.Deep understanding of:Enterprise security architectures, security frameworks (NIST, CIS, Zero Trust, ISO 27001), and best practicesEmail secure gateway (Proofpoint, Mimecast) Firewalls (Palo Alto, Cisco) and network security principlesCloud security (Azure, GCP) and security automationIAM, MFA, AD, Okta, Microsoft AuthenticatorEndpoint security, EDR, ITDR, and threat intelligenceData classification, DLP, and information protectionExperience designing secure architectures for large-scale enterprises and cloud environments.Strong knowledge of DevSecOps, security automation, and scripting (Python, PowerShell, Terraform).Excellent communication and leadership skills, capable of influencing security strategies across the organization.CISSP Certifications (Required): CISM and CCSP is plus A bachelor's degree in computer science, information systems, or a related experience.7-10 years of experience in cybersecurity, security operations, or network security.Hands-on expertise with:Zscaler, CrowdStrike, Microsoft Defender, SophosProofpoint (Email Security Gateway)EDR & ITDR solutionsPalo Alto & Cisco FirewallsOkta, Microsoft Authenticator (MFA), Active Directory (AD), IAMCloud Security (Azure and GCP)Data classification and protection strategiesStrong knowledge of threat intelligence, SIEM, vulnerability management, and incident response.Experience with security frameworks such as PCI, NIST, ISO 27001, CIS Benchmarks.Strong analytical, problem-solving, and communication skills.Ability to work independently and collaboratively in a fast-paced environment.Excellent communication and interpersonal skills, capable of collaborating effectively with cross-functional teams. Working Conditions & Physical Demands This position requires in person office presence at least 4x a week.
Created: 2025-02-22