Information Security Architect IV (Contractor)
Apidel Technologies
Virtual, PA
Job Description:
Develops and implements enterprise information security architectures and solutions.
Serves as a security expert in application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices. Researches, designs, and advocates new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors.
Contributes to the development and maintenance of information security strategy and architecture.
Evaluates and develops secure solutions based on approved security architectures.
Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks.
Works with Enterprise Architects and other functional area architects and security specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements.
Communicates security risks and solutions to business partners and IT staff as needed.
Bachelors or Masters Degree in Computer Science, Information Systems, or other related field. Or equivalent work experience.
Typically has 10%2B years of combined IT and security work experience with a broad exposure to infrastructure/network and multi-platform environments.
Requires expert knowledge of security issues, techniques and implications across all existing computer platforms.
Prefers onsite in Philadelphia (CTC) but can consider anyone virtual but needs to work EST hours; prefers those in EST or CST
Security team threat monitoring for all applications and systems
Architect is assigned 2 workshops each week, they have to research and collect data on the applications. Do the workshop (takes about 3 hours) and then prepare reporting on the Threat Modeling background in threat modeling - hands on experience any new applications being built in goes through security assessments= this is not a Pen tester role but they are open to those with that background this is a threat security role - any methodology is ok since has their own custom framework familiar with AI security - has worked in that space or looking forward to learning about that security.
Anyone who has programmed before is helpful
CISSB certifications good to have but not required min 5 years exp with security architecture attitude willing to learn and strong communications; someone personable and cordial length of assignment - long term role
Interview process - 2 rounds tools used - they use an in-house tool for the architects to do the assessments this teams assess tools and applications all across - with a diverse toolset to include Cloud and AI can come from a non-telecom background
Scope of Work: This role is critical in helping our organization proactively identify, assess, and mitigate security threats across applications, systems, and infrastructure. You will lead structured threat modeling exercises, collaborate with cross-functional teams, and drive the integration of security into design and development processes.
This role is critical in helping our organization proactively identify, assess, and mitigate security threats across applications, systems, and infrastructure. You will lead structured threat modeling exercises, collaborate with cross-functional teams, and drive the integration of security into design and development processes.
Specific Project Stage/System Being Supported: Cybersecurity / Risk Management
Key Deliverables:
Lead and facilitate threat modeling sessions across diverse technology stacks and business domains.
Define scope, identify assets, and document potential threats and vulnerabilities.
Analyze threat impact and likelihood to prioritize mitigation strategies.
Collaborate with engineering, architecture, and product teams to embed security into system design.
Evaluate existing security controls and identify gaps or weaknesses.
Develop and maintain threat model documentation, including architecture diagrams, findings, and action items.
Continuously monitor and update threat models to reflect evolving threat landscapes.
Promote a security-conscious culture through awareness and training.