Skip to content
  Thursday 15 January 2026
Trending
September 12, 2025Apple Alerts French Users of Fourth Spyware Attack in 2025, CERT-FR Validates January 3, 2022The 6 Best Cooling Apps for Android (2022 Free Edition) December 3, 2024ICONICS and Mitsubishi Electric GENESIS64 Products October 1, 2024CISA Releases Two Industrial Control Systems Advisories April 3, 2025Senior Manager of Cybersecurity Detection Engineering March 21, 2023Keysight N6845A Geolocation Server | CISA March 15, 2025Cybersecurity Engineer January 12, 2024Transitioning from Data Leaks to Multi-Extortion: A Shift in Cybersecurity Threats September 17, 2024CISA Adds Four Known Exploited Vulnerabilities to Catalog March 26, 2024CISA Adds One Known Exploited Vulnerability to Catalog
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  Cybersecurity Architect
Careers

Cybersecurity Architect

SecuredyouadmSecuredyouadm—July 18, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

SUPERVISORY IT CYBERSECURITY SPECIALIST (INFOSEC)

December 25, 2025

SUPERVISORY IT CYBERSECURITY SPECIALIST (INFOSEC)

December 26, 2025

IT CYBERSECURITY SPECIALIST (INFOSEC)

October 4, 2024

Cybersecurity Engineering – Leadership

November 1, 2023

Ingersoll Rand is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances.Job Title: Cybersecurity Architect
Location: RemoteAbout Us:
Imagine a company with technology leadership of over 160 years, yet it operates with the energy of a startup. Ingersoll Rand has dedicated itself to Making Life Better for its employees, customers, shareholders, and planets. We produce innovative and mission-critical flow creation and life science technologies – from compressors to precision handling of liquids, gasses, and powers – to increase industrial productivity, efficiency, and sustainability. Supported by over 80+ brands, our products are used in various end-markets including life sciences, food and beverage, clean energy, industrial manufacturing, infrastructure, and more. Across the globe, we’re driving growth with an entrepreneurial spirit and ownership mindset. Learn more at irco.com and join us to own your future.Job Overview:
The security architect reports to the Chief information Security Officer (CISO) and frequently interacts with other business leaders throughout the company. The security architect is responsible for “secure by design” solutions that protect the business and allow the business to innovate and execute. The security architect works closely with many diverse and dynamic teams, including, but not limited to, security engineering, IT infrastructure, application development, security operations, internal audit and end users. This position is also responsible for architecting solutions to secure business-to-business initiatives, third-party relationships, outsourced solutions and vendors.The security architect provides expert guidance for addressing current security issues and has the foresight to see where the industry is headed to proactively deliver optimal secure solutions. The architect is expected to think like an adversary and identify how solutions should evolve as the threat landscape changes. A senior-level role, the architect possesses strong communication and organizational skills, and the ability to guide less experienced coworkers. The architect provides technical leadership to solution and delivery design team members.Responsibilities:

  • Remain current with new security threats and assess systems to ensure they can defend the business.
  • Research, validate and deploy solutions meeting security and business needs.
  • Formally develop security team standards, policies, procedures, and processes.
  • Possess a DevSecOps focus across technology and security architecture, automation, integration, and distribution.
  • Drive security efficiencies, enabling security team members to work on more advanced tasks.
  • Partner, coach and functionally lead IT, engineering, development, and business teams.
  • Perform engineering performance testing to stress the limitations of security solutions while at the same time ensuring business innovation and day-to-day processes are not negatively impacted.
  • Perform other duties as assigned.

Requirements:

  • Bachelors degree in computer science, information assurance, MIS or related field, or equivalent.
  • 8+ experience in cybersecurity, including compliance and risk management with a background in system and network security engineering.
  • A proven deep background (preferred 5+ years in addition to cybersecurity) in technology design, implementation, and delivery.
  • Experience in cloud computing technologies, including software-, infrastructure and platform-as-a-service, as well as public, private and hybrid environments.
  • Extensive knowledge of traditional security controls and technologies, such as Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), public key infrastructure (PKI), identity and access management (IDAM) systems, antivirus, and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controls.
  • Excellence in communicating business risk from cybersecurity issues.
  • Track record of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively.
  • Experience with Amazon Web Services, Microsoft Azure, Google Cloud Platform or Oracle Cloud Infrastructure.
  • Proficient with scripting in Python, JavaScript, PowerShell, PHP or Ruby.
  • Experience with one or more of the following: ISO 27001, NIST, Payment Card Industry Data Security Standard (PCI DSS), Health Information Portability and Accountability Act (HIPAA), Health Information Technology for Economic and Clinical Health (HITECH) Act, Sarbanes-Oxley Act (SOX) the General Data Protection Regulation (GDPR), Center for Internet Security (CIS) standards or Service Organization Controls (SOC) 2.
  • Working knowledge of Windows, Linux, and Unix.
  • Ability to think strategically and tactically, with effective decision-making skills.
  • Experience with purple teaming (red and blue) to train, identify and remediate issues cohesively.
  • Highly trustworthy; leads by example.
  • CISSP, CISM, CEH and/or SANS certification.

Preferences:

  • Experience architecting SIEM systems, threat intelligence platforms, security automation and orchestration solutions, IDS/IPS, file integrity monitoring (FIM), data loss prevention (DLP) and other network and system monitoring tools.

Travel & Work Arrangements/Requirements:
RemotePay Range:
The pay range for this role is $150,000 – $180,000. The pay range considers a wide range of factors that include a candidate’s skills; experience and training; licensure and certifications; and geographic location.What We Offer:
At Ingersoll Rand, we embrace a culture of personal ownership — taking responsibility for our company, our communities, and our environment, as well as our individual health and well-being. Our comprehensive benefits package is designed to empower you with the tools and support necessary to take charge of your health, ensuring that together, we can continue to make life better. Our range of benefits includes health care options like medical and prescription plans, dental and vision coverage, as well as wellness programs. Additionally, we provide life insurance, a robust 401(k) plan, paid time off, and even an employee stock grant, among other offerings. These benefits are our commitment to you, so you can be your best at work and beyond.Ingersoll Rand Inc. (NYSE:IR), driven by an entrepreneurial spirit and ownership mindset, is dedicated to helping make life better for our employees, customers and communities. Customers lean on us for our technology-driven excellence in mission-critical flow creation and industrial solutions across 40+ respected brands where our products and services excel in the most complex and harsh conditions. Our employees develop customers for life through their daily commitment to expertise, productivity and efficiency. For more information, visit www.IRCO.com.To Apply:
Please apply via our website https://ir-jobs.dzconnex.com/ by September 16th in order to be considered for this position.
Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Cybersecurity Ops Technologist, Threat Intelligence
Assessments/Mitigations Control Systems Cybersecurity Consultant_Mid
Related posts
  • Related posts
  • More from author
Careers

Cybersecurity Analyst

January 14, 20260
Careers

Lead Cybersecurity – SOX

January 14, 20260
Careers

Senior Cloud Security Engineer, AVP – BXTI Cybersecurity

January 14, 20260
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Analyst

January 14, 20260
Careers

Lead Cybersecurity – SOX

January 14, 20260
Careers

Senior Cloud Security Engineer, AVP – BXTI Cybersecurity

January 14, 20260
Careers

Sr. Cybersecurity Analyst, Compliance

January 14, 20260
Careers

Cybersecurity Analyst

January 14, 20260
Careers

CYBERSECURITY ANLST SR

January 14, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Analyst
  • Lead Cybersecurity – SOX
  • Senior Cloud Security Engineer, AVP – BXTI Cybersecurity
  • Sr. Cybersecurity Analyst, Compliance
  • Cybersecurity Analyst

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures