Skip to content
  Tuesday 20 January 2026
Trending
January 8, 2026Cybersecurity Sales Account Executive (West Region) November 19, 2024Senior Cybersecurity Analyst May 24, 2025Cybersecurity Engineer (SSB) August 5, 2025Manager Cybersecurity Engineering-Hybrid November 15, 2023#StopRansomware: Rhysida Ransomware | CISA May 14, 2024Cybersecurity Analyst (Hybrid) August 21, 2025Apple Fixes Critical Zero-Day Vulnerability Exploited in Targeted Attacks May 12, 2024Cybersecurity Engineer October 8, 2023Tips for Software Companies to Safeguard their Supply Chain and Prevent Data Breaches February 5, 20227 Ways to Remove How to Get Help Pop-up in Windows 11/10
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  Lead Cybersecurity Integrated Architect
Careers

Lead Cybersecurity Integrated Architect

SecuredyouadmSecuredyouadm—August 1, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

CYBERSECURITY ENGINEER

October 24, 2024

SME Cybersecurity Specialist

July 23, 2024

DevSecOps Cybersecurity Architect

October 5, 2025

Cybersecurity Intern

October 21, 2024

Job DescriptionPrimary Responsibilities

  • Communicate cybersecurity guidelines to engineering teams and business teams and support their adoption of the guidelines.
  • Be integrated with and in continuous contact with engineering teams to advise on their architecture decisions and assist with cybersecurity control implementation.
  • Contribute to the identification and mitigation of cybersecurity risks based on threat modeling of products and enterprise tools.
  • Provides cybersecurity architecture advice and consultation across major program and solution levels.
  • Engage with cybersecurity peers to create a cohesive cybersecurity department and share back internally regarding business specific activities. Act as the on the ground cybersecurity security representative to the product and engineering teams.
  • Partner with enterprise architecture, infrastructure and engineering teams to review existing architecture, identify gaps and recommend security enhancements.
  • Participate in security events and incident response to identify gaps in current design and propose solutions to prevent threats from reoccurring.
  • Educate product and enterprise architects and engineers on cybersecurity best practices and standards.
  • Partner with the legal and security governance, risk and compliance teams to ensure that cybersecurity architecture enables compliance with relevant regulatory and contractual requirements.

Minimum Qualifications

  • Bachelor’s degree in a related discipline and 6 years of experience in a related field. The right candidate could also have a different combination, such as a master’s degree and 4 years of experience; a Ph.D. and 1 year of experience in a related field; or 10 years’ experience in a related field.
  • At least 4 years focused on cybersecurity.
  • Relevant experience with designing, securing, or operating AWS infrastructure and services.
  • Clearly articulate the objective of specific cybersecurity policies and procedures to technical and non-technical stakeholders.
  • Excellent customer service skills, writing, and executive presentation skills.
  • Develop a strong and productive working environment with key stakeholders and collaborate closely with other Cox entities’ cybersecurity teams to implement cybersecurity best practices.
  • Consultative nature to work through controversial or complex topics to employees, leaders, and/or senior leadership.
  • Evaluate risks and recommend actions based on impact and likelihood of the risk to the business.
  • Knowledge of current cybersecurity and technology architectures such as zero trust, IaaS, PaaS, SaaS, virtualization, containerization, DevSecOps, and software-defined networking across a variety of environments and deployments.
  • Creatively solving complex cybersecurity challenges while exhibiting solid, pragmatic business acumen.
  • Experience utilizing Agile methodologies.
  • Initiating change and deploying solutions in Fortune 1000 companies.
  • Knowledge of cybersecurity frameworks (e.g., ISO 27000, NIST, FFIEC) and industry relevant regulations that will guide architectural requirements (e.g., GDPR, FFIEC, GLBA).

Preferred Qualifications

  • Experience in the development and design of cybersecurity standard methodologies to all layers of the hosting and application stack in both cloud and on-premises environments.
  • Knowledge of Identity and Access Management (IAM), cryptography / key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC).
  • Experience with application security implementations and standard methodologies.
  • Extensive technology knowledge and recognized expertise in several areas including Python, .NET, Java, Spring frameworks, Oracle, serverless, cloud patterns, cloud service and user authentication or similar.
  • Experience with firewall, web application firewalls, and other edge services as well as deep understanding of DMZ and other network architectures.
  • AWS Well-Architected Framework.
  • Experience establishing a strategy for and implementing cloud enterprise solutions in AWS, GCP, or Azure.
  • A strong understanding of cloud containers and/or serverless platforms (e.g., EKS, ECS, Lambda, Fargate).
  • Experience in national critical infrastructure industries (telecommunications, financial services, defense, government, etc.).
  • Big four consulting or Fortune 500 company experience.
  • Relevant industry certification (e.g., CISSP, CEH, OSCP, Azure, AWS, CISM, CISA).

USD 119,600.00 – 199,400.00 per yearCompensation:Compensation includes a base salary of $119,600.00 – $199,400.00. The base salary may vary within the anticipated base pay range based on factors such as the ultimate location of the position and the selected candidate’s knowledge, skills, and abilities. Position may be eligible for additional compensation that may include an incentive program.Benefits:The Company offers eligible employees the flexibility to take as much vacation with pay as they deem consistent with their duties, the company’s needs, and its obligations; seven paid holidays throughout the calendar year; and up to 160 hours of paid wellness annually for their own wellness or that of family members. Employees are also eligible for additional paid time off in the form of bereavement leave, time off to vote, jury duty leave, volunteer time off, military leave, and parental leave.Applicants must currently be authorized to work in the United States for any employer without current or future sponsorship.
Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Lead Cybersecurity Integrated Architect
Lead Cybersecurity Integrated Architect
Related posts
  • Related posts
  • More from author
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Careers

Director of Cybersecurity Architecture

January 19, 20260
Careers

Senior Consultant- Cybersecurity

January 19, 20260
Careers

Industrial Cybersecurity

January 19, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Intern
  • Lead Cybersecurity Assessor
  • Cybersecurity Engineer
  • Director of Cybersecurity Architecture
  • Senior Consultant- Cybersecurity

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures