×
Register Here to Apply for Jobs or Post Jobs. X

Distinguished Technologist, Security Architect

Job in Andover, Essex County, Massachusetts, 05544, USA
Listing for: Hewlett Packard Enterprise
Part Time position
Listed on 2026-01-20
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, Cloud Computing
Job Description & How to Apply Below

Distinguished Technologist, Security Architect

This role has been designed as ‘Hybrid’ with an expectation that you will work on average 2 days per week from an HPE office.

Who We Are:

Hewlett Packard Enterprise is the global edge-to-cloud company advancing the way people live and work. We help companies connect, protect, analyze, and act on their data and applications wherever they live, from edge to cloud, so they can turn insights into outcomes at the speed required to thrive in today’s complex world. Our culture thrives on finding new and better ways to accelerate what’s next.

We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. If you are looking to stretch and grow your career our culture will embrace you. Open up opportunities with HPE.

Job Description:

As a Cloud Native Security Distinguished Technologist, you will provide technical leadership and strategic direction for securing cloud-native platforms, applications, and workloads. You will act as a thought leader and subject matter expert, collaborating with cross-functional teams to architect and implement security solutions that protect our organization and customers. This role requires deep expertise in cloud-native technologies, security best practices, and a passion for driving innovation in the cloud security domain.

Key Responsibilities:

Strategic Leadership
  • Define and drive the cloud-native security strategy for the organization.
  • Influence and guide the adoption of security-first principles across the Cloud Platform Organization and its products.
Architecture and Design
  • Architect secure cloud-native solutions, ensuring compliance with industry standards and regulatory requirements.
  • Design security controls for containerized workloads, microservices, Kubernetes environments, and serverless architectures.
  • Develop and implement strategies for secure CI/CD pipelines and Dev Sec Ops  practices.
Innovation and Thought Leadership
  • Lead research and development of emerging security technologies and practices in cloud-native environments.
  • Represent the organization in industry forums, conferences, and technical communities.
  • Publish white papers, blogs, and other thought leadership content to share insights and influence the broader industry.
Collaboration and Mentorship
  • Partner with engineering teams, product managers, and security specialists to embed security into the development lifecycle.
  • Mentor and guide security engineers, architects, and other technical professionals within the organization.
Risk Management and Incident Response
  • Define risk assessment methodologies tailored to cloud-native environments.
  • Collaborate with security operations teams to respond to security incidents and drive continuous improvement in detection and response capabilities.
Compliance and Governance
  • Lead efforts to ensure cloud-native solutions adhere to regulatory and compliance standards (e.g., GDPR, HIPAA, SOC
    2).
  • Define policies and frameworks for secure cloud-native operations.
Qualifications:
  • Technical Expertise:
    • 15+ years of experience driving cloud security architecture and application security controls for large complex cloud native applications and platforms.
    • Deep knowledge of cloud platforms (e.g., AWS, Azure, GCP) and associated security services.
    • Hands‑on experience in KMS, Secret Manager, WAF, CSPM tools like Wiz, Web application security, AI Security threat modelling and designing security controls for AI agentic systems.
    • Strong knowledge of Network Security (IDS/IPS), Threat modelling, SAST, DAST, SCA, and Pen testing.
    • Expertise in containerization technologies (e.g., Docker, Kubernetes) and orchestration security.
    • Good understanding of OpenID Connect (OIDC) protocol, Security Assertion Markup Language (SAML), and Privileged Access Management (PAM) strategy.
    • Familiarity with serverless computing, APIs, identity and access management (IAM), and zero‑trust architecture principles.
  • Leadership and Influence:
    • Proven track record of driving strategies that influence security practices across large organizations.
    • Experience in mentoring senior technical…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary