×
Register Here to Apply for Jobs or Post Jobs. X

Information Security Architect

Job in Columbus, Franklin County, Ohio, 43224, USA
Listing for: HireTalent - Staffing & Recruiting Firm
Full Time position
Listed on 2026-01-15
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant, Information Security, Systems Engineer
Job Description & How to Apply Below

Talent Discovery Specialist @ Hire Talent | Expert in Technical Recruiting

This role serves as a key security consulting partner to IT and engineering teams, ensuring security controls are effectively designed, embedded, and maintained across technology solutions. The position focuses on security architecture, cloud security strategy, regulatory alignment, and continuous process improvement within a complex enterprise environment.

Day in the Life
  • Partner with IT and engineering teams to understand current and emerging technology solutions and how security controls are implemented
  • Evaluate security design gaps and recommend improvements aligned with enterprise缩 standards
  • Collaborate with peers to refine and standardize security consulting processes
  • Provide ongoing security guidance throughout the technology lifecycle
Key Interactions
  • Regular collaboration with internal team members
  • Weekly, and at times daily, interaction with cross‑functional IT partners and leadership
Initial Priorities (First 90 Days)
  • Gain a working understanding of internal systems, tools, and security standards
  • Shadow senior team members to learn current‑state processes and engagement models
  • Progressively assume ownership of security consulting efforts across IT initiatives
Anticipated Challenges
  • Navigating a large, complex enterprise environment
  • Building an effective network of stakeholders to obtain timely and accurate information
Essential Job Functions Security Architecture & Advisory
  • Support Senior and Principal Architects in developing and maintaining security architectures, designs, and frameworks
  • Ensure new and existing technologies align with security policies, standards, and reference architectures
  • Monitor industry trends, emerging threats, and regulatory developments
  • Participate in technology adoption decisions related to hardware and software
  • Provide advisory support to information security and IT teams
Information Security Strategy
  • Contribute to the development and maintenance of the annual Information Security Strategy
  • Support roadmap creation, documentation, and ongoing updates
Cyber Security Tooling & Processes
  • Apply intermediate knowledge of enterprise cyber security tools and operational processes
  • Assess residual risk related to threats or control gaps
  • Promote effective use of security tools through education and awareness initiatives
Regulatory & Control Frameworks
  • Demonstrate foundational knowledge of regulatory requirements (PCI‑DSS, SOX, GLBA, CCPA, GDPR)
  • Apply intermediate knowledge of control frameworks such as FFIEC, NIST 800‑53, and ISO 27001
  • Leverage advanced understanding of cyber security tokens frameworks (NIST‑CSF, FFIEC CAT)
  • Maintain intermediate knowledge across core IT domains, including:
  • Networking and directory services (LDAP)
  • Vulnerability, patch, incident, and change management
  • Server, desktop, and mainframe technologies
  • Encryption and key management
  • Cloud computing and architecture configuring Worst.
  • Application security and SDLC
  • Access management and business continuity/disaster recovery
  • Act as a trusted, credible partner to business and IT stakeholders
  • Translate complex security miti into clear, actionable guidance
  • chl
  • Manage verjaardag effectively and de‑scalate challenging situations
  • Coach and guide less experienced team members
  • Provide pragmatic options when security constraints limit b business requests
Reporting Structure
  • Reports to:

    Manager or Director of Information Security
  • Direct Reports:
    None
Working Conditions
  • Standard office environment note
  • Participation in an on‑call rotation, including evenings or weekends, may be required based on business needs
Minimum Qualifications
  • High School Diploma or equivalent experience
  • 5–8 years of experience in information security қирғ, security architecture, or a related role
  • seller user 3+ years of hands‑ on experience with Amazon Web Services (AWS) and Microsoft Azure
  • Experience architecting solutions across multi‑ cloud and/or hybrid environments
  • Proven ability to define and communicate strategic cyber security technology direction
  • Strong experience analyzing cyber risks and designing security solutions
  • Deep understanding of cloud services and distributed system architectures
  • Experience…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary