×
Register Here to Apply for Jobs or Post Jobs. X

Infosec Architect-SR

Job in Columbus, Franklin County, Ohio, 43224, USA
Listing for: Metasys Technologies
Full Time position
Listed on 2026-01-16
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant
Job Description & How to Apply Below

Job Details

MAX BILL RATE: ***

LOCATION:

Remote

WORKING HOURS (8-5) EST

Top 3 Must-Haves (Hard and/or Soft Skills)
  • Communication
  • Cyber Controls Expertise
  • Security Architecture and design
  • PCI compliance
  • Audit background
  • IT Engineering
Nice-To-Haves and Degree Requirements
  • CISSP, CRISC, AI certifications
Certification Requirements (Any Preferences)

A security based Certification

Experience

How many years of experience are you looking for?: 10+

Day in the Life

Working with IT partners to understand current and new solutions, how security controls are embedded, and discussing needed improvements to the IT products. Working with team members on process improvements to ensure consistent delivery of security consulting.

Interaction Level

Weekly and potentially daily interactions with team members.

Initial Priorities

Learn our internal systems and standards. Begin shadowing existing team members to understand how processes are executing today. Transitioning to taking the lead on security consulting among IT teams.

Biggest Challenge

Learning the complex environment that is BFH and understanding who they will need to work with across the business in order to get the needed information.

Essential Job Functions
  • Security Architecture Development and Maintenance – Assists the Sr. and Principal Architects with the creation of security designs and frameworks for technology systems. Monitors security intelligence sources for emerging industry security technologies, technology issues, regulatory issues and practices. Provides oversight of new development efforts to ensure adherence to security policies, standards, and reference architectures. Actively participates in decisioning processes related to adoption of new hardware and software technologies.

    Provides advisory services as needed to information security teams. Utilizes planning and organization tools to develop project/action plans. Meets deliverable deadlines as directed.
  • Information Security Strategy – Assists the Principal and Sr. Information Security Architects with the development of the annual Information Security Strategy. This includes strategy development, formalized road map documentation, and continued maintenance.
  • Cyber Security Tooling and Processes – Possess intermediate knowledge of company Cyber Security Tools and affiliated operational processes. Utilizes knowledge when advising to determine residual risk of identified threats or control weaknesses. Champions the use Cyber Security Tooling through education and awareness of constituents.
  • Regulatory Requirements and Control Frameworks – Foundational knowledge of regulatory bodies and corresponding compliance requirements including, but not limited to: PCI-DSS, SOX, GLBA, CCPA, GDPR. Intermediate knowledge of control frameworks including, but not limited to: FFIEC Examination Handbooks, NIST 800-53, ISO 27001. Advanced knowledge of Cyber Security Maturity Frameworks such as NIST-CSF and FFIEC Cyber Assessment Tool.
  • General Information Technology – Intermediate knowledge of IT tools and practices including, but not limited to:
    Networking, LDAP Directories, Vulnerability/Patch Management, Change Management, Incident Management, Server and Desktop Management, Mainframe Technologies, Encryption and Key Management, Cloud Architecture and Computing, Software Application General Computing Controls, Business Continuity/Disaster Recovery, Software Development Lifecycle, Access Management, and Cyber Security Tooling.
  • Human Relations – Ability to diffuse problematic situations and manage through conflict resolution. Utilizes soft skills such as:
    Selective Agreement, Reflective Listening, Voice Inflection, and Empathy. Ability to take complex concepts and break down into laymen’s terms or analogies that help with other’s understanding. Viewed as an enabling partner that provides options or information when saying no to business or IT requests. Seen by leadership and peers as creditable, trustworthy and respectful. Utilizes subject matter expertise to guide and coach less experienced team members.
Management

and

Physical Requirements

Reports to:

Manager or Director of Information Security. Working Conditions/

Physical Requirements:

N…

To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary