×
Register Here to Apply for Jobs or Post Jobs. X

Security Architect

Job in Great Falls, Cascade County, Montana, 59404, USA
Listing for: Member Driven Technologies
Full Time position
Listed on 2025-12-02
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer
Job Description & How to Apply Below

This position is eligible for a hybrid work arrangement. Currently 5 days of on-site work per month are required.

Position Purpose

The role of the Security Architect at MDT is to ensure that security requirements necessary to protect MDT’s mission, vision and business processes are adequately addressed. The Security Architect is responsible for designing and implementing comprehensive security solutions and strategies. This role serves as a key security and technical advisor and strategist, partnering with technology, development, and business teams to ensure secure-by-design solutions across the organization’s technology landscape.

Duties & Responsibilities
  • Design and implement security controls for cloud, on-premises, and hybrid environments (e.g., AWS, Azure, GCP).
  • Monitor and review cloud service provider security policies to help ensure compliance with organizational requirements.
  • Partner with Enterprise Architects and Development teams to ensure security best practices and principles are embedded in their workflows.
  • Conduct security assessments and risk analysis to identify vulnerabilities and propose mitigation strategies within the Zero Trust framework.
  • Design and implement Zero Trust principles and frameworks to enhance the security posture of our systems and networks.
  • Design and maintain robust CI/CD pipelines with integrated security checks to “shift security left,” ensuring vulnerabilities are identified early in the development process.
  • Collaborate with cross-functional teams to define access policies, user authentication mechanisms, and secure connectivity across various environments.
  • Design and collaborate with cross-functional teams to deploy secure SSO solutions with identity providers (IdPs), directory services, and third-party applications for seamless and centralized authentication and authorization across multiple applications and systems.
  • Collaborate with stakeholders to understand business requirements and translate them into effective security controls and solutions.
  • Make recommendations to reduce risks.
  • Supports administration of the enterprise security infrastructure including, but not limited to, the systems supporting: network security monitoring, two-factor authentication, web application firewalls, vulnerability management, endpoint detection and response, data loss prevention, and enterprise logging.
  • Supports incident response processes.
  • Compiles metrics for leadership.
  • Assists in installing, implementing, and maintaining security software.
  • Maintains the availability, patching, and operational functionality of assigned security systems.
  • Evaluates new security tools, products, and solutions for applicability to security needs.
  • Makes recommendations regarding purchase of security products.
  • Ensures MDT’s reputation is maintained internally and externally.
  • Ensures appropriate levels of security and confidentiality are always maintained.
  • Acts as a representative of MDT with business and professional organizations and external IT contacts.
  • Keeps management informed of area activities and any significant concerns.
  • Attends and participates in meetings as required.
  • Completes accurate tickets, reports, records, and other documentation as necessary.
  • Stay up to date with industry trends, emerging technologies, and security best practices to proactively identify potential threats and vulnerabilities.
  • Responsible for working with the security team and other departments to ensure work is flowing effectively and timely throughout the organization.
  • Assists in setting department and company standard practices and procedures.
  • Responsible for working with company vendors to ensure the delivery of products or services is successful.
  • Acts as a subject matter expert for co-workers and fosters a culture of continuous learning and cross-training.
  • Assigned to the on-call rotation to support security operations.
  • Stays informed of trends and changes in the information security field.
  • Completes special projects and research studies as required.
  • Keeps work area clean, secure, and well maintained
Education & Experience Requirements
  • Bachelor’s degree in Computer Science or a related field, or an equivalent combination of…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary