Senior Cybersecurity Architect
Plano, Collin County, Texas, 75086, USA
Listed on 2026-02-23
-
IT/Tech
Cybersecurity, Systems Engineer, IT Consultant, Cloud Computing
Plano, TX (Hybrid / Onsite as required)
Remote work may be permitted based on project and client security requirements.
Full-Time (40 hours/week)
Wage Range$145,000 – $175,000 per year
Salary commensurate with experience, education, and job responsibilities.
The Senior Cybersecurity Architect is responsible for designing, implementing, and governing enterprise-scale cybersecurity architectures across cloud, on-premises, and hybrid environments. The role requires advanced expertise in Zero Trust security, identity and access management, cloud and network security, Dev Sec Ops , vulnerability management, and regulatory compliance. The position translates complex security, risk, and compliance requirements into scalable technical architectures aligned with business objectives.
KeyJob Duties
The Senior Cybersecurity Architect will perform the following duties, each requiring specialized knowledge typically obtained through at least a bachelor’s degree in a related field:
- Design and govern enterprise cybersecurity architectures spanning cloud (AWS, Azure), on-premises, and hybrid environments, integrating network, identity, endpoint, and application security controls.
- Architect and implement Zero Trust security models, including identity-centric access controls, conditional access, device trust validation, and least-privilege enforcement.
- Lead Identity and Access Management (IAM) architecture using Azure Entra , AWS IAM, SailPoint, and Cyber Ark, including RBAC design, access lifecycle automation, and privileged access management.
- Define and enforce enterprise security architecture standards aligned with regulatory and compliance frameworks such as NIST 800-series, ISO 27001, SOC 2, PCI-DSS, HIPAA, and GDPR.
- Architect and oversee vulnerability and threat exposure management programs by integrating cloud, application, and infrastructure security tools to enable risk-based remediation.
- Design and govern Dev Sec Ops security controls by embedding SAST, SCA, DAST, container security, and secrets management into CI/CD pipelines.
- Architect and manage SIEM and security monitoring platforms (e.g., Splunk, Microsoft Sentinel, QRadar) to enable centralized detection, investigation, and response.
- Design and implement security automation and orchestration workflows using APIs and ITSM platforms to improve response efficiency and reduce manual effort.
- Lead proof-of-concept evaluations of emerging security technologies and provide architectural recommendations based on enterprise scalability and effectiveness.
- Collaborate with infrastructure, cloud, application, Dev Ops, GRC, and business stakeholders to align security architecture with organizational objectives.
- Bachelor’s degree or higher in Computer Science, Information Technology, Cybersecurity, Information Systems, Engineering, or a closely related field.
• A Master’s degree is preferred and may substitute for additional experience.
- Minimum 8–10 years of progressive experience in cybersecurity, network security, or enterprise IT architecture.
• Demonstrated experience designing and implementing enterprise security architectures, IAM, Zero Trust, cloud security, and vulnerability management.
- Enterprise security architecture and design
• Zero Trust frameworks and identity-centric security
• Identity & Access Management (IAM), RBAC, PAM
• Cloud security architecture (AWS, Azure)
• Network security (firewalls, segmentation, IDS/IPS)
• Vulnerability management and threat modeling
• Dev Sec Ops and application security
• SIEM, SOC operations, and security monitoring
• Regulatory and compliance frameworks (NIST, ISO, PCI, SOC 2, HIPAA)
- Certified Information Security Manager (CISM)
- Certified Cloud Security Professional (CCSP)
- AWS Certified Solutions Architect
- Certified Ethical Hacker (CEH)
- Cisco CCNA / CCNP (Security preferred)
E-Verify Quantitix participates in the federal government’s E-Verify program. The E-Verify process is completed in conjunction with the Form I-9 Employment Eligibility Verification on or before the first day of work. E-Verify is not used as a tool to pre-screen candidates. For up-to-date information on E-Verify, go to (Use the "Apply for this Job" box below). and click on 'E-Verify', located near the bottom of the page.
#J-18808-Ljbffr(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).