×
Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity Architect Details | Family of Companies

Job in Overland Park, Johnson County, Kansas, 66213, USA
Listing for: Black & Veatch
Full Time position
Listed on 2026-03-02
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Position: Cybersecurity Architect Job Details | Black & Veatch Family of Companies

Cybersecurity Architect

Date:
Feb 26, 2026

Location:

Cary, NC, US;
Overland Park, KS, US

Company:
Black & Veatch Family of Companies

Together, we own our company, our future, and our shared success.

As an employee‑owned company, our people are Black & Veatch. We put them at the center of everything we do and empower them to grow, explore new possibilities and use their diverse talents and perspectives to solve humanity’s biggest challenges in an ever‑evolving world. With over 100 years of innovation in sustainable infrastructure and our expertise in engineering, procurement, consulting and construction, together we are building a world of difference.

Why

Black and Veatch

Black & Veatch allows you to lend your talent and perspective to humanity’s biggest challenges in a flexible environment where you are empowered to grow and explore new possibilities. We offer competitive compensation; 401K match and benefits that start day one.

At Black & Veatch, you own your career with purpose and meaning. You are empowered to grow and explore new possibilities at every step of your career journey. Bring your big ideas knowing you are safe to be who you are and speak up with concerns or questions and put your diverse talents and perspectives to use.

The Opportunity

The Cybersecurity Architect is a key senior role focused on defining, designing, and maintaining the organization’s enterprise‑wide security architecture to align with business goals, risk strategies, and evolving threats.

Core Responsibilities
  • Develops and maintains a comprehensive security architecture strategy, including plans, roadmaps, processes, and artifacts (e.g., models, standards, templates) that translate business objectives, technology needs, and threat landscapes into actionable, aligned security solutions for cloud, on‑premise, and hybrid environments.
  • Monitors emerging digital business changes and threat developments; updates security strategies, architectures, and reference designs accordingly; validates IT infrastructure, configurations, and tools (e.g., firewalls, IPS, WAF, endpoint protection) against best practices; recommends enhancements to mitigate risks.
  • Collaborates with stakeholders—including enterprise architects, system owners, security engineers, vendors, operational teams, and the CISO—to assess and integrate security controls (system‑specific, hybrid, common); evaluates third‑party SOWs, audit reports, and provider controls; coordinates security for OT/IoT systems; serves as primary liaison for control allocation and assurance.
The Team

Black & Veatch’s Business Enablement consists of critical groups that help enable the organization’s people, projects, and businesses to be as successful as possible. Functions in this group include Digital & Information Technology, Global Finance, Global Human Resources, Legal, Risk Management, and Government Affairs and Real Estate and Building Services.

Key Responsibilities
  • Establishes baseline security configuration standards for operating systems, network segmentation, least‑privilege access, and identity and access management (IAM); reviews and validates network segmentation designs.
  • Defines and maintains standards and procedures for data encryption, tokenization, and protection of sensitive data, aligned with organizational data classification; collaborates with privacy teams to map data flows and recommend appropriate controls.
  • Drafts, documents, and maintains security policies, standards, procedures, and architecture artifacts; submits for executive/CISO review and approval; ensures integration throughout the acquisition lifecycle and system development.
  • Conducts threat modeling for applications, services, and systems based on associated risks and data sensitivity; identifies architecture gaps, performs security reviews, and develops risk management plans to address vulnerabilities.
  • Stays current on emerging security technologies, threats, trends, and best practices; evaluates new tools, services, and vendors; provides recommendations to the security team based on security, cost, and operational considerations.
  • Collaborates with Dev Ops, development, and project teams to promote secure coding…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary