×
Register Here to Apply for Jobs or Post Jobs. X

Databricks Enterprise Lead Security Architect - Principal IT Software Engineer

Job in San Francisco, San Francisco County, California, 94199, USA
Listing for: Menlo Ventures
Full Time position
Listed on 2025-11-15
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, Data Security, Cloud Computing
Salary/Wage Range or Industry Benchmark: 258300 - 361575 USD Yearly USD 258300.00 361575.00 YEAR
Job Description & How to Apply Below

GAQ
426R246

We are looking for a highly skilled, technology and business-savvy Lead Security Architect to join our team within Databricks IT. In this dynamic, fast-paced environment, you will be responsible for designing and implementing a secure and scalable architecture to protect our corporate assets. You'll focus on key areas of IT security, including Identity and Access Management, Zero Trust architecture, and endpoint security, while also working to secure critical business applications and sensitive data.

Your expertise will be crucial in building proactive security strategies that align with our business goals and protect the company from an ever-evolving threat landscape.

This position demands deep expertise in security principles and a comprehensive understanding of the entire infrastructure stack and IAM systems to design robust, future-ready security solutions. You will be instrumental in safeguarding our systems’ resilience and integrity against ever-evolving cyber threats.

You will play a critical role in shaping our security strategy for modern platforms across AWS, Azure, GCP, network infrastructure, storage, and SaaS solutions, help establish a strong least privilege (PoLP) model, providing specialized IAM expertise, and securely supporting SaaS with sensitive information (NHI). You will also be a key contributor in building our internal strategy for secure AI development.

Additionally, you will support the secure integration of SaaS platforms such as Google Workspace, collaboration tools, and GTM systems, maintaining alignment with enterprise security standards. Close collaboration with cross-functional teams is essential to embed security throughout the technology stack.

The impact you will have:

What You Will Do:

Design and implement secure, scalable reference architectures for the Databricks IT across Cloud Infra (Compute, DBs, Network, Storage), SaaS, Custom Built Applications, Data & AI systems.

Establish and enforce security controls for:

Core Security Areas:
  • Databricks Workspace Management: Workspace isolation, Unity Catalog for data governance.
  • Secure Networking: VPC configs, Private Link, IP Allow Lists.

Identity and Access Management (IAM): SSO, SCIM user provisioning, RBAC via Un, Strong MFA best practices for enterprise identities and customers

  • Data Encryption: At rest and in transit, customer-managed keys for critical assets.
  • Data Exfiltration Prevention: Admin console settings, VPC endpoint controls.
  • Cluster Security: User isolation, compliance with enhanced security monitoring/Compliance Security Profiles (HIPAA, PCI-DSS, FedRAMP).
  • Offensive Security: Test and challenge the effectiveness of the organization’s security defenses by mimicking the tactics, techniques, and procedures used by actual attackers.
Specialized Security Functions:
  • Non-human Identity Management: Design and implement secure authentication and authorization for automated systems (service accounts, API keys, machine identities), focusing on automation and integration with existing identity management systems.
  • IAM Best Practices: Develop and document comprehensive Identity and Access Management policies, including user provisioning, de-provisioning, access reviews, privileged access management, and multi-factor authentication, ensuring security and compliance.
  • Data Loss Prevention (DLP): Implement DLP solutions to identify, monitor, and protect sensitive data across endpoints, networks, and cloud environments, preventing unauthorized access, use, or transmission.
  • SaaS Proxy Design and Implementation: Design and implement cloud-based proxies for SaaS applications (SASE solutions) to provide secure access, enforce security policies, monitor user activity, and protect against threats.
  • Cloud Infrastructure Best Practices: Establish and document best practices for VPC configurations, cloud networking, and infrastructure as code using Terraform, ensuring secure network segmentation, routing, firewalls, and VPNs for consistent, automated, and secure deployments.
  • Least Privilege Access for Data Security: Design and implement data security controls based on the principle of least privilege, ensuring users and systems have…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary