Cybersecurity Architect

Sioux Falls

Wednesday, 15 April 2026

The Cybersecurity Architect leads and supports the Chief Information Security Officer in maintaining visibility and providing oversight and guidance of technical cybersecurity aspects of projects, products, systems, applications, and services. This position collaborates with the Enterprise Architecture team to understand business goals and objectives and provide leadership to guide technology towards secure configuration and management. Also, this position creates deliverables for managing the security architecture of systems and technology throughout the organization. ESSENTIAL DUTIES AND RESPONSIBILITIES - Leads the development of roadmaps for strategic planning and long-term goals, ensuring technology is designed and implemented according to cybersecurity best practices and sound enterprise architecture principles for all environments, including cloud and on-premises infrastructure. Creates governing cybersecurity architecture standards, including practices for data encryption and tokenization based on the organization's data classification criteria. Collaborates with the management team to develop or recommend updates to cybersecurity standards to be reviewed and approved by executive management and/or formal authorization by the Chief Information Security Officer (CISO). Leads the creation, development, and maintenance of security architecture artifacts (e.g., models, templates, standards, and procedures), leveraging the Enterprise Architecture tool to integrate security capabilities in projects and operations. Identifies needs and leads performance of appropriate security reviews, identifying gaps in security architecture, and developing a security risk management plan for addressing these gaps. Validates IT infrastructure and other reference architectures for security best practices and recommends changes to enhance security and reduce risks. Establishes and builds relationships with the Enterprise Architecture team to develop and maintain a security architecture process that enables the enterprise to develop and implement security solutions and capabilities aligned with business, technology, and threat drivers. Establishes and builds relationships with the IT management and teams to foster a collaborative environment for defining and ensuring systems are built to baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation, identity, and access management (IAM), and cloud deployments. Guides the collaboration and coordination with the data, security, and architecture teams to document data flows of sensitive information (e.g., PII or e. PHI) and recommend controls to ensure adequate security (e.g., encryption and tokenization). Leads the research and coordination with the vendor management (VM) teams’ security assessments of new, prospective, or emerging technologies, especially those with which the organization shares intellectual property (IP) and regulated or protected data. Evaluate statements of work (SO - Ws) and master services agreements (MS - As) to ensure adequate security protections. Liaises with the internal audit (IA) team to review and evaluate the design and operational effectiveness of security-related controls. QUALIFICATIONS -

apply
 
Loading Similar Jobs...
JOBZ is an independent Job Search Engine. JOBZ is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. JOBZ uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, job descriptions and other company descriptions / details are the property of their respective holder. JOBZ does not have its users apply for a job on the J-O-B-Z.com website. Additionally, JOBZ may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.