{"id":382,"date":"2025-08-22T07:31:28","date_gmt":"2025-08-22T07:31:28","guid":{"rendered":"https:\/\/mitrhr.com\/current-openings\/?p=382"},"modified":"2025-08-22T07:31:58","modified_gmt":"2025-08-22T07:31:58","slug":"cyber-security-solution-architect","status":"publish","type":"post","link":"https:\/\/mitrhr.com\/current-openings\/2025\/08\/22\/cyber-security-solution-architect\/","title":{"rendered":"Cyber Security \u2013 Solution Architect"},"content":{"rendered":"<body>\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">To apply: Share your resumes on rashmita.r@mitrhr.com and gifta.d@mitrhr.com<\/mark><\/strong><\/p>\n\n\n\n<p><br>\ud83d\udd52 <strong>Experience:<\/strong> 3\u20135+ Years in Cyber Security Architecture<br>\ud83c\udf93 <strong>Qualification:<\/strong> Degree in Computer Science, Engineering, or related field<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Role Overview<\/strong><\/h4>\n\n\n\n<p>We are seeking a skilled <strong>Cyber Security Solution Architect<\/strong> to design, implement, and lead enterprise-level security solutions. This role involves shaping the security strategy, building solution architectures, and driving technical execution across multiple technologies and business domains.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Key Responsibilities<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Develop and implement <strong>security architecture and strategy<\/strong> aligned with business objectives.<\/li>\n\n\n\n<li>Architect and oversee <strong>enterprise-wide security solutions<\/strong> (Cloud, IAM, Network, Endpoint, Data).<\/li>\n\n\n\n<li>Act as a <strong>technical expert &amp; security liaison<\/strong> with stakeholders and leadership.<\/li>\n\n\n\n<li>Support RFI\/RFP processes and propose <strong>optimal security solutions<\/strong> for customers.<\/li>\n\n\n\n<li>Lead and resolve <strong>security design challenges<\/strong> across projects.<\/li>\n\n\n\n<li>Provide <strong>coaching, training, and professional development<\/strong> to teams and clients.<\/li>\n\n\n\n<li>Stay updated on <strong>emerging threats, security technologies, and industry best practices<\/strong>.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Core Technical Expertise (Must-Have)<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Next-Generation Firewalls<\/strong> \u2013 Fortinet \/ Palo Alto \/ Check Point<\/li>\n\n\n\n<li><strong>Web Proxy \/ Secure Web Gateway (SWG)<\/strong> \u2013 Zscaler \/ Palo Alto \/ Netskope<\/li>\n\n\n\n<li><strong>Data Loss Prevention (DLP)<\/strong> \u2013 Forcepoint \/ Zscaler \/ Trellix<\/li>\n\n\n\n<li><strong>Email Security<\/strong> \u2013 Mimecast \/ Proofpoint \/ Cisco IronPort \/ Check Point<\/li>\n\n\n\n<li><strong>Web Application Firewall (WAF)<\/strong> \u2013 F5 \/ Cloudflare \/ Imperva<\/li>\n\n\n\n<li><strong>Zero Trust Network Access (ZTNA)<\/strong> \u2013 Zscaler \/ Palo Alto \/ Netskope<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Preferred Skills (Good-to-Have)<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Endpoint Security<\/strong> \u2013 SentinelOne \/ CrowdStrike \/ Palo Alto<\/li>\n\n\n\n<li><strong>IAM &amp; PAM<\/strong> \u2013 Okta, Duo, Ping Identity, BeyondTrust, CyberArk<\/li>\n\n\n\n<li><strong>SIEM \/ SOAR<\/strong> \u2013 Splunk \/ FortiSIEM \/ IBM QRadar<\/li>\n\n\n\n<li><strong>CNAPP<\/strong> \u2013 Palo Alto \/ Wiz \/ Check Point<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Qualifications &amp; Certifications<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Bachelor\u2019s degree in <strong>Computer Science \/ Engineering \/ related field<\/strong><\/li>\n\n\n\n<li><strong>3\u20135 years<\/strong> of hands-on experience in security architecture and solutions<\/li>\n\n\n\n<li>Security certifications preferred: <strong>CISSP, CISM, CISA, CEH, GIAC, CERT<\/strong><\/li>\n\n\n\n<li>Strong communication, leadership, and stakeholder management skills<\/li>\n\n\n\n<li>Proven track record of managing <strong>enterprise-wide security programs<\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<p>\ud83d\ude80 If you are passionate about <strong>cyber defense, enterprise security, and next-gen technologies<\/strong>, this is your opportunity to lead impactful security initiatives!<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n<\/body>","protected":false},"excerpt":{"rendered":"<p>To apply: Share your resumes on rashmita.r@mitrhr.com and gifta.d@mitrhr.com \ud83d\udd52 Experience: 3\u20135+ Years in Cyber Security Architecture\ud83c\udf93 Qualification: Degree in Computer Science, Engineering, or related field Role Overview We are&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[109],"class_list":["post-382","post","type-post","status-publish","format-standard","hentry","category-jobs","tag-cybersecurityjobs-solutionarchitect-securityarchitecture-infosec-cloudsecurity-iam-ztna-dlp-siem-waf-dataprotection-networksecurity-applicationsecuritymitrhrjobs"],"_links":{"self":[{"href":"https:\/\/mitrhr.com\/current-openings\/wp-json\/wp\/v2\/posts\/382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mitrhr.com\/current-openings\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mitrhr.com\/current-openings\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mitrhr.com\/current-openings\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mitrhr.com\/current-openings\/wp-json\/wp\/v2\/comments?post=382"}],"version-history":[{"count":1,"href":"https:\/\/mitrhr.com\/current-openings\/wp-json\/wp\/v2\/posts\/382\/revisions"}],"predecessor-version":[{"id":383,"href":"https:\/\/mitrhr.com\/current-openings\/wp-json\/wp\/v2\/posts\/382\/revisions\/383"}],"wp:attachment":[{"href":"https:\/\/mitrhr.com\/current-openings\/wp-json\/wp\/v2\/media?parent=382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mitrhr.com\/current-openings\/wp-json\/wp\/v2\/categories?post=382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mitrhr.com\/current-openings\/wp-json\/wp\/v2\/tags?post=382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}