Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Cybersecurity Architect  (Threat Intelligence and Security Integration) image - Rise Careers
Job details

Cybersecurity Architect (Threat Intelligence and Security Integration)

At phia we hire talented and passionate people who are focused on collaborative, meaningful work, providing technical and operational subject matter expertise and support services to our partners and clients.


phia is seeking a Cybersecurity Architect who will focus on integrating Threat Intelligence Platforms (TIPs) with other security and operation tools. Ideal candidates will have a passion for protecting large enterprises from cyber threats. This is a remote position, to be performed within the United States. U.S. citizenship and the ability to obtain a Public Trust are required. 




What You'll Do
  • Assist with intgration of Analyst1 and other Threat Intelligence Platforms (TIPs) with other security and operation tools such as ServiceNow, Armis, Sentinel One, SIEM, EDR, IDS/IPS, and other network security tools to enhance threat detection and response capabilities.
  • Validate data is received by Analyst1 from multiple tools including but not limited to ServiceNow, Armis,  and Sentinel One. 
  • Utilize automation opportunities to streamline threat intelligence workflows and improve incident response times.
  • Ensure seamless integration with existing security infrastructure, including endpoint security, firewalls, and SOAR platforms.
  • Develop and maintain detailed System Security Concept of Operations (ConOps) documents that outline the operational procedures and guidelines for the security architecture.
  • Align the security architecture with the overall business and technology strategy of the organization, ensuring it balances business requirements with information and cybersecurity needs.
  • Plan, design, build, test, and implement robust security architectures for all IT projects.
  • Perform vulnerability testing, risk analyses, and security assessments to ensure the efficacy of the security designs.
  • Test, evaluate, and verify hardware and software to ensure systems and architecture are consistent with cybersecurity architecture guidelines and requirements.
  • Identify critical system capabilities and business functions that require enhanced security measures and prioritize them based on risk and impact on the organization.
  • Conduct regular security reviews to identify gaps in the security architecture and determine the effectiveness of the current security design.
  • Recommend changes or enhancements as necessary based on security reviews.
  • Assist in configuring and re-configuring security tools to ensure they align with the overall security architecture.
  • Use threat intelligence to optimize the configuration of these tools and improve their effectiveness.


Required: Education + Experience
  • 5+ years of experience with SIEM systems, MITRE ATT&CK Framework, Endpoint Security Services, and the onboarding and implementation of various security tools.
  • Proven experience in analyzing alerts from Cloud, SIEM, and EDR tools, and in the alerts tuning process.
  • Familiarity with cybersecurity operation center functions and experience configuring and re-configuring security tools.
  • Experience with security frameworks and the ability to interpret use cases into actionable monitoring solutions.


Strong Working Knowledge:
  • Security Information and Event Management (SIEM) systems
  • Intrusion Detection/Prevention Systems (IDS/IPS)
  • Network and Host Malware Detection and Prevention
  • Web/Email Gateway Security Technologies
  • Security tools and threat intel platform integration
  • Utilization of available Artificial Intelligence (AI) and Machine Learning (ML) opportunities to enhance security operations.


Preferred
  • Bachelor’s Degree in an engineering or cyber discipline


Nice to Have Certifications
  • CompTIA Net+, A+, Security+
  • Certified Testing Engineer (CPTE)
  • Certified Ethical Hacker (CEH)
  • Certified Information System Security Professional (CISSP)


Security Requirements
  • U.S. Citizenship required.
  • Ability to obtain Public Trust (or higher) government clearance.


#LI-LC1


Who You Are

 A proactive problem solver that appreciates the challenges of working in a fast-paced, dynamic environment.

Intellectually curious with a genuine desire to learn and advance your career.

An effective communicator, both verbally and in writing.

Customer service-oriented and mission-focused.

Critical thinker with excellent problem-solving skills

 

If your experience and qualifications aren’t a match for this position, you will remain in our database for consideration for future opportunities that may be a better fit.


Who We Are

phia, LLC is a Northern Virginia-based, small business established in 2011 with a focus on Cyber Intelligence, Cyber Security/Defense, Intrusion Analysis & Incident Response, Cyber Architecture & Capability Analysis, Cyber Policy & Strategy, and Information Assurance/Security. we proudly support various agencies and offices within the Department of Defense (DoD), Federal government, and private/commercial entities.

phia values work-life balance and offers the following benefits to full-time employees:

 Comprehensive medical insurance to include dental and vision

Short Term & Long-Term Disability

 401k Retirement Savings Plan with Company Match

Tuition and Professional Development Assistance Flex Spending Accounts (FSA)


phia does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity, or any other reason prohibited by law in the provision of employment opportunities and benefits.


Average salary estimate

$105000 / YEARLY (est.)
min
max
$90000K
$120000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cybersecurity Architect (Threat Intelligence and Security Integration), phia, LLC

At phia, we’re on the lookout for a passionate Cybersecurity Architect, specializing in Threat Intelligence and Security Integration, to join our dynamic team in Merrifield, VA. In this exciting remote position, you’ll be empowering large enterprises to tackle cyber threats effectively. Your expertise will be critical in integrating Threat Intelligence Platforms (TIPs) with essential operational tools like ServiceNow, Armis, and Sentinel One. Your day-to-day activities will include collaborating with teams to ensure seamless data flow from multiple security tools and utilizing automation to enhance threat intelligence workflows. You’ll also be responsible for developing comprehensive security solutions that align with both business strategies and cybersecurity needs, while performing vulnerability assessments to bolster our defenses. You’ll get to flex your creativity as you recommend enhancements based on regular security reviews, maintaining an adaptive security architecture that evolves with emerging threats. Your 5+ years of experience with SIEM systems, the MITRE ATT&CK Framework, and endpoint security will be invaluable as you communicate and implement robust solutions for safeguarding our client’s assets. Here at phia, we value work-life balance alongside a mission-driven culture. If you're excited about the future of cybersecurity and ready to protect missions that matter, we'd love to hear from you!

Frequently Asked Questions (FAQs) for Cybersecurity Architect (Threat Intelligence and Security Integration) Role at phia, LLC
What are the main responsibilities of a Cybersecurity Architect at phia?

As a Cybersecurity Architect at phia, your primary responsibilities will include integrating Threat Intelligence Platforms (TIPs) with various security and operational tools, validating data flow, streamlining threat intelligence workflows, and ensuring the security architecture aligns with business goals. You'll be conducting vulnerability testing and will play a crucial role in enhancing incident response times.

Join Rise to see the full answer
What qualifications are required for the Cybersecurity Architect position at phia?

To qualify for the Cybersecurity Architect role at phia, candidates should have at least 5 years of experience with SIEM systems, the MITRE ATT&CK Framework, and various security tools. A Bachelor's Degree in an engineering or cyber discipline is preferred, along with certifications such as CompTIA Security+ or Certified Information System Security Professional (CISSP).

Join Rise to see the full answer
How does phia support the professional growth of Cybersecurity Architects?

At phia, we believe in investing in our employees' professional growth. As a Cybersecurity Architect, you will have access to tuition and professional development assistance, allowing you to further your education and stay updated with the latest trends in cybersecurity.

Join Rise to see the full answer
What tools and technologies will I be working with as a Cybersecurity Architect at phia?

In your role as a Cybersecurity Architect at phia, you will work with a range of tools and technologies including ServiceNow, Armis, Sentinel One, SIEM, EDR, IDS/IPS, and various Threat Intelligence Platforms. Your expertise in these technologies will be pivotal for enhancing threat detection and response capabilities.

Join Rise to see the full answer
Is remote work an option for the Cybersecurity Architect position at phia?

Yes! The Cybersecurity Architect position at phia is a remote role, allowing you the flexibility to work from anywhere within the United States while contributing to meaningful cybersecurity initiatives.

Join Rise to see the full answer
Common Interview Questions for Cybersecurity Architect (Threat Intelligence and Security Integration)
Can you explain your experience with SIEM systems as a Cybersecurity Architect?

Certainly! In answering this question, discuss your hands-on experience with various SIEM tools, any specific projects where you utilized these systems, and how your understanding of SIEM contributes to threat detection and incident response.

Join Rise to see the full answer
How do you prioritize security measures in the architecture you design?

When approaching this question, explain your method for evaluating risks and impacts of different system capabilities. Describe any frameworks or criteria you use to prioritize security measures, ensuring alignment with both business and cybersecurity objectives.

Join Rise to see the full answer
What’s your process for conducting vulnerability assessments?

In your response, outline the steps you take to conduct thorough vulnerability assessments. Discuss tools and methodologies you use, how you report findings, and how you follow up on addressing identified vulnerabilities.

Join Rise to see the full answer
How do you integrate threat intelligence into security operations?

Discuss your approach to utilizing threat intelligence within the operational processes. Provide examples of how you've previously enhanced security tools and configurations using actionable insights from threat intelligence.

Join Rise to see the full answer
What methods do you use to keep security architecture aligned with business goals?

Explain your strategy for maintaining alignment between security architecture and organizational strategies. This could include regular meetings with stakeholders, adapting to changing business requirements, and ensuring the security posture supports overarching goals.

Join Rise to see the full answer
Can you share an experience where you successfully enhanced a security system?

Use the STAR method to describe a situation where your input led to enhanced security measures or systems. Focus on the actions you took and the quantifiable results that followed, such as reduced incident response time or improved compliance.

Join Rise to see the full answer
What are your thoughts on utilizing AI and ML in cybersecurity?

Share your insights into how artificial intelligence and machine learning can transform cybersecurity. Discuss any relevant experience you have and the potential advantages and challenges associated with implementing these technologies.

Join Rise to see the full answer
How do you approach continuous improvement in security architecture?

Discuss your philosophy around continuous improvement in security practices. Highlight how you stay current with industry trends, perform regular audits, and utilize feedback to strengthen security architecture.

Join Rise to see the full answer
Describe your approach to collaborating with cross-functional teams.

Emphasize the importance of communication and teamwork in achieving cybersecurity objectives. Share your strategies for engaging with non-technical teams to promote security awareness and effective implementation of security protocols.

Join Rise to see the full answer
What do you consider a successful security architecture?

Define what success looks like for a security architecture in your view. Include aspects such as resilience against threats, responsiveness to incidents, user-friendliness, and alignment with business needs as key success factors.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Amazon Hybrid East Palo Alto, California, USA
Posted 6 days ago
Inclusive & Diverse
Rise from Within
Mission Driven
Diversity of Opinions
Work/Life Harmony
Transparent & Candid
Growth & Learning
Fast-Paced
Collaboration over Competition
Take Risks
Friends Outside of Work
Passion for Exploration
Customer-Centric
Reward & Recognition
Feedback Forward
Rapid Growth
Medical Insurance
Paid Time-Off
Maternity Leave
Mental Health Resources
Equity
Paternity Leave
Fully Distributed
Flex-Friendly
Some Meals Provided
Snacks
Social Gatherings
Pet Friendly
Company Retreats
Dental Insurance
Life insurance
Health Savings Account (HSA)
Photo of the Rise User
Posted 11 days ago
Photo of the Rise User
Bitstamp Remote No location specified
Posted 5 days ago
Photo of the Rise User
Posted 4 days ago

future of fashion coming soon

11 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, remote
DATE POSTED
December 12, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!