Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy, and consent to receive emails from Rise
Jobs / Job page
Information Security Architect image - Rise Careers
Job details

Information Security Architect

Job Title: Information Security Architect"
Location: Quincy, Massachusetts
Job Type:  Full-Time
Department: Global Cybersecurity  
Reports To: David Collins

Job Summary:
We are looking for a highly skilled Information Security Architect with a deep expertise in data protection to join our dedicated information security team. The ideal candidate will have extensive experience in building robust security architectures focused on protecting data both technically and operationally within a highly regulated environment. This role emphasizes the implementation of advanced security frameworks, including cryptography, data protection strategies for data at rest, in motion, and in use, and the deployment of technologies such as Data Security Posture Management (DSPM), Cloud Access Security Brokers (CASB), and Security Service Posture Management (SSPM). The candidate will play a key role in navigating the complexities of audits and compliance initiatives to safeguard our sensitive information.
 

Key Responsibilities:
1. Architectural Design and Implementation:
  - Define, design, and maintain the security architecture for data protection, incorporating industry best practices and regulatory requirements.
  - Develop and implement security models and frameworks that support data security across all phases of its lifecycle, including data at rest, in motion, and in use.
2. Data Protection Strategies:
  - Design and deploy cryptographic solutions and protocols tailored to protect sensitive data and ensure compliance with industry regulations.
  - Develop and enforce policies for the secure handling, transfer, and storage of data, leveraging solutions like DSPM, CASB, and SSPM.
3. Regulatory Compliance and Risk Management:
  - Ensure that all security architectures align with relevant compliance requirements (e.g., GDPR, HIPAA, PCI-DSS) and industry standards.
  - Conduct regular risk assessments and audits of data protection measures, validating their effectiveness and compliance with regulatory demands.
4. Incident Response and Monitoring:
  - Collaborate with incident response teams to design procedures and develop response plans for potential data security incidents.
  - Implement continuous monitoring mechanisms for data usage, detecting anomalies in data access patterns for proactive risk management.
5. Collaboration and Stakeholder Management:
  - Work closely with IT teams, legal advisors, and compliance officers to integrate security measures smoothly into systems and operations.
  - Engage with stakeholders at all levels to communicate security architecture needs and promote a strong security culture.
6. Thought Leadership and Innovation:
  - Stay current with emerging trends, threats, and technologies in data protection and information security.
  - Provide guidance on cutting-edge security technologies and strategies, ensuring that our data protection initiatives leverage the latest advancements in the industry.
 

Qualifications:
- Education: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related fields. A master’s degree is preferred.
- Experience: 
 - Minimum of [7-10] years of experience in information security, with a strong focus on security architecture and data protection.
 - Proven experience within a highly regulated industry (financial services, healthcare, government, etc.) and an understanding of its compliance landscape.
- Certifications:
 - Relevant certifications such as CISSP, CISM, CISA, CCSP, or similar recognized credentials in cybersecurity and data protection.
- Technical Skills:
 - In-depth knowledge of cryptographic methods and data protection architectures.
 - Familiarity with advanced data security frameworks including DSPM, CASB, and SSPM.
 - Strong understanding of network security protocols and practices, cloud security, and information assurance.
 

Soft Skills:
- Exceptional analytical skills and a strong attention to detail.
- Excellent communication and collaboration skills to work with both technical and non-technical stakeholders.
- Ability to manage multiple projects and priorities in a fast-paced environment.
 

Why Join Us?
- Join a pioneering organization dedicated to innovative security solutions and data protection.
- Work in a collaborative environment that values creativity and problem-solving.
- Competitive salary and comprehensive benefits package, including [insert relevant benefits].
If you are a forward-thinking information security professional with a passion for architectural excellence and protecting data integrity within a regulated environment, we invite you to apply for this exciting opportunity.

Salary Range:

$120,000 - $187,500 Annual

The range quoted above applies to the role in the primary location specified. If the candidate would ultimately work outside of the primary location above, the applicable range could differ.

Job Application Disclosure:

It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.

State Street's Speak Up Line

State Street Glassdoor Company Review
3.5 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
State Street DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of State Street
State Street CEO photo
Ronald O’Hanley
Approve of CEO

Average salary estimate

$153750 / YEARLY (est.)
min
max
$120000K
$187500K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Information Security Architect, State Street

At State Street, we're on the lookout for an exceptional Information Security Architect to join our skilled information security team in Quincy, Massachusetts. In this full-time role, you will utilize your deep expertise in data protection to build and maintain robust security architectures designed to safeguard sensitive data. Your creative flair and technical expertise will be instrumental in implementing advanced security frameworks such as data protection strategies for data at rest, in motion, and in use. You’ll have the opportunity to deploy cutting-edge technologies like Data Security Posture Management (DSPM) and Cloud Access Security Brokers (CASB). By navigating the complexities of audits and compliance initiatives, you’ll directly contribute to our mission of data integrity and trust. You will collaborate closely with IT teams and legal advisors to ensure our security measures align with regulatory requirements like GDPR, HIPAA, and PCI-DSS. We value innovation, so your insights on emerging trends in information security will be highly regarded. If you’re passionate about architectural excellence and fostering a strong security culture, we encourage you to apply and join us in shaping the future of data protection at State Street.

Frequently Asked Questions (FAQs) for Information Security Architect Role at State Street
What are the key responsibilities of an Information Security Architect at State Street?

An Information Security Architect at State Street is responsible for designing and implementing security architectures aimed at data protection, ensuring compliance with regulations, and conducting risk assessments. You'll define security models for data security across its lifecycle, manage incident responses, and engage with various stakeholders to promote a culture of security. This role is critical in maintaining the integrity of sensitive information in a highly regulated environment.

Join Rise to see the full answer
What qualifications are required for the Information Security Architect position at State Street?

The ideal candidate for the Information Security Architect role at State Street should have a Bachelor's degree in Computer Science, Information Technology, or Cybersecurity, though a master's degree is preferred. Additionally, extensive experience of 7-10 years in information security, particularly in security architecture and data protection, is essential. Relevant certifications like CISSP, CISM, or CCSP are also important, along with strong analytical skills and the ability to communicate effectively across diverse teams.

Join Rise to see the full answer
How does State Street ensure compliance in its Information Security Architect role?

At State Street, compliance is a cornerstone of the Information Security Architect's responsibilities. The role involves defining security architectures that align with industry standards such as GDPR, HIPAA, and PCI-DSS. The architect conducts regular audits and risk assessments to ensure that data protection measures are effective and up to date, helping safeguard sensitive information against regulatory breaches.

Join Rise to see the full answer
What technologies and frameworks will an Information Security Architect at State Street work with?

As an Information Security Architect at State Street, you’ll engage with advanced technologies and frameworks including Data Security Posture Management (DSPM), Cloud Access Security Brokers (CASB), and Security Service Posture Management (SSPM). Your expertise in cryptographic methods is vital for implementing secure solutions that protect sensitive data throughout its lifecycle.

Join Rise to see the full answer
What sort of teamwork and collaboration can be expected in the Information Security Architect role at State Street?

The Information Security Architect role at State Street emphasizes collaboration with various teams including IT, legal, and compliance officers. You’ll work closely with stakeholders at all levels, communicating security needs and integrating security measures into existing systems. This collaborative spirit fosters innovation and team cohesion, essential for building effective security strategies.

Join Rise to see the full answer
Common Interview Questions for Information Security Architect
Can you explain how you approach designing security architectures for data protection?

In approaching the design of security architectures for data protection, I begin by assessing the specific data assets and identifying regulatory requirements that must be met. I leverage industry best practices to develop a framework that encompasses data at rest, in motion, and in use. Collaboration with key stakeholders helps ensure the design is practical and integrates seamlessly within the organization’s existing infrastructure.

Join Rise to see the full answer
What experiences have you had with compliance frameworks relevant to the Information Security Architect position?

My experience includes working directly with compliance frameworks such as GDPR, HIPAA, and PCI-DSS. In my previous roles, I conducted risk assessments and managed audits that not only ensured compliance but also improved our overall security posture. I understand the importance of aligning security measures with compliance standards to protect sensitive information.

Join Rise to see the full answer
How do you stay updated with the latest trends and threats in information security?

Staying updated in the ever-evolving field of information security is crucial. I regularly participate in industry conferences, subscribe to cybersecurity publications, and engage in online forums. This continuous learning approach allows me to understand emerging threats and trends, enabling me to recommend and implement innovative security solutions.

Join Rise to see the full answer
Can you provide an example of a successful incident response strategy you developed?

A notable incident response strategy I developed involved structuring a comprehensive plan that included detection, containment, and post-incident analysis. During a simulated breach, we effectively contained the threat through coordinated team efforts and advanced monitoring technologies, which minimized data exposure and allowed for a rapid return to normal operations.

Join Rise to see the full answer
What role do you believe an Information Security Architect plays in risk management?

An Information Security Architect plays a pivotal role in risk management by identifying vulnerabilities within security architectures and implementing mitigation strategies. This involves conducting regular assessments, monitoring systems for anomalies, and continuously improving security measures to safeguard against potential incidents. Proactive risk management is key to maintaining organizational trust.

Join Rise to see the full answer
How do you handle the communication of complex security concepts to non-technical stakeholders?

To communicate complex security concepts to non-technical stakeholders, I focus on using clear, jargon-free language and relatable analogies. Tailoring the communication to the audience's level of understanding and emphasizing how security measures impact their roles helps facilitate better comprehension. I also encourage questions to ensure clarity.

Join Rise to see the full answer
What cryptographic methods have you implemented in your previous roles?

In my previous roles, I implemented various cryptographic methods such as AES for data encryption and RSA for secure data transmissions. I also designed public-key infrastructures to securely manage cryptographic keys and ensure compliance with industry standards. These implementations were critical in bolstering the overall data protection strategies.

Join Rise to see the full answer
Describe your experience with data security posture management tools.

I have extensive experience with data security posture management tools, particularly in assessing data risk and compliance. Utilizing solutions like DSPM allowed me to gain insights into vulnerabilities and take corrective actions to enhance our security posture. These tools are vital for continuous monitoring and ensuring adherence to regulatory requirements.

Join Rise to see the full answer
What strategies do you employ for the continuous monitoring of data security?

Continuous monitoring of data security involves employing a multi-layered approach, including automated alert systems for unusual access patterns, regular updates to security configurations, and routine audits of data access logs. This proactive stance ensures we detect potential breaches in real-time and can respond swiftly to mitigate risks.

Join Rise to see the full answer
How do you prioritize multiple security projects in a fast-paced environment?

Prioritizing multiple security projects requires a structured approach. I begin by assessing the impact and urgency of each project in relation to organizational goals and compliance deadlines. Utilizing project management tools helps in tracking progress. Regular communication with stakeholders ensures alignment and allows for adaptability in response to shifting priorities.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User

As a Director at State Street, you will lead the Technical Implementation Services team to ensure successful data management and client solutions.

Photo of the Rise User
Posted 6 days ago

We are seeking an experienced HR Business Partner to drive strategic HR initiatives at State Street Global Advisors in Boston.

Photo of the Rise User

Ralph Lauren Corporation is looking for a Business Analyst skilled in retail inventory management and data analytics to enhance Allocation functionalities.

Meredith Hybrid Bangalore, KA - Ecoworld, Plot C1, Campus 8A, 5th Floor, Outer Ring Road
Posted 13 days ago

Join Dotdash Meredith as an Identity & Access Management Engineer - 1 to play a crucial role in improving operational efficiency and security.

Photo of the Rise User
Datadog Remote United States
Posted 10 days ago
Customer-Centric
Rapid Growth
Diversity of Opinions
Reward & Recognition
Friends Outside of Work
Inclusive & Diverse
Empathetic
Feedback Forward
Work/Life Harmony
Casual Dress Code
Startup Mindset
Collaboration over Competition
Fast-Paced
Growth & Learning
Open Door Policy
Rise from Within
Maternity Leave
Paternity Leave
Flex-Friendly
Family Coverage (Insurance)
Medical Insurance
Dental Insurance
Vision Insurance
Mental Health Resources
Life insurance
Disability Insurance
Health Savings Account (HSA)
Flexible Spending Account (FSA)
401K Matching
Paid Holidays
Paid Sick Days
Paid Time-Off

Join Maskd AI as a Co-Founder and CTO, leading the charge in revolutionizing customer interactions with innovative Voice AI solutions.

Photo of the Rise User

Seeking a Technical Service Engineer to join Lucanet's team and enhance their SaaS solutions for finance leaders.

DB Hybrid Jacksonville, 5022 Gate Parkway
Posted 8 days ago

Join Deutsche Bank as an Assistant Vice President to lead the development of cutting-edge unified communications solutions in Jacksonville, FL.

Photo of the Rise User
Posted 12 days ago

Novibet seeks a Senior SQL Server Database Administrator to ensure high-performance database management in a dynamic and inclusive setting.

Photo of the Rise User
Woongjin, Inc Hybrid Mountain View, California, United States
Posted 11 days ago

Seeking a Senior Network Engineer to elevate our network infrastructure while embodying the values of service and leadership at Woongjin, Inc.

Join Starling Bank as a Vulnerability Management Engineer to enhance our Cyber Security initiatives with innovative tooling and automation.

Photo of the Rise User
NielsenIQ Remote Soseaua Pipera 42 Sector 2 5th and 7th floor, Bucharest, Romania
Posted 4 months ago
Photo of the Rise User
Inclusive & Diverse
Rise from Within
Mission Driven
Diversity of Opinions
Work/Life Harmony

At State Street, inclusion and diversity are embedded in our values and culture. We know that an inclusive culture and a diverse workforce make us stronger and more successful. In a fast-paced and evolving world, we make it a priority to ensure ...

140 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
March 31, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
15 people applied to Junior Security Engineer at Epic
Photo of the Rise User
Someone from OH, Westerville just viewed Summer Internship - Public Health Data Science at Cotiviti
V
Someone from OH, Cincinnati just viewed Part-Time Executive/Personal Assistant at VirtuHire
Photo of the Rise User
Someone from OH, Chillicothe just viewed Area Manager at The Hemp Co by Curaleaf at Curaleaf
Photo of the Rise User
Someone from OH, Cincinnati just viewed VP, B2B/Integrated Marketing at TEGNA Inc.
Photo of the Rise User
Someone from OH, Cincinnati just viewed Director, Marketing and GTM Strategy at Aspen Dental
Photo of the Rise User
Someone from OH, Cincinnati just viewed Senior Vice President, JLLIPT Marketing at JLL
Photo of the Rise User
Someone from OH, Cincinnati just viewed Vice President of Marketing at Forum Health
Photo of the Rise User
Someone from OH, Cincinnati just viewed Vice President of Marketing at Beacon
Photo of the Rise User
Someone from OH, Cincinnati just viewed Director of Growth Marketing at Sundays for Dogs
P
Someone from OH, Cincinnati just viewed Vice President of Marketing at ProCaps Labs
Photo of the Rise User
Someone from OH, Cincinnati just viewed Vice President, Marketing at Inmagine
Photo of the Rise User
Someone from OH, Cincinnati just viewed VP of Marketing at IDIQ
Photo of the Rise User
Someone from OH, Cincinnati just viewed VP of Marketing at Vultron
Photo of the Rise User
Someone from OH, Cincinnati just viewed Marketing Manager (Remote - US) at Jobgether
F
Someone from OH, Cincinnati just viewed Head of Marketing at FoodHealth Company
Photo of the Rise User
Someone from OH, Cincinnati just viewed VP, Paid Marketing (Remote - US) at Jobgether
Photo of the Rise User
Someone from OH, Cincinnati just viewed Hospital Marketing at Datadog
Photo of the Rise User
Someone from OH, Cincinnati just viewed Vice President, Institutional Marketing at Tutor.com
Photo of the Rise User
Someone from OH, Cincinnati just viewed Director, Marketing Campaign Management at Humana