Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Cyber Security Architect image - Rise Careers
Job details

Cyber Security Architect

Company Description

We provide Recruitment and Staffing services to many industries and domain through our innovative and customized solutions and passionate commitment to research. Ability to understand the hiring strategies, availability of talent and compensation benchmarking makes us proud hiring partner for various industries. We work as trusted business partners and always strive to deliver the most value and highest return on investment for our clients. We are highly trained business professionals with strong understanding of clients need. We work closely with the leading staffing trade associations, training, and research organizations to ensure we are knowledgeable of the latest industry trends and technologies.

Job Description

Job Description:

  1. Looking for Azure Cloud Security Architect
  2. The person should have good understanding in system threat modeling.
  3. Experience performing threat modeling and design reviews to assess security implications and mitigating controls for the security solutions.
  4. Should be good in documenting, taking the screen shots of the system and able to deliver quality security documents of the system.
  5. Should have very good understanding of cyber security related concepts(Just example the way Authorization and Authorization work etc.,). Because this understating is necessary to deliver quality documents.
  6. He may not have system design skills of security but should be able to understand the existing system and able to manage the operations.
  7. Shall have experience on security monitoring on platform and application level.
  8. Expertise in Azure security , in-depth understanding of their service catalogs, security offerings and automation opportunities
  9. Deep experience on implementing security controls on AKS Cluster, Active Directory , MFA, API’s and ADB2C.
  10. Experience on control plane and data plane security implementation.
  11. Good knowledge on zero trust security architecture.
  12. Knowledge and implementation experience on mTLS and azure managed identity, 

 

Apart from above points, candidate must be good with below skills.

 

Security Risk Management Plan      -

                  Task Tools and Lifecycle Phases      -

        -         Cybersecurity Bill of Material           –

                  Approach for Threat Modeling        

                           Asset Identification                -

                           Application Overview            

                           Decompose the Application    -

                           Identification of Threats         -

                           Threat Mapping (STRIDE)      -

                           Risk Rating and Tools            -

                           Report                                   -

Security Risk Analysis                     -

                           Ex:- CVSS 3.0 / 3.1

                  Security Risk Evaluation                  -

                  Security V & V Activities                  -

                  Residual Security Risk Analysis       -

                  Traceability Matrix                          -

                  Security Risk Management Report  

Regards,

 Mohammed Ilyas,

PH - 229-264-4024 or Text - 229-469-1455 or you can share the updated resume at Mohammed@vtekis. com

Additional Information

All your information will be kept confidential according to EEO guidelines.

Average salary estimate

$110000 / YEARLY (est.)
min
max
$90000K
$130000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cyber Security Architect, VTekis Consulting LLP

Are you a passionate Cyber Security Architect looking for an exciting opportunity? Join our innovative team at Vtekis based in sunny Los Angeles, CA! We are on the lookout for a talented Azure Cloud Security Architect who is eager to dive into the world of cyber security and contribute to high-impact projects. In this role, you'll get to leverage your expertise in system threat modeling, performing comprehensive threat assessments, and crafting top-quality security documentation. Your experience with Azure security services will be invaluable, particularly when it comes to implementing security controls on AKS Clusters, Active Directory, and more. We value a candidate who can understand existing systems, manage operations effectively, and navigate the complexities of security monitoring. You will have the chance to work with cutting-edge technologies, ensuring our clients receive the best possible security solutions tailored to their needs. While design skills aren't mandatory, a solid grasp of cybersecurity concepts like zero trust architectures will certainly set you up for success. If you’re ready to take on a role that blends creativity and technical prowess, we’d love to hear from you!

Frequently Asked Questions (FAQs) for Cyber Security Architect Role at VTekis Consulting LLP
What are the main responsibilities of a Cyber Security Architect at Vtekis?

As a Cyber Security Architect at Vtekis, your primary responsibilities will include performing threat modeling and design reviews, documenting security solutions, and implementing security controls specific to the Azure environment. You’ll engage in security monitoring on both platform and application levels. Additionally, your role will involve understanding existing systems, making informed decisions regarding their operational security, and advising on best practices based on your expertise.

Join Rise to see the full answer
What qualifications are necessary for the Cyber Security Architect position at Vtekis?

To qualify for the Cyber Security Architect position at Vtekis, candidates should possess a strong understanding of cybersecurity principles, particularly in Azure cloud environments. A background in system threat modeling and experience with security controls such as MFA and API security is crucial. Familiarity with zero trust architectures and the ability to produce high-quality security documentation will greatly enhance your application.

Join Rise to see the full answer
What tools and methods are favored in the Cyber Security Architect role at Vtekis?

Within the Cyber Security Architect role at Vtekis, we favor a variety of tools and methodologies, such as Cybersecurity Bill of Material, threat modeling approaches, and security risk evaluation frameworks like CVSS 3.0/3.1. You will also engage in risk management reporting and analysis using a structured lifecycle approach, which will be crucial to ensure the integrity of our security solutions.

Join Rise to see the full answer
What is the work environment like for the Cyber Security Architect at Vtekis?

At Vtekis, the work environment is collaborative and fast-paced, with a focus on innovation and continuous improvement. As a Cyber Security Architect, you'll work with a team of passionate professionals who are committed to achieving the highest standards in security. There will be ample opportunities for professional growth as you engage with cutting-edge technologies and industry best practices.

Join Rise to see the full answer
How can a candidate prepare for the Cyber Security Architect role at Vtekis?

To prepare for the Cyber Security Architect role at Vtekis, candidates should refresh their knowledge in Azure security services, threat modeling frameworks, and current cybersecurity trends. Gaining hands-on experience with security controls, especially in cloud environments, will also be beneficial. Additionally, familiarizing yourself with documentation practices will enhance your readiness for this position.

Join Rise to see the full answer
Common Interview Questions for Cyber Security Architect
Can you describe your experience with Azure security services?

Certainly! In preparing for this question, you should delve into specific Azure services you’ve worked with, such as Azure Active Directory, Azure Security Center, or implementing security controls on AKS clusters. Discuss your practical experience, any challenges you faced, and the results achieved through your implementation of security measures.

Join Rise to see the full answer
What is threat modeling, and how do you approach it?

When answering this question, outline your understanding of threat modeling and its importance in cybersecurity. Highlight any frameworks you've used, like STRIDE or PASTA. Share a specific example of how you’ve applied threat modeling in a project, noting the threats identified and the mitigations implemented.

Join Rise to see the full answer
How do you stay updated on the latest cybersecurity trends?

To address this question effectively, mention industry resources you follow, such as cybersecurity news sites, technical blogs, and attending webinars or conferences. Highlight your commitment to continuous learning and how you apply new knowledge in your work at Vtekis.

Join Rise to see the full answer
Can you explain zero trust security architecture?

In your response, define zero trust architecture, emphasizing the principle of 'never trust, always verify.' Explain how you would implement this approach in a cloud environment and discuss any past experiences that involved zero trust principles.

Join Rise to see the full answer
What challenges have you faced in security documentation, and how did you overcome them?

Identify specific challenges you encountered, such as balancing technical detail with clarity for non-technical stakeholders. Discuss the strategies you employed to improve your documentation skills, perhaps through feedback mechanisms or utilizing different formats for different audiences.

Join Rise to see the full answer
What tools do you prefer for security monitoring, and why?

Discuss the monitoring tools you have worked with, such as Azure Monitor, Splunk, or similar solutions, and explain why you prefer them. Focus on specific features that enhance threat detection and response times, drawing on practical examples of how these tools have benefitted your organization.

Join Rise to see the full answer
How do you handle security incidents when they arise?

A solid answer will outline the steps you take starting from incident detection to resolution. Discuss your experiences with incident response plans, communication with stakeholders, and any specific tools or frameworks that guide your response. Provide examples of real incidents you've managed, highlighting lessons learned.

Join Rise to see the full answer
Describe your experience with multi-factor authentication (MFA).

When addressing this, detail the MFA implementations you’ve conducted, specifying the systems involved and any challenges faced. Discuss the importance of MFA in safeguarding access and how it enhances overall security posture in an organization.

Join Rise to see the full answer
What is the significance of risk management in cybersecurity?

For this question, explain how risk management helps identify, assess, and prioritize security risks. Share specific methodologies you’ve used in your past roles and illustrate with examples where effective risk management has prompted strategic security enhancements.

Join Rise to see the full answer
Can you walk us through your experience with API security?

Here, focus on any API security protocols and frameworks you've employed, such as OAuth or OpenID Connect. Discuss the unique challenges in API security and how you’ve addressed them through best practices and specific security measures.

Join Rise to see the full answer
MATCH
VIEW MATCH
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
March 9, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
Someone from OH, Columbus just viewed Strategy and Corporate Development Intern at SoundCloud
Photo of the Rise User
Someone from OH, Milford just viewed Visual Designer (Contract to Hire) at Abridge
Photo of the Rise User
Someone from OH, Dublin just viewed User Researcher III at Fearless
Photo of the Rise User
Someone from OH, Dublin just viewed Senior UX Designer at Nox Health
Photo of the Rise User
Someone from OH, Dublin just viewed US Product Designer at Praxent
Photo of the Rise User
19 people applied to IT Intern at USAA
Photo of the Rise User
Someone from OH, Solon just viewed QA Analyst at Two Circles
Photo of the Rise User
Someone from OH, Cincinnati just viewed Shift Lead - Downtown Cincinnati at DoorDash USA
Photo of the Rise User
Someone from OH, Cleveland just viewed Getinge is hiring: UI/UX Developer in Streetsboro at Getinge
Photo of the Rise User
Someone from OH, Loveland just viewed Inside Sales Co-Op at VEGA Americas
B
Someone from OH, Painesville just viewed Administrative Assistant at BlkVision Media
Photo of the Rise User
Someone from OH, Cincinnati just viewed Marketing Customer Support (Automotive) at Publicis Groupe
Photo of the Rise User
Someone from OH, Columbus just viewed Event Campaign Manager at Smartling
H
Someone from OH, Chesterland just viewed Client Success Manager at HR Force International
Photo of the Rise User
Someone from OH, Dublin just viewed Junior PMO Analyst at Rentokil Initial Group
Photo of the Rise User
Someone from OH, Doylestown just viewed Associate Sub-editor at Third Bridge
Photo of the Rise User
Someone from OH, Pickerington just viewed Layout Artist at Powerhouse Animation Studios
Photo of the Rise User
Someone from OH, Cortland just viewed Exploring Post-Grad Rotational Programs at Evonik at Evonik
B
Someone from OH, Powell just viewed Salesforce Admin (Part Time) at Bullpen Talent