Job Description

Job Title: Security Architect - Applications
Job Location: Illinois


  • Responsible for developing and administering solutions that meet system expectations relative to scalability, performance, fault tolerance, usability, and data integrity for the Information Security Operations and Architecture function
  • Responsible for the identification, analysis, and mitigation of threats to internal IT systems or networks and delivering solutions that meet end user expectations relative to performance, usability and security
  • Works with management and the architecture team develop the security strategy and plan and ensures objectives are met
  • Provides leadership and guidance to staff, fostering an environment that encourages employee participation, teamwork, and communication
  • Contributes to the Security Incident Response team and communicates incidents to senior management in Information Technology and Corporate Risk Management
  • Specialist on the Vulnerability Management program
  • Interfaces frequently with information security industry groups to stay abreast of emerging security trends
  • Seasoned multi-disciplinary expert with extensive technical and/or business knowledge and functional expertise
  • Focus of role is on execution of strategic direction of business function activities
  • Carries out complex initiatives involving multiple disciplines and/or ambiguous issues
  • Displays a balanced, cross-functional perspective, liaising with the business to improve efficiency, effectiveness and productivity
  • Helps establish overall enterprise information security architecture (EISA) by aligning business processes, IT software and hardware, local and wide area networks, people, operations, and projects with the organization's overall security strategy
  • Evaluates proposals to determine if proposed security solutions effectively address enterprise requirements, as detailed in solicitation documents
  • Identifies alternative functional security strategies to address organizational IT security concerns
  • Interprets and/or approves security requirements relative to the capabilities of new information technologies
  • Leads and aligns IT security priorities with the organization's mission and vision
  • Manages the monitoring of external threat intelligence data sources to maintain enterprise situational awareness
  • Assists in monitoring and evaluating the effectiveness of the enterprise's information security safeguards to ensure they provide the intended level of protection
  • Helps provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to appropriate senior management

Required Qualifications:

  • Degree and/or relevant proven work experience in the area of Information Security
  • Knowledge of Information Assurance principles
  • Knowledge of incident response and handling methodologies
  • Knowledge of industry-standard and organizationally accepted analysis principles and methods
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies
  • Knowledge of network architecture concepts including topology, protocols, and components
  • Knowledge of network management principles, models, and tools
  • Knowledge of network security architecture, including the application of Defense-In-Depth principles
  • Knowledge of network traffic analysis methods
  • Knowledge of new and emerging IT and information security technologies
  • Knowledge of Open System Interconnection model
  • Knowledge of penetration testing tools and techniques (e.g., metasploit, neosploit, etc.)
  • Knowledge of server administration and systems engineering theories, concepts, and methods
  • Knowledge of server and client operating systems
  • Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems
  • Knowledge of what constitutes a threat to a network
  • Knowledge of information security program management and project management principles and techniques

Preferred Qualifications:

  • Industry certifications, such as CISSP, CISM, CISA, and GIAC are preferred
  • "T-shaped" skills

QBH#: 2379

Application Instructions

Please click on the link below to apply for this position. A new window will open and direct you to apply at our corporate careers page. We look forward to hearing from you!

Apply Online