AWS Infra Architect
LTIMindtree
Full-time
New York, NY
Job description
Summary:
The Cyber Security Architect designs, implements, and supports security capabilities that protect the organization’s systems, data, and infrastructure. The role defines security requirements through risk assessments, threat modeling, testing, and analysis of existing environments. It contributes to system hardening, monitoring, incident response readiness, disaster recovery planning, and governance improvements. The architect evaluates existing architectures for alignment with company standards and uses established tools such as SIEM, DLP, and IPS to strengthen detection and protection capabilities. This position remains current on emerging cyber threats and evolving security best
Major Duties:
- Designs and supports implementation of security solutions across systems, applications, and infrastructure.
- Defines and documents security requirements using risk assessments, threat modeling, and analysis of existing systems.
- Develops plans that strengthen the security posture and support future technological needs.
- Works with department leaders to communicate cybersecurity expectations, reinforce best practices, and ensure accountability across all locations.
- Provides coaching and follow-up with managers when user actions expose the company to unnecessary risk, including phishing, unsafe email activity, and other behaviors that may compromise system security.
- Leads ongoing communication and training efforts for managers and end users on cybersecurity policies, safe email practices, and prevention of malware, viruses, and other exposure. Supports leadership in ensuring compliance and addressing patterns of user behavior that jeopardize the company’s infrastructure.
- Contributes to system hardening, policy and standards development, monitoring programs, incident response, and disaster recovery efforts.
- Utilizes SIEM, DLP, IPS, and related tools to improve monitoring, detection, and protection capabilities.
- Reviews architectures and configurations to ensure compliance with organizational standards and regulatory expectations.
- Optimizes cybersecurity solutions to manage operating and maintenance costs while improving effectiveness.
- Provides end-user technical support, including remote and on-site troubleshooting, resolving hardware and software issues, and assisting with workstations, mobile devices, and peripheral support.
- Other duties as assigned.
Education:
- Bachelor's degree in computer science, information systems, engineering, or six years of hands-on verifiable operational experience with increasing responsibility in Security, Compliance, Audit Risk, Threat Intelligence, Web Services or Identity Management.
Experience/Skills
- 4-7 years of cyber security or related experience.
- Knowledge of security frameworks, controls, and risk assessment practices.
- Experience working with SIEM, DLP, IPS, and monitoring tools.
- Strong analytical and problem-solving skills.
- CISM or CISSP preferred.
- Advanced organization and analytical skills.
- Must possess excellent verbal and written communication skills.
- Demonstrated ability to navigate ambiguity and exercise sound judgment and moderate autonomy.
- Strong understanding of architecture standards, security best practices, and secure system design.
- In-depth knowledge of Microsoft, Linux, virtualization technologies, and cloud architecture and systems and security approaches.
- Ability to work independently and collaboratively in a team environment.
Job Type: Full-time
Pay: From $85,000.00 per year
Benefits:
- 401(k)
- 401(k) matching
- Dental insurance
- Employee assistance program
- Flexible spending account
- Health insurance
- Life insurance
- Paid time off
- Vision insurance
Application Question(s):
- Do you have the required minimum of 4-7 years of hands-on cybersecurity or a closely related field?
- Summarize your experience in working with SEIM, DLP, IPS.
- Have you defined and documented security requirements using risk assessments and threat modeling? If so, please provide an example.
- What is the highest level of education you have completed?
- Have you completed a CISM or CIPP program?
- Please describe your experience working with Microsoft and Linux operating systems, virtualization technologies, and cloud architectures. Include details on the security approaches you’ve implemented or supported in these environments.
Work Location: In person