Post job

Security architect jobs in Bryan, TX

- 1,257 jobs
All
Security Architect
Architect
Security Engineer
Information Security Officer
Senior Information Security Analyst
Senior Security Engineer
  • Application Security Architect

    Russell Tobin 4.1company rating

    Security architect job in Plano, TX

    Application Security Architect (DevSecOps) Contract Type: 12-Month W2 Contract Pay Rate: $65-$75/hour (Based on Experience) Russell Tobin is partnering with a large, well-established financial services organization to identify an experienced Application Security Architect for a long-term contract opportunity. This role will be responsible for embedding security into the software development lifecycle and supporting secure DevOps practices across enterprise applications. Responsibilities Design, implement, and maintain secure CI/CD pipelines. Integrate security tools including SAST, DAST, and SCA into development workflows. Work closely with development and operations teams to identify and remediate application vulnerabilities. Automate security testing and compliance validation processes. Monitor and respond to security incidents in cloud and container environments. Develop, document, and enforce application security policies, standards, and procedures. Stay current on evolving security threats and DevSecOps best practices. Required Qualifications Bachelor's degree in Computer Science, Cybersecurity, or a related field. 6+ years of overall IT experience with 2-3 years focused on application security or DevSecOps. Strong experience with CI/CD tools such as Jenkins, Harness, or similar platforms. Development experience with Java, Python, .NET, or related languages. Hands-on experience with application security tools such as Veracode, GitHub Advanced Security (GHAS), Orca, or similar. Proficiency with scripting languages such as Python and Bash. Experience with container technologies including Docker and Kubernetes. Knowledge of cloud platforms (AWS, Azure, and/or GCP) and their security capabilities. Strong understanding of secure coding practices and application security principles. Experience with Infrastructure as Code tools such as Terraform and Ansible. Work Environment Hybrid schedule with 3 days onsite and 2 days remote each week Professional enterprise environment with cross-functional collaboration Long-term contract with potential for extension Benefits Info: Pride Global offers eligible employee's comprehensive healthcare coverage (medical, dental, and vision plans), supplemental coverage (accident insurance, critical illness insurance and hospital indemnity), 401(k)-retirement savings, life & disability insurance, an employee assistance program, legal support, auto, home insurance, pet insurance and employee discounts with preferred vendors.
    $65-75 hourly 3d ago
  • Enterprise Security Architect

    Corebridge Financial

    Security architect job in Houston, TX

    The Enterprise Security Architect will help to lead the design, implementation, and oversight of secure systems and architectures across our organization. This role is critical to embedding security into enterprise processes, aligning with industry standards, and building a scalable security foundation. The ideal candidate will bring deep technical expertise, strong communication skills, and the ability to work independently or collaboratively to drive security initiatives and foster a security-first culture. Responsibilities Design, document, and maintain secure architecture patterns, diagrams, and reference architectures to guide security implementations across the organization. Conduct comprehensive security reviews of applications, systems, and networks, identifying vulnerabilities and recommending secure design strategies. Perform threat modeling and risk assessments to identify potential vulnerabilities and recommend appropriate mitigating controls. Partner with enterprise and line-of-business architects to integrate security seamlessly into designs and processes. Translate complex technical security concepts into clear, actionable insights for C-level executives, business leaders, non-technical stakeholders, and technical engineering teams. Recommend mitigating controls, security tools, and remediation strategies to address security gaps and minimize risk. Stay current on security threats, vulnerabilities, and technologies to enhance the organization's security posture. Promote a security-first culture by mentoring technical teams, educating stakeholders, and embedding security best practices into organizational workflows. Skills and Qualifications 7+ years of hands-on experience in infrastructure, systems, networks, applications, or cloud security. 5+ years of enterprise architecture experience required. Ability to create and review diagrams using tools such as Visio or Lucidchart. Familiarity with secure architecture patterns, reference architectures, and frameworks. Expertise in SaaS, PaaS, and IaaS environments, including platforms like AWS, Azure, M365, and Salesforce. Experience working with various identity and access management (IAM) solutions such as CyberArk, Okta, Ping Identity, Entra ID/Azure AD, and other tools supporting SSO, MFA, and PAM. Familiarity with tools like Jira, Confluence, and ServiceNow for workflow management and documentation. Expertise in threat modeling, vulnerability management, and risk assessments. Working knowledge of regulatory requirements and compliance standards such as NYDFS, CCPA, GLBA, PCI-DSS, HIPAA, SOX, and GDPR. Relevant certifications such as CISSP, CCSP, or equivalent. Ability to work independently or collaboratively in a team-oriented environment. Bachelor's degree in a relevant field or proven record of experience in Information Technology and Cyber Security roles. Technical Skills Familiarity with protocols such as SAML, OAuth, OIDC, FIDO, PKI, JWT, LDAP, and Kerberos. Strong knowledge of common network protocols, including TCP/IP, HTTP/HTTPS, DNS, SMTP, SNMP, SSH, and VPN technologies. Expertise in encryption technologies (e.g., TLS, AES, RSA) and key management practices (e.g., KMS, HSM, PKI). Familiarity with firewalls, IDS/IPS, WAF, VPN, Routers, Switches, Load Balancers, Zero-Trust, microsegmentation, and SD-WAN security solutions, CASB, Proxy, SSE. Experience with SIEM tools such as Splunk, QRadar, or ArcSight and logging/monitoring best practices. Knowledge of Docker, Kubernetes, EKS, ECS, and OCP, including their security considerations. Proficiency in integrating security into DevOps pipelines with tools such as Jenkins, GitHub, Artifactory, Terraform, and Vault. Common Security and Architecture Frameworks Security Frameworks: NIST Cybersecurity Framework (CSF) ISO 27001 and 27002 CSA CCM (Cloud Controls Matrix) CIS Controls Architecture Frameworks: SABSA (Sherwood Applied Business Security Architecture) TOGAF (The Open Group Architecture Framework) AWS Well-Architected Framework Preferred Certifications TOGAF (The Open Group Architecture Framework) SABSA Foundation or Practitioner CISSP-ISSAP (Concentration in Security Architecture) Certified Cloud Security Professional (CCSP) GIAC Security Architecture (GDSA) AWS Certified Solutions Architect - Associate or Professional AWS Certified Security - Specialty Microsoft Certified: Azure Solutions Architect Expert Soft Skills Strong analytical and problem-solving abilities. Excellent interpersonal and collaboration skills. Strong organizational and time management skills. Adaptability and a commitment to continuous learning of new technologies and methodologies. Attention to detail and dedication to delivering high-quality results. High level of integrity and ethical conduct. Industry-Specific Experience Experience in financial services, insurance, or other regulated environments. Proven ability to design and implement security controls that align with industry regulations and standards. Experience conducting security assessments and audits in regulated industries. Familiarity with industry-specific threats and vulnerabilities to tailor security solutions.
    $99k-149k yearly est. 4d ago
  • Chief Information Security Officer

    Workforce Solutions Greater Dallas 3.9company rating

    Security architect job in Dallas, TX

    The CISO will lead the development and execution of a comprehensive information and cybersecurity strategy aligned with WFSDallas' mission. This role will oversee the protection of digital and physical assets, data of job-seekers, employers and partners, and ensure secure, reliable operations across all service channels. The CISO will be a strategic advisor to senior leadership and the board, while managing day-to-day security operations, risk management, compliance and business continuity. ESSENTIAL DUTIES AND RESPONSIBILITIES: This is intended to identify the essential functions of a position and should not be interpreted as all-inclusive. The employee may be required to perform or assume additional job-related responsibilities other than those stated in this . Typical duties include: • Develop and implement enterprise-wide information cybersecurity strategy and governance framework including policies, procedures, and training to ensure compliance and security awareness organization-wide adhering to the National Institute of Standards and Technology (NIST) 800.53 Version 5 and Texas Cybersecurity Framework (TCF). • Lead risk assessment, regulatory compliance (federal/state grants, data privacy, workforce system regulations) and vendor/partner security oversight. • Oversee security operations: threat intelligence, vulnerability management, incident response, identity & access management, cloud/endpoint security. • Build and lead the information security team; cultivate a security-aware culture across workforce centers, staff and partner organizations. • Collaborate with IT, operations, legal, HR, training and executive leadership to embed security into all programs and services. • Evaluate and implement emerging security technologies and approaches to support digital transformation. Develops and implements agency policies for encryption of data transmissions and the erection of firewalls to conceal information as it is being transmitted and to eliminate tainted digital transfers. Serve as liaison to the Board of Directors and external stakeholders regarding security posture, incidents and audits. • Oversees cybersecurity budgets, contracts, and resource planning to ensure efficient and effective allocation of security resources. • Regularly reports cybersecurity posture, risk assessments, and incident outcomes to executive leadership and the Board. • Leads, mentors, and develops information technology and cybersecurity staff to build organizational capability and succession strength. RISK MANAGEMENT & COMPLIANCE • Identify, assess and manage information security risks across all WFSDallas' operations-digital systems, workforce centers, training portals, partner systems. • Ensure compliance with relevant laws, regulations and standards (including federal workforce grant requirements, data privacy, state/county regulations). • Monitors changes in state and federal legislation and advises leadership on potential impacts to agency cybersecurity posture. • Lead internal and external security audits, assessments and remedial actions. • Monitor and evaluate third-party vendor security and partner integrations. SECURITY OPERATIONS • Lead the architecture, deployment and operation of security infrastructure: network security, endpoint security, cloud security, identity & access management. • Oversee vulnerability management, threat intelligence, detection and response capabilities. • Develop and maintain incident response plan, coordinate response to security events, and lead investigations. • Collaborate with IT teams supporting WFSDallas' centers, online portals, job-seeker data systems, and employer portals. Develops performance metrics to measure effectiveness of cybersecurity controls and drives continuous improvement across all security domains. BUSINESS CONTINUITY & DATA PROTECTION • Develop and maintain disaster recovery and business continuity plans for mission-critical systems (career services platform, job-matching system, training portals, partner integrations). • Protect sensitive data (jobseeker information, employer information, partner data) with appropriate encryption, access controls, retention policies. • Lead the development of a data classification and handling program aligned to the organization's operations. SUPERVISORY RESPONSIBILITIES: This position is responsible to the President. Work is performed under general guidance and supervision and according to Workforce Solutions procedures and policies. MINIMUM QUALIFICATIONS: • Bachelor's degree in Computer Science, Information Security, Cybersecurity or similar (Master's preferred) or equivalent combination of education and relevant work experience • At least 10 years of progressive experience in information security/IT risk management; 5+ years in a senior leadership role. • Experience in a multi-site, multi-channel service delivery environment (preferred: public sector, non-profit, workforce systems). • Strong working knowledge of security frameworks (e.g., NIST CSF, ISO 27001, COBIT). • Proven ability to lead incident response and manage regulatory/compliance demands. PREFERRED QUALIFICATIONS: • Certifications such as CISSP, CISM, CISA. • Experience with managing third-party/vendor risk, cloud security, identity & access management in hybrid environments. • Excellent communication skills-capable of translating technical issues for executive/board audiences. • Demonstrated ability to align security initiatives with organizational mission and business objectives. LANGUAGE SKILLS: Ability to read and interpret documents such as safety rules, operating and maintenance instructions, and procedure manuals; ability to write routine reports and correspondence; and to effectively communicate with diverse audiences (colleagues, vendors, supplier, landlords, general public). REASONING ABILITY: Ability to solve practical problems and deal with a variety of concrete variables in situations where only limited standardization exists. Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form. OTHER SKILLS and ABILITIES: Knowledge of general office administration; office protocol; regulations for acquisition and inventory control; use and maintenance of computer systems; organization and accurate record-keeping. Type 50-60 words per minute accurately; compose complex correspondence and documentation; operate a variety of office equipment; train others; interact with visitors, Board of Directors, and subcontractors in a professional manner. TRAVEL Due to nature of job, travel will be required approximately 30-40% of work time. Must possess own method of transportation. PHYSICAL DEMANDS: The physical demands described here are representative of those which must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee is frequently required to stand; walk; and stoop, kneel, crouch, or crawl. The employee must regularly lift and/or move up to 10 pounds, frequently lift and/or move up to 25 pounds, and occasionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include close vision, distance vision, and ability to adjust focus. WORK ENVIRONMENT: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is occasionally exposed to moving mechanical parts, fumes or airborne particles, and outside weather conditions. The noise level in the work environment is usually moderate. This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may be modified any time with or without notice or due to funding changes. Workforce Solutions Greater Dallas is an EEO/AA/Drug Free Workplace Employer and complies fully with the Americans with Disabilities Act (ADA). Auxiliary aids and services are available upon request to individuals with disabilities. This position is grant funded.
    $116k-159k yearly est. 2d ago
  • Chief Information and Security Officer

    Bridgework Partners

    Security architect job in Dallas, TX

    Chief Information Security Officer Chief Information Security Officer The Chief, Information Security Officer (CISO) is a senior-level leader responsible for establishing and maintaining the enterprise vision, strategy, and program to protect information assets and technologies vital in advancing the institution's commitment to transforming lives and communities through higher education. The CISO ensures the organization's academic and administrative resources are secured against breaches and are in full compliance with applicable regulations. This is an on-campus, in-person position. Required Knowledge, Skills, and Abilities Must demonstrate strong interpersonal and verbal communication skills, with the ability to communicate broadly across the organization and develop and maintain effective relationships with a wide range of constituencies. Must also demonstrate strong written communication skills. Ability to lead and motivate cross-functional, interdisciplinary teams to achieve tactical and strategic goals. Must possess strong problem-solving skills to effectively influence decision-making in key negotiations. Ability to perform hands-on, operational work when necessary. Ability to maintain the security or integrity of the critical infrastructure of the institution. Qualifications Minimum Qualifications Bachelor's degree and additional education in Information Security. Prior managerial experience in Information Technology and service context. Professional IT security management certification (e.g., CISSP, CISM). 10+ years' experience in information security and/or IT risk management, with focus on security, performance, and reliability. Experience running a security program in a complex environment. Strong understanding of security protocols and operations. Knowledge of current IT risks and experience implementing security solutions. Experience with NIST 800-53 Framework implementation and compliance, and familiarity with Texas public sector cybersecurity requirements, including TX-RAMP. EO Specific Language (IT specific) - Ability to maintain the security or integrity of the critical infrastructure of the organization. Bilingual or multilingual preferred. ***Will be subject to a criminal background check. Some positions may be subject to a fingerprint check.*** Key Responsibilities IT Leadership: Collaborate with peers and key constituents, contribute directly to the organization's mission, and set the IT and IT Security direction. IT Risk Management: Develop, implement, and monitor a comprehensive information security and IT risk management program for the integrity, confidentiality, and availability of organizational assets. Conduct architecture reviews, risk assessments, business impact analyses, and develop risk management plans to anticipate and neutralize threats. Policies and Procedures: Establish and maintain security policies, standards, and procedures in line with best practices and regulatory requirements, including the NIST 800-53 Framework (Texas Cybersecurity Framework). Security Architecture and Operations: Lead strategic security planning with IT leaders, contributing to infrastructure design, application development, and disaster recovery. Establish and operationalize a Security Operations Center (SOC) for 24/7 monitoring and threat detection. Advise and assist with network and endpoint security, cloud strategy, vulnerability scanning, and incident response. Compliance and Audit: Ensure compliance with FERPA, HIPAA, GLB, PCI, and other regulations. Respond to audits and oversee remediation efforts. Vendor and Relationship Management: Manage security aspects of vendor relationships, assist with vendor compliance, and build relationships with internal and external partners, professional organizations, and agencies. Training: Develop and implement security training for faculty and staff. Incident Response and Forensics: Oversee incident response planning and investigations and assist with disciplinary and legal matters related to breaches. Governance and Strategic Initiatives: Participate in governance committees and collaborate across departments to embed data security into organizational operations. Strategic Security Roadmap: Develop and maintain a security roadmap that balances protection and recovery strategies, ensuring business continuity and resilience. Insurance and Risk Transfer: Work with Risk Management to ensure cyber insurance procurement, maintenance, and claims response. Exercises full discretion and decision-making authority in the recruitment, selection, hiring, mentoring, coaching, development & termination of staff, ensuring alignment with organizational goals, budgetary constraints, and workforce planning strategies. Drive high performance by administering the performance management process timely, setting clear expectations, conducting performance evaluations, and implementing initiatives that enhance employee engagement, motivation, and retention. Completes required Professional Development training hours as well as 16 additional leadership development hours per academic year. The intent of this job description is to provide a representative summary of the major duties and responsibilities performed by incumbents of this job and shall not be construed as a declaration of the total of the specific duties and responsibilities of any particular position. Incumbents may be directed to perform job-related tasks other than those specifically presented in this description. Position requires regular and predictable attendance. Physical Requirements Normal physical job functions performed within a standard office environment. Reasonable accommodation may be made for individuals with physical challenges to perform the essential duties and responsibilities.
    $102k-154k yearly est. 1d ago
  • Business Information Security Officer (BISO) Fortune 100 company Direct Hire

    Confidential Jobs 4.2company rating

    Security architect job in Houston, TX

    About the Role We are seeking a highly strategic and business-minded Business Information Security Officer (BISO) to serve as the primary liaison between our enterprise security organization and key business units. As a Fortune 100 company operating at global scale, we manage complex distribution and supply chain environments that require world-class security, risk governance, and operational excellence. The BISO will help shape and execute a unified security strategy that aligns with business objectives, ensures regulatory compliance, and strengthens our cyber resilience across a diverse technology and operational footprint. Key Responsibilities Strategic Security Leadership Act as the trusted security advisor to senior business leadership, translating technical risks into clear business impacts. Drive alignment between corporate security strategy and business-unit initiatives, ensuring security enables-not hinders-innovation and growth. Represent business needs within enterprise cybersecurity governance forums. Risk Management & Compliance Identify, assess, and prioritize cybersecurity risks across business units, including emerging threats to distribution operations, supply chain systems, and large-scale logistics platforms. Ensure compliance with internal policies, industry standards, and regulatory frameworks (e.g., NIST CSF, ISO 27001, SOX, PCI, data privacy regulations). Oversee remediation plans and ensure timely closure of audit and assessment findings. Program & Policy Execution Support implementation of enterprise-wide security programs (IAM, data protection, vulnerability management, cloud security, OT/ICS security, incident response). Champion best practices for secure architecture, application development, and third-party vendor management. Coordinate with IT, OT, and business operations teams to drive adoption of security controls across complex distributed environments. Incident Response & Business Continuity Liaise between business leadership and Cyber Incident Response teams during major incidents or disruptions. Ensure business units are prepared with effective response plans, communication protocols, and recovery strategies. Stakeholder Engagement & Education Build strong partnerships with executives, technology leaders, and operational teams. Deliver targeted security awareness and training for business units. Communicate risk posture and security metrics to leadership through dashboards, reports, and briefings. Qualifications Required 8+ years of experience in cybersecurity, risk management, or information security leadership roles. Proven experience supporting large-scale, distributed enterprise environments (preferably in supply chain, logistics, distribution, or retail). Strong understanding of cybersecurity frameworks, governance, and risk methodologies. Ability to interact with C-suite executives, translate complex technical issues into business language, and influence decision-making. Experience coordinating cross-functional initiatives in complex, highly regulated organizations. Preferred Experience within a Fortune 100 or Fortune 500 corporate environment. Background working with OT/ICS, distribution center technologies, or supply-chain automation systems. Relevant certifications: CISSP, CISM, CRISC, CISA, CGEIT, or similar. Bachelor's degree in Cybersecurity, Information Systems, Business, or related field; Master's degree a plus. Competencies Executive communication and presentation skills Strategic thinking with strong business acumen Ability to drive change across matrixed organizations Strong analytical, risk evaluation, and problem-solving capabilities Collaborative leadership with a focus on partnership and enablement Why Join Us? Influence security strategy at a world-class, Fortune 100 distribution leader High-visibility role with direct impact on enterprise risk posture Opportunity to shape security across cutting-edge logistics, cloud, data, and automation platforms Competitive compensation, comprehensive benefits, and career growth at a global scale
    $103k-138k yearly est. 1d ago
  • Application Security Engineer

    Akkodis

    Security architect job in Austin, TX

    Akkodis is seeking a Application Security Engineer (Hybrid)) for a contract job in Location: Austin, TX Job Title: Application Security Engineer Duration: 6 months Pay range: Pay Range: $58/hr - $60/hr on W2 The rate may be negotiable based on experience, education, geographic location, and other factors. Perform manual web application and mobile penetration testing. Identify, validate, and prioritize vulnerabilities, delivering actionable remediation and migration recommendations. Conduct code assisted reviews, architecture assessments, and threat modeling exercises. Research emerging vulnerabilities, exploit techniques, and security technologies to proactively improve defenses. Develop and deliver clear, comprehensive reports and presentations for technical and non-technical audiences. Assess and secure applications and services that incorporate AI/ML models or LLM-based functionality. Evaluate AI system components (data inges4on, model APIs, inference endpoints) for security and privacy risks. Job Requirements: 6+ years of experience as an Application Security Engineer, Principal Security Consultant, or Senior Penetration Tester in an enterprise environment. Proven experience manually testing web applications and performing enterprise-level penetration testing. Strong understanding of Web and Mobile application security testing, methodologies, and common vulnerabilities. Proficiency in at least one scripting language (Python, Perl, Ruby, PHP) and one programming language (Java, Objective-C). Proficiency with Mac OS X or UNIX Linux systems. General understanding of secure network architecture and design, including segmentation, ACLs, and secure communication protocols. General knowledge of common web technology stacks (LAMP, LEMP, MEAN, etc.) and their associated security considerations. General understanding of AWS services (EC2, S3, KMS, RDS) and security best practices relevant to those services. Ability to explain basic networking concepts (routing, load balancing, SSLTLS, TCPIP) to support secure application architecture reviews. Ability to ascertain and clearly articulate the size and scope of security assessments and penetration testing engagements. Solid understanding of the OWASP Top 10 and CWE Top 25 vulnerabilities (e.g., XXE, XSS, SQLi, SSRF). Strong communication skills both written and verbal with the ability to convey complex technical issues to diverse audiences. Demonstrated passion for continuous learning, vulnerability research, and staying ahead of evolving threat landscapes
    $58 hourly 5d ago
  • Senior Security Engineer - Privileged Access Management

    Glocomms 4.3company rating

    Security architect job in Dallas, TX

    Glocomms is partnered with an integral financial services corporation seeking a Security Engineer focused on Privileged Access & Automation to design and maintain secure authentication, authorization, and secrets management systems across on-prem and cloud environments. This role focuses on privileged access management, security architecture, and automation, leveraging AI-based capabilities to ensure operational integrity and compliance. Responsibilities Implement and manage privileged access systems (CyberArk, HashiCorp Vault) and secrets lifecycle management. Design and support authentication/authorization frameworks (Active Directory, oAuth 2.0, OIDC, AWS IAM, PKI, certificates). Maintain operational integrity through patching, version control, upgrades, troubleshooting, and break-fixes. Apply security as code principles using Terraform, Ansible, Jenkins pipelines, and CI/CD deployments. Develop automation scripts in Go, Bash, Python, PowerShell for secure integrations. Integrate AI-based security capabilities for detection, remediation, and automated workflows. Collaborate cross-functionally with engineering, cloud, and compliance teams; participate in 24x7 operational support. Qualifications 5+ years in security engineering, architecture, or operations within complex environments. Hands-on experience with CyberArk, HashiCorp Vault, PKI, and privileged access methodologies. Strong knowledge of Active Directory, Kerberos, LDAPS, oAuth 2.0, OIDC, and AWS IAM. Familiarity with Kubernetes security, HSMs, and cloud ecosystems. Proficiency in Go, Bash, Python, PowerShell; experience with Terraform, Ansible, Jenkins. Understanding of security architecture principles, confidentiality, integrity, availability, and compliance frameworks. Exposure to AI-enabled security tools and automation strategies preferred. This is a hybrid role requiring 3 days per week onsite in Dallas, TX. Candidates must be fully authorized to work in the United States. Unfortunately, visa sponsorship is not available for this role. Applications must include candidate's full name (first and last) and contact information in order to be considered.
    $101k-135k yearly est. 2d ago
  • AI Security Engineer

    Veritis Group Inc.

    Security architect job in Plano, TX

    AI Security Engineer (Generative AI Focused) Plano, Texas, United States Contract We're looking for an experienced AI Security Engineer to join us, someone skilled in both artificial intelligence (AI) and cybersecurity. This role focuses on ensuring the security and integrity of AI systems and applications. Requirements Qualifications to be Successful: Strong understanding of AI technologies and security vulnerabilities. Experience with machine learning, neural networks, and AI methodologies. Knowledge of cybersecurity principles, frameworks, and standards. Proficiency in Python or R, common languages used in AI. Minimum Qualifications: Bachelor's degree in computer science, information security, or related field (advanced degree preferred). 3+ years of cybersecurity experience, with a focus on securing AI systems. Strong understanding of machine learning techniques, algorithms, and AI frameworks. Familiarity with cybersecurity standards, regulations, and compliance requirements. Hands-on experience with security tools and technologies. Proficiency in programming languages used in AI development. Excellent analytical, communication, and interpersonal skills. Relevant certifications such as CISSP, CISM, CEH, or GIAC are beneficial. Experience with cloud computing and containerization technologies is desirable. Thanks, Vikas. ************************
    $80k-110k yearly est. 3d ago
  • Security Engineer-ONLY W2(No C2C)

    VSIT LLC

    Security architect job in Plano, TX

    We are seeking a highly skilled Security Engineer with hands-on experience working with Transmit Security's Mosaic SaaS Tool and Flex ID. The ideal candidate will be responsible for designing and implementing seamless and secure identity journeys, leveraging state-of-the-art Passwordless and frictionless authentication capabilities. Key Responsibilities Design and implement identity user journeys using Transmit Security's Mosaic SaaS Tool. Deploy and configure Flex ID to enable passwordless, frictionless identity experiences. Collaborate with security architects, developers, and product teams to integrate authentication flows into web and mobile applications. Ensure robust identity and access management (IAM) implementations using industry best practices. Leverage protocols and standards such as SSO, MFA, OAuth2, OpenID Connect, and SAML to orchestrate secure identity flows. Monitor, troubleshoot, and optimize identity workflows for performance and security. Document technical solutions and provide knowledge transfer to internal teams. Required Qualifications ✅ Proven experience building and optimizing authentication workflows with Transmit Security's Mosaic platform. ✅ Hands-on expertise with Flex ID for enabling passwordless and frictionless identity verification. ✅ Strong understanding of IAM concepts, including SSO, MFA, identity federation, and orchestration. ✅ Demonstrated ability to work in cross-functional teams, solving complex technical problems collaboratively. ✅ Experience with identity protocols: OAuth2, OIDC, SAML, etc. ✅ Strong communication and documentation skills. Preferred Qualifications Experience integrating identity services with CI/CD pipelines or DevOps environments. Familiarity with customer identity and access management (CIAM) and privacy regulations (e.g., GDPR, CCPA). Background in cybersecurity, software engineering, or cloud architecture.
    $80k-110k yearly est. 2d ago
  • Cloud Security Engineer - SRE

    Intelliswift-An LTTS Company

    Security architect job in Frisco, TX

    Job Posting Title: Cloud Security Engineer - SRE We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation. Technical Skills • Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling. • Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations. • Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure. • Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions. • Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift). • Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs. • Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs. • Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI. • A strong understanding of HashiCorp Vault and Terraform will make you stand out. 2. Problem-Solving and Troubleshooting • Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews. • Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error. • Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications. 3. Collaboration and Communication • Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams. • Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports. • Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences. 4. Reliability and Scalability • Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability. • Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands. • Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime. 5. Security and Compliance • Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices. • Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry. Minimum Job Qualifications: • Bachelor degree in business or equivalent work experience • 10 years of previous program leadership and/or relevant consulting experience • Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle • 5+ years' experience in driving large scale data center consolidation efforts • Minimum 5 years' experience with matrix management of cross-functional processes and teams • Proficient with Project Management tools
    $80k-109k yearly est. 4d ago
  • Senior Information Security Analyst

    The Intersect Group 4.2company rating

    Security architect job in Plano, TX

    The Senior InfoSec GRC Analyst is responsible for driving the development, implementation, communication, and maintenance of technology policies, standards, and procedures that are aligned to industry standards and regulatory requirements. This role ensures that technology processes adhere to regulatory requirements, manage risks effectively, and establish strong governance practices. The position also develops and implements controls, monitors compliance, and supports risk management activities. Responsibilities: Lead the development and implementation of comprehensive cybersecurity and IT policies, standards, and guidelines. Continuously evaluate and update cybersecurity and IT policies to ensure they remain current and effective. Ensure policies comply with relevant laws, regulations, and industry standards (e.g., NIST, FFIEC, GLBA, NYDFS, SOX, PCI-DSS). Collaborate with cross-functional teams, including IT, legal, compliance, and business stakeholders, to ensure cybersecurity policies align with organizational objectives. Translate complex information and documentation into clear and simple concepts for end-users. Provide specialized expertise to perform framework-oriented risk assessments, identify deficiencies, generate reports, and recommend actionable solutions to mitigate risks and strengthen overall security posture. Stay informed about the latest cybersecurity threats, trends, and best practices. Maintain accurate and up-to-date records of policy reviews, risk assessments, training activities, and incident responses. Benchmark policies against industry standards and best practices. Develop and implement governance frameworks for cybersecurity policy management. Monitor key performance indicators, conduct gap analyses and risk assessments, and implement frameworks as needed. Test and monitor the effectiveness of controls. Establish feedback loops and analyze metrics to continuously improve cybersecurity policies based on audit findings, incident reviews, and emerging threats. Lead and support internal and external audits and assessments of cybersecurity policies and practices. Ensure identified audit and assessment findings and actions are tracked to closure. Maintain comprehensive documentation of all cybersecurity policies, procedures, and related activities. Communicate policy requirements and updates to relevant stakeholders. Identify opportunities for innovation and improvement in cybersecurity policies and practices. Propose mitigation strategies and verify the effectiveness of remediation plans. Requirements: Bachelor's Degree in Information Security, Computer Science, Information Technology, or a related field (preferred). Minimum of six (6)+ years' experience working in Cybersecurity GRC, policy development, risk management, or a similar field. Experience with GRC tools (e.g., Archer, ServiceNow, OneTrust). Proficiency with data analysis and reporting tools (e.g., Excel, Power BI). Relevant certifications such as CISM and/or CISA (highly desirable). Strong knowledge of regulatory frameworks (NIST, FFIEC, GLBA, NYDFS, SOX, PCI-DSS). Understanding of risk management concepts, control frameworks, and compliance auditing. Ability to provide consultation and recommendations to management. Strong communication skills with the ability to present effectively to both technical and non-technical audiences.
    $86k-114k yearly est. 2d ago
  • Cloud Security Engineer

    Searchworks

    Security architect job in Dallas, TX

    An exciting opportunity for an experienced Cloud Security Engineer to join a global SaaS company, in a hyper growth stage. This is a crucial customer-facing role where you will be instrumental in designing, implementing, and securing complex cloud environments for clients across Google Cloud Platform (GCP), Microsoft Azure, and Amazon Web Services (AWS). Key Responsibilities: Cloud Security Operations Perform penetration testing activities Network Security Expertise Firewall & WAF Management SaaS Security Best Practice SIEM Integration & Optimization Customer Engagement & Presentation Requirements: 8+ years of cybersecurity experience 4+ years cloud security engineering Strong expertise with Google Cloud Platform (GCP) Strong practical experience with Microsoft Azure and AWS Expertise in SaaS applications Demonstrable experience with firewall management and WAFs Hands-on experience with SIEM platforms CISSP Certified
    $80k-110k yearly est. 5d ago
  • Azure Cloud Security Engineer-- SHUDC5697491

    Compunnel Inc. 4.4company rating

    Security architect job in Dallas, TX

    Job Title: Azure Cloud Security Engineer - W2 only - we can provide sponsorship as well Duration: Long Term Top Skills: Azure Policy Exp Azure Security Services - Security Center, Key Vault, Log Analytics Identity and Access Management Exp Prior Software Engineering background, any language is fine but someone coming from a Sys Admin/Devops background won't be the right fit here. The Expertise and Skills You Bring 8+ years of experience in IT infrastructure, security, compliance A strong understanding of Azure services and security capabilities Solid hands-on experience with at least two of the following: Engineering/operational support of cloud account configuration in AWS or Azure Software Development, Linux Systems Administration, Data Networking Hands-on configuration of CI/CD pipelines for cloud-native deployments Very strong with scripting languages, including integration with CSP APIs; python preferred Azure Networking Identity and Access Management - RBAC Azure Policies Azure Security Services - Security Center, Key Vault, Log Analytics Azure ARM/PowerShell Ability to work with application and security teams to promote a secure posture in the cloud You can mentor and train other team members to work effectively in the cloud You are a self-starter who can independently by reading technical documentation Bonus skills Advanced Azure Certifications
    $79k-101k yearly est. 1d ago
  • Platform Cloud Architect

    Arcus Search 3.9company rating

    Security architect job in Dallas, TX

    I am currently working with a business who are looking for a Cloud Platform Architect to define and drive a secure, efficient, and scalable hybrid multi-cloud strategy. The role designs multi-tenant architectures including landing zones, access brokering, and hybrid networking, and works with Cloud Engineering to shape the service roadmap and enable automation and self service through IaC. This business are looking for someone with extensive experience in AWS architecture and services, as well as being hands on with multi-tenant cloud designs. Job Title: Cloud Platform Architect Location: Dallas Texas, Hybrid Salary: $200,000 - $280,000 If keen please apply!
    $71k-116k yearly est. 2d ago
  • SAP DM and EDM Architect

    Resolve Tech Solutions 4.4company rating

    Security architect job in The Woodlands, TX

    Under the IT Applications Meter to Bill department, this position will be responsible for leading the innovative development of business solutions, implemented through IT, to enable the business to meet its objectives. The role, together with support from Entergy's Enterprise Architect (EA) function and IT Business Analyst (BA) are responsible for creating a fully integrated, effective business solution. The role is an active thought leader and application visionary who shapes the technology demand among the business unit. The role requires an in-depth understanding of available IT technologies, the business unit's operations, its operating model, capability needs, and business challenges. The role also requires an in-depth knowledge and understanding of Customer System technologies with a special emphasis on SAP, the business unit's operations, its operating model, capability needs, and business challenges. The team member will be principally responsible for the solution architecture, design, and support of Entergy's Customer System application portfolio, including but not limited to the architecture and design of systems associated with SAP Industry Solution for Utility (IS-U), SAP HANA, AMI experience, and integration with MDMS or other meter reading applications. The team member must have SAP IS-U experience with a key focus in SAP Device Management (DM) and SAP Energy Data Management (EDM). This position will report directly to the IT Service Delivery Manager for Meter to Bill, who is principally focused on business application solution delivery. JOB DUTIES/RESPONSIBILITIES: Serve as the primary technical SME for their assigned area(s)/domain(s), including: Serve as a technical expert/consultant to business stakeholders, business clients, Program Managers, BAs, peer SAs, and vendors Support technology and/or application road mapping based on business strategies, capabilities, and requirements Support Lifecycle Road mapping for standard Entergy technology and applications Work with EA to evaluate emerging trends and technologies Adopt Industry and domain best practices Support Point of Views and Proof of Concepts Provide application integration expertise Provide code fixes, perform configuration changes and coding changes for minor enhancements Provide technical support as needed Perform analysis and design for incidents, service requests, and application enhancements in the DM and EDM functional areas of Entergy's SAP IS-U system. Work closely with business resources to explain SAP system functionality, to understand issues when reported, to gather effective system requirements for enhancements, and to ensure that SAP systems are supporting business needs Responsible for management and delivery of application support work in DM, EDM and their integration to billing, AMI technology, and other areas of Entergy's SAP IS-U system. Serve as Entergy's technical lead on assigned projects, including: Support annual project portfolio planning Perform IT estimation during the Business Case phase Conduct Complexity Assessment to determine proper level of Solution Development Lifecycle (SDLC) rigor Support the solution sourcing and selection process (e.g., Requests for Proposals and Statements of Work processes) Enforce adherence to EA standards Provide technical oversight to vendor services and solutions delivery Create Solution Design (i.e., Conceptual, Logical and Physical) Maintain Requirements Traceability Matrix as established by the BA Support all project execution phases (i.e., Initiation, Definition, Design, Construction, Test, and Deployment) Minimum experience required of the position Solution Architect, Sr: At least 10 years of experience working with technology and how it supports the business. Experience working with Customer System solutions is a plus. SAP IS-U and HANA experience is required. At least 5 years of SAP Device Management (DM) and SAP Energy Data Management (EDM) support experience. Ability to program using ABAP code is required. Minimum knowledge, skills and abilities required of the position Hands on knowledge of implementing DM and EDM related enhancements Have a strong understanding of DM, EDM and their integration to Billing processes. AMI Experience (interfacing CCS with MDMS to accept reads from MDMS) Strong understanding with connecting CCS to MDMS to obtain Billing Determinants Deep understanding and practical experience of industry solutions Working knowledge in all areas of technology (infrastructure, commercial applications, software development, end-user platforms, IT operations). Planning experience, especially the design of longer-term strategies. Ability to communicate and present effectively with all levels in the organization, including executive management. Excellent interpersonal communications skills. Excellent writing and presentation skills. Working knowledge of architecture concepts and the ability to integrate business needs and technology capabilities. Any certificates, licenses, etc. required for the position SAP certifications are a plus. ABAP certifications are a plus.
    $84k-112k yearly est. 5d ago
  • Amazon Connect Architect - Advanced

    The Judge Group 4.7company rating

    Security architect job in Plano, TX

    About the Role We are seeking a highly skilled Contact Center Architect to lead the onboarding and implementation of Amazon Connect for enterprise-level operations. This is a senior-level role requiring deep expertise in cloud-based contact center solutions and infrastructure architecture. Key Responsibilities Design and implement Amazon Connect solutions for enterprise contact center environments. Develop and maintain Infrastructure as Code (IaC) for scalable deployments. Collaborate with cross-functional teams to integrate contact center technologies with existing systems. Provide architectural guidance and best practices for VoIP and cloud telephony solutions. Must-Have Skills Amazon Connect (expert-level experience) Python scripting for automation Infrastructure as Code (IaC) Nice-to-Have Skills ServiceNow integration Terraform for IaC Contact Center technologies and VoIP experience
    $93k-134k yearly est. 4d ago
  • SAP QM Architect

    KTek Resourcing 4.1company rating

    Security architect job in Dallas, TX

    SAP QM Architect Role Type: Contract Implementation Partner: HCL America Visa - USC only Job Description: SAP QM consultant with experience range 15- 20 years. Configuration expert in SAP QM PP modules. Can facilitate the implementation and support of SAP Quality Management. Industry experience of aerospace defense or automobile would be nice to have. Exposure to the FIORI applications and S4HANA application would be preferred. Mandate experience on inspection type origin 0304. Hands on with QMMM, PPQM integration. Experience in complex assembly manufacturing preferred. Capable of requirement gathering, building functional specifications. Guide ABAP developer on the solution and test with business acumen. Sum up the business requirement into the business process and help breakdown those into the items to be built from development perspective. At least 23 SAP implementation project experience preferred in both production planning Quality module. SAP consultant with experience in Quality notification, Quality Inspection, Business workflow area. Hands on with SAP quality notification business workflow is a plus. Hands on experience on Quality management with procurement end inspection Origin 01. Must be results oriented, and demonstrate a can do attitude - adaptability, flexibility, and resourcefulness
    $72k-118k yearly est. 3d ago
  • IAM Architect

    Hcltech

    Security architect job in Frisco, TX

    Core Responsibilities: Responsible for leading and creating Identity & Access Management (IAM) technical architectures. Components include solutions for authentication, authorization, identity provisioning, role based access control, physical security, and audit and monitoring solutions. Responsible for ensuring appropriate collection and analysis of technical requirements based on critical client IAM use cases and expectations. Responsible for generating client delivery documentation such as technical requirement specification, use cases, architecture Visio diagrams, brain maps, technical strategy presentations, High level design and low level design. Responsible for the development and implementation of the technical IAM organization-wide strategies, roadmap, etc. Responsible for participating in and analyzing results of client Advisory engagements for identifying critical technical components and strategies required for successful implementation of IAM roadmaps and gap remediation. Demonstrate the capabilities in understanding the clients' business environment and map the requirements into IAM solutions and proactively suggest alternatives as and when required Ensures prioritization of technical efforts and consultant staff toward development and delivery of critical client outcomes. Works closely with project manager and engagement manager to identify key IAM technical requirements, prioritize requirements, catalog requirements, and assign them to project use cases and sprints. Conducts in depth technical IAM research, assessments and performance analysis to support and design technical IAM strategies for “Do Now”, “Do Next”, and “Do Later” client objectives. Provides effective training and mentoring to all team members to maximize leadership and consulting effectiveness, learning and overall project team productivity. Capable of performing the IAM Architect or IAM Engineer role on client engagements. Guide the team in trouble shooting the issues faced during the product implementation. Making use of the product OOTB (out of the box) functionality to implement the business requirement and also product SDK's, etc. for custom development to address all technical & business requirements. Communication with implementation/integration team to clarify detailed requirements Handling communication with the product vendor to resolve any product bug and SRs Play active role in the execution of the project and demonstrate strong technical leadership Demonstrate a general knowledge of market trends and competition Be a strong team player Required Skills: Experience in building Identity and Access Management Architecture (logical, physical, etc.) using multi-vendor tools that are deployed globally for large customers Experience in assessing the existing environment, understanding the gaps, developing IAM strategies and roadmap for complex environments Implementation and Design experience for complex IAM solutions for large scale customers across various industry verticals Excellent written and oral communication skills with aptitude for delivering high quality documentation Should have architected and implemented high volume identity management systems with complex business processes covering use cases like user lifecycle management, strong authentication, risk based authentication, identity and access governance, federation, etc. Experience in multiple IAM products and across key Access Management areas like SSO, Strong Authentication, Multi-Factor Authentication, Risk Based Authentication, etc. Experience in customizing IAM products to build solutions tailored to customer requirements Experience with integration of multi-vendor IAM products Exposure to key tools & technologies related to IAM - LDAP, Virtual Directory Services, Multi Factor Authentication tools, web services, programming languages, etc. Onsite development experience at client location and excellent understanding and implementation using onsite/offshore, complete offshore and offsite models Very good understanding of information security concepts with in-depth knowledge of IAM solutions and latest trends. Experience in Architecting, Designing and Implementation of at least one vendor from each of the following technologies: - Identity Management: SailPoint IIQ, Identity Now, Saviynt, ForgeRock, OKTA etc Access Governance: SailPoint IIQ, Identity Now, Saviynt, ForgeRock, OKTA etc Experience in all phases of the project lifecycle, including design, configuration, testing, debugging and implementation. Exposure to a variety of programming languages and technologies, including, but not limited to, J2EE (JSP, Servlets, EJB, XML, Java), .Net, Oracle, DB2, and MS/SQL Experience in working with IIS, Apache Web Servers, Application Servers (WebLogic, Websphere) or developing J2EE products. Experience and exposure in RBACx, Compliance solutions, Access certifications solutions is an added advantage Excellent communication skills and ability to work with global counterparts. Excellent understanding of governance, risk and compliance requirements. Qualifications: 12+ years of experience in IAM domain At least 5+ years of experience in IAM Architecture and Design 7+ years of strong IAM implementation experience Bachelors or Master degree in IT / CS or related fields CISSP, TOGAF, etc. certification will be an advantage Disclaimer HCL is an equal opportunity employer, committed to providing equal employment opportunities to all applicants and employees regardless of race, religion, sex, color, age, national origin, pregnancy, sexual orientation, physical disability or genetic information, military or veteran status, or any other protected classification, in accordance with federal, state, and/or local law. Should any applicant have concerns about discrimination in the hiring process, they should provide a detailed report of those concerns to ****************** for investigation. Compensation and Benefits A candidate's pay within the range will depend on their work location, skills, experience, education, and other factors permitted by law. This role may also be eligible for performance-based bonuses subject to company policies. In addition, this role is eligible for the following benefits subject to company policies: medical, dental, vision, pharmacy, life, accidental death & dismemberment, and disability insurance; employee assistance program; 401(k) retirement plan; 10 days of paid time off per year (some positions are eligible for need-based leave with no designated number of leave days per year); and 10 paid holidays per year.
    $65k-105k yearly est. 4d ago
  • Kafka SME Architect (Endur)

    Market Street Talent, Inc.

    Security architect job in Houston, TX

    Could you be a good fit? We are looking for the best, highly skilled Kafka Subject Matter Expert (SME) to join the team of our exceptional client. This role focuses on managing integrations and interfaces with third-party systems, with deep technical expertise in Apache Kafka and experience integrating with Endur. This position requires hands-on Kafka experience, strong programming skills, and the ability to troubleshoot, optimize, and maintain reliable, scalable, and secure data streaming solutions. Benefits: • Hybrid or onsite schedule • Healthcare Medical, Dental, and Vision Insurance • 401k What will your day look like? As a Kafka SME, you will: • Design, implement, and maintain Kafka-based integration solutions for real-time and batch data exchange. • Develop and manage interfaces between Kafka and third-party systems to ensure reliability, scalability, and security. • Integrate Kafka with Endur, leveraging knowledge of its tables and common integration patterns. • Troubleshoot and optimize Kafka clusters, topics, and consumer/producer configurations. • Ensure high availability and fault tolerance across Kafka environments. • Collaborate with architecture and development teams to define best practices for data streaming and integrations. • Provide technical guidance and mentorship on Kafka-related projects. You will be a good fit for the Kafka SME role if you have: • Bachelor's or Master's degree in Computer Science, IT, or related field (or equivalent experience) • Strong hands-on experience with Apache Kafka, including cluster setup, configuration, and performance tuning • Proven experience building and managing integrations with third-party systems using Kafka • Experience integrating with Endur, with understanding of its database tables and integration patterns • Solid understanding of data streaming concepts, event-driven architecture, and messaging systems • Proficiency in Java, Python, or similar programming languages for Kafka client development • Familiarity with schema management (Avro, Protobuf), Kafka Connect, and Kafka Streams • Knowledge of monitoring and troubleshooting Kafka with tools like Confluent Control Center, Prometheus, or Grafana • Strong problem-solving skills and ability to work in a fast-paced environment Nice-to-Haves: • Experience with cloud-based Kafka deployments (AWS MSK, Confluent Cloud, etc.) • Knowledge of CI/CD pipelines and DevOps practices for Kafka deployments • Familiarity with energy trading systems and related integration patterns About Market Street Talent We are a specialized staffing and consulting firm focused on IT and technology positions. Our deep industry knowledge allows us to match exceptional candidates with organizations where they can thrive and make an immediate impact. Our Vision: To promote and foster the growth of information technology (IT) in our world-one candidate, one client, one community at a time. Our Goal: To guide clients and candidates through the placement process and build long-term, successful relationships. Our Culture: At MST, we value excellence, respect, and empathy in everything we do. Sound like you? Ready for your next challenging IT opportunity? Click “Apply Now”!
    $65k-105k yearly est. 2d ago
  • eCommerce Architect

    GBIT (Global Bridge Infotech Inc.

    Security architect job in McKinney, TX

    Job Title: eCommerce Architect Employment Type: Full-time Job Details We are seeking an experienced eCommerce Architect to design and deliver scalable, modern, and high-performing digital commerce solutions across web, mobile, and cloud environments. The ideal candidate will have deep expertise in eCommerce platforms and modern technology stacks, with a passion for building composable architectures that drive performance, scalability, and reliability. Responsibilities: Design and implement end-to-end eCommerce architectures leveraging cloud-native and composable technologies. Collaborate with product, engineering, and business teams to define and implement digital commerce strategies. Integrate diverse systems, platforms, and APIs to ensure seamless interoperability and customer experience. Drive best practices for scalability, performance optimization, and system reliability. Provide technical leadership across eCommerce initiatives, ensuring alignment with enterprise architecture standards. Lead the evaluation and adoption of emerging digital commerce technologies. Ensure CI/CD pipelines and DevOps practices are effectively implemented for continuous delivery and deployment. Skills & Technologies: Strong experience in React, Next.js, Node.js, and Azure. Deep understanding of APIs, Microservices, and Cloud-native architectures. Hands-on experience with Adobe Commerce (Magento) or similar enterprise eCommerce platforms. Familiarity with CI/CD, DevOps, and modern software development methodologies. Strong understanding of front-end and back-end system integration. Excellent problem-solving and analytical skills with the ability to work in a fast-paced, collaborative environment.
    $65k-105k yearly est. 3d ago

Learn more about security architect jobs

How much does a security architect earn in Bryan, TX?

The average security architect in Bryan, TX earns between $82,000 and $179,000 annually. This compares to the national average security architect range of $92,000 to $179,000.

Average security architect salary in Bryan, TX

$122,000
Job type you want
Full Time
Part Time
Internship
Temporary