Security architect jobs in Greensburg, PA - 56 jobs
All
Security Architect
Security Engineer
Senior Security Engineer
Network Security Architect
Cyber Security Specialist
Security System Engineer
Senior Security Analyst
Information Security Engineer
Senior Security Architect
Information Security Manager
Securities Research Analyst
Cyber Security Specialist
First National Bank of Pennsylvania 3.7
Security architect job in Pittsburgh, PA
Primary Office Location:626 Washington Place. Pittsburgh, Pennsylvania. 15219.Join our team. Make a difference - for us and for your future.
Cyber Security Specialist
Business Unit: Risk Management
Reports to: Manager of Cyber Security
Position Overview:
This position is primarily responsible for performing all procedures necessary to ensure the safety of information systems assets and protecting systems from intentional or inadvertent access or destruction under the supervision of the Manager of Cyber Security. The incumbent demonstrates the ability to develop IT security standards and procedures, has demonstrated knowledge and understanding of IT industry trends and emerging technologies and an ability to relate them to the corporation and it's objectives.
Primary Responsibilities:
Investigates, escalates and documents cyber security events or incidents according to standard operating procedures (SOP), as needed. Writes comprehensive reports of incident investigations.
Evaluates and improves Security Information and Event Management (SIEM) rule set based on threat and vulnerability indicators.
Analyzes information from variable threat sources and provide necessary awareness to management, IT and impact business areas.
Tracks remediation of identified issues based on incident investigations.
Utilizes forensic resources to understand event impacts and generates incident reports.
Assists management in preparation of reports of current threats.
Uses PowerShell scripting or other programming languages to automate tasks.
Leverages various toolsets to gain awareness of potentially suspicious activity and alerts to threats, intrusions and/or compromises.
Performs other related duties and projects as assigned.
All employees have the responsibility and the accountability to serve as risk managers for their businesses by understanding, reporting, responding to, managing and monitoring the risk they encounter daily as required by F.N.B. Corporation's risk management program.
F.N.B. Corporation is committed to achieving superior levels of compliance by adhering to regulatory laws and guidelines. Compliance with regulatory laws and company procedures is a required component of all position descriptions.
Minimum Level of Education Required to Perform the Primary Responsibilities of this Position:
BA or BS
Minimum # of Years of Job Related Experience Required to Perform the Primary Responsibilities of this Position:
3
Skills Required to Perform the Primary Responsibilities of this Position:
Excellent communication skills, both written and verbal
Excellent customer service skills
Excellent project management skills
Detail-oriented
Strong security background in network/systems/physical security, authentication, authorization and usability. Comprehensive knowledge of the OSI model. Working knowledge of packet collection and analysis tools.
Licensures/Certifications Required to Perform the Primary Responsibilities of this Position:
Valid Drivers License
CISSP, Security+, Network+, GCIA, GCIH, CEH, CISM, CSX
Physical Requirements or Work Conditions Beyond Traditional Office Work:
Heavy Lifting over 45 lbs.
Equal Employment Opportunity (EEO):
It is the policy of FNB not to discriminate against any employee or applicant for employment because of his or her race, color, religion, sex, sexual orientation, gender identity, national origin, disability status, or status as a protected veteran. FNB provides all applicants and employees a discrimination and harassment free workplace.
$86k-120k yearly est. 4d ago
Looking for a job?
Let Zippia find it for you.
Cloud Security Architect - Manager
Deloitte 4.7
Security architect job in Pittsburgh, PA
Are you interested in working in a dynamic environment that offers opportunities for professional growth and new responsibilities? If so, Deloitte & Touche LLP could be the place for you. Traditional security programs have often been unsuccessful in unifying the need to both secure and support technology innovation required by the business. Join Deloitte's Cloud Cyber Services team and become a member of the largest group of cybersecurity professionals worldwide.
Recruiting for this role ends on 03/01/2026
Work You'll Do
As a Cloud SecurityArchitect (Manager), you will play an integral role in defining and assessing the client organization's cloud security strategy, architecture and practices. This individual's primary function is to provide cloud security planning, deployment and review expertise to project teams and client organizations in the Cyber space. Responsibilities include:
* Lead the overall delivery of Cloud Cyber Risk projects in a project manager and or architect role, overseeing the activities of onsite and offshore engineers and architects across 8 key cyber domains: Governance, Identity, Application Security, PaaS security, Infrastructure security, Security Monitoring, Resilience and Data protection
* Assist in business development activities such as defining scope of services, building resource estimates and related pricing, packaging proposals and supporting the delivery of the proposal to the client for AWS, GCP, Azure and/or Oracle Cloud services
* Function as the primary client day to day interface building rapport and trust with the client
* Function as an expert in CNAPP, CWPP and CSPM technologies and security risk frameworks relevant to cloud as well as the industry leading benchmarks
* Review and oversee the generation of all project deliverables such as assessment reports, system designs/ architectures and risk/security recommendations
* Assist clients with security frameworks, cloud configuration standards and resolving cloud vulnerabilities
* Lead the execution of cloud security engagements during different phases of the lifecycle - assess, design, and implementation.
* Lead engagements to perform technical health checks for cloud platforms/environments prior to broader deployments.
* Oversee technical support for AWS, GCP, Azure and/or Oracle cyber services and resolve service-related issues through research and troubleshooting and working with vendors.
* Conduct cloud security analysis, recommendations and configurations of prospective clients' platforms and environments based on Deloitte's Cloud Cyber Risk Framework.
* Perform technical health checks for these cloud platforms/environments prior to broader deployments including DevSecOps and CI/CD pipelines
* Assist clients with transitions to using cloud services such as tenant setup and service configuration, focused on cloud cyber risk mitigation. Additional technologies include: MFA, SSO, Conditional Access, PIM, Security Operations tooling and scanning solutions
* Assist clients with the deployment of third-party technologies to assist in securing the cloud platform such as firewall, WAF, PAM and cloud workload protection.
* Assist clients with configuration and delivery of cloud security and compliance reports.
* Provide technical support for AWS, Azure, GCP, Oracle, Wiz, Snyk and third-party security services and resolve service-related issues through research and troubleshooting and working with third-party vendors.
* Implementation of industry leading practices around Azure, AWS, GCP, Wiz, Snyk and cloud security services for clients.
* Designing and developing cloud-specific security policies, standards and procedures e.g., tenant, management group and subscription management and configuration, identify management and access control, firewall management, auditing and monitoring, security incident and event management, data protection (DLP, encryption), user and administrator account management, SSO, conditional access controls and password/key management.
* Troubleshooting system level problems in a multi-vendor, multi-protocol network environment.
* Documenting platform technical issues, analysis, client communication, and resolution as part of cyber risk mitigation steps.
* Executing on cloud security engagements during different phases of the lifecycle - assess, design, and implementation & post-implementation reviews.
* Implementing industry leading practices around cyber risks and cloud security for clients.
* Provide internal cloud and DevSecOps security technical training to Advisory personnel as needed.
* Acting as a subject matter specialist on cloud cyber risk for the cloud platforms.
* Manage to Point-of-Views (PoVs) on providing leading practices to our clients on the cyber challenges they face.
* Contribute to eminence activities, such as whitepapers pertaining to cloud security capabilities.
* Support talent process in the manager role such as for recruiting and coaching.
The team
Deloitte's Cloud Cyber Risk team helps complex organizations more confidently pursue their growth, innovation and performance agendas through proactive management of the associated cyber risks. Our professionals provide advisory and implementation services that integrate risk, regulatory, and technology skills to help clients transform their legacy programs into proactive Secure.Vigilant.Resilient.TM cyber risk programs. Join the team developing the future state of cyber risk solutions.
Qualifications:
* 6+ years of experience in technical consulting, client problem solving, architecting and designing solutions in a consulting role with project leadership and/or architect experience in AWS, GCP, Azure, Oracle, Wiz and/or Snyk; with a security focus strongly preferred
* 2+ years of hands-on technical experience designing and implementing security solutions for leading Cloud service providers across SPI models and environments (Public, Private, Hybrid)
* 2+ years working experience designing cloud securityarchitectures and strategies for enterprises
* 2+ years working with Cloud security industry standards such as Cloud Security Alliance (CSA), ISO/IEC 27017 and NIST CSF
* 2+ years working experience with Cloud security technologies/vendors (e.g., IAM, SIEM, IDS) and/or providers (e.g., Okta, CipherCloud, AlertLogic), a big plus
* 2+ years working with Cloud orchestration and automation (Continuous Integration and Continuous Delivery (CI/CD)) in single and multi-tenant environments
* 3+ years working with CNAPP, CSPM or CWPP technologies or planning for large-scale deployments of these technologies
* BA/BS Degree preferably in a Technical field (ex. Computer Science, Cyber Security, Information Security, Engineering, Information Technology)
* Maintain strong domain knowledge of multi-hyperscaler cloud solutions and security concepts and technologies
* Experience with and leading use of leading cyber tooling for cloud such as Wiz and Snyk
* Limited sponsorship may be available
Required:
* Locations include: Houston, Dallas, Cleveland, Detroit, St. Louis, Pittsburgh, Boston, Charlotte, Atlanta, Miami, Memphis, Denver, Phoenix, Salt Lake City, Los Angeles, San Diego, San Franciso, Seattle. Must be within a reasonable commute and willing to work part-time in the Deloitte and/or client offices
* Ability to travel up to 80%, on average, based on the work you do and the clients and industries/sectors you serve
Preferred:
* Previous Consulting or Big 4 experience preferred.
* Industry or Vendor Security Certifications such as CCSP or other cloud architect domains
* Experience with Virtualization including security for at least one or more of the following: Compute, Network, Storage, End-point, Application
* Experience designing IAM technologies and services
* Experience or strong working knowledge of managing enterprise security infrastructure and perimeter security appliances - e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), endpoint protection, SIEM and log management technology
* Experience with Azure data, analytics, or AI/ML services (Azure SQL, HDInsight, Databricks, Data Factory, Data Lake Storage, Azure Analysis Services, Synapse Analytics, Azure Machine Learning, etc.)
* Understanding of industry security standards, guidelines and regulatory/compliance requirements related to information security and cloud computing such as ISO 27001, ISO 27018, NIST CSF, NIST 800-53, PCI DSS, SOC2, HIPAA, PCI, SOX, GLBA, etc.
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $144,200 to $265,600
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
'Information for applicants with a need for accommodation: ************************************************************************************************************
Recruiting tips
From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters.
Benefits
At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you.
Our people and culture
Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work.
Our purpose
Deloitte's purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Learn more.
Professional development
From entry-level employees to senior leaders, we believe there's always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte" means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see ************************* for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Qualified applicants with criminal histories, including arrest or conviction records, will be considered for employment in accordance with the requirements of applicable state and local laws, including the Los Angeles County Fair Chance Ordinance for Employers, City of Los Angeles's Fair Chance Initiative for Hiring Ordinance, San Francisco Fair Chance Ordinance, and the California Fair Chance Act. See notices of various fair chance hiring and ban-the-box laws where available. Fair Chance Hiring and Ban-the-Box Notices | Deloitte US Careers
Requisition code: 316853
Job ID 316853
$144.2k-265.6k yearly 5d ago
AI Security Architect
BNY External
Security architect job in Pittsburgh, PA
AI, SecurityArchitect
At BNY, our culture allows us to run our company better and enables employees' growth and success. As a leading global financial services company at the heart of the global financial system, we influence nearly 20% of the world's investible assets. Every day, our teams harness cutting-edge AI and breakthrough technologies to collaborate with clients, driving transformative solutions that redefine industries and uplift communities worldwide.
Recognized as a top destination for innovators, BNY is where bold ideas meet advanced technology and exceptional talent. Together, we power the future of finance - and this is what #LifeAtBNY is all about. Join us and be part of something extraordinary.
We're seeking a future team member for the role of AI SecurityArchitect to join our Cybersecurity team. This role can be in Pittsburgh, PA or Lake Mary, FL or NYC, NY.
Overview
BNY is seeking a AI SecurityArchitect to lead the design, implementation, and governance of security controls for AI/ML systems across the enterprise. This role will define the target architecture and security patterns for AI-enabled products and platforms, ensuring resilient, compliant, and trustworthy AI. The ideal candidate combines deep expertise in cybersecurity and cloud with hands-on knowledge of modern AI/ML infrastructure, data protection, adversarial threat models, and secure MLOps.
Primary Responsibilities
Define enterprise AI securityarchitecture: develop reference architectures, guardrails, and standards for secure data pipelines, model training/inference, and AI-integrated applications across on-prem and cloud.
Secure MLOps/ML platforms: architect identity, secrets management, network segmentation, and least-privilege access for feature stores, model registries, orchestration, and deployment pipelines.
Data protection by design: establish controls for sensitive data ingestion, anonymization/pseudonymization, encryption (at rest/in transit), tokenization, and lineage across AI workflows.
Adversarial ML defense: design controls and tests for model poisoning, evasion, model theft/exfiltration, prompt injection, jailbreaking, data leakage, and output manipulation.
AI supply chain security: govern third-party models, APIs, and datasets; enforce SBOMs for AI components; evaluate provenance, licensing, and dependency risk.
Policy and governance integration: translate AI security requirements into actionable standards and control evidence; align with enterprise risk, compliance, and model governance processes.
Threat modeling and security testing: lead threat modeling for AI systems; design red-teaming and secure evaluation methods for models and agents; integrate chaos/resilience testing.
Secure development lifecycle: embed AI-specific security checks (static/dynamic scans, IaC policy-as-code, data quality gates, bias/robustness checks) into CI/CD and change management.
Runtime protection: implementing guardrails, content filters, output validation, rate limiting, anomaly detection, and monitoring for AI services and agentic workflows.
Observability and incident response: define logging/telemetry (model inputs/outputs, drift, performance, safety events); integrate AI-specific playbooks into SOC operations.
Zero Trust for AI: design identity-aware access, micro-segmentation, and continuous verification for data scientists, services, and agents.
Privacy and ethics controls: partner with privacy and legal to operationalize consent, minimization, purpose limitation, and responsible AI guardrails, including human-in-the-loop where appropriate.
Resilience and continuity: design disaster recovery, backup/restore, model reproducibility, and contingency plans for AI platforms and critical use cases.
Vendor/platform assessments: evaluate cloud AI services, open-source frameworks, and commercial tools for security posture, compliance, and fit-for-purpose.
Risk management: lead control testing and risk assessments for AI initiatives; document residual risks and remediation plans; support audits and regulatory queries.
Reference implementations: deliver secure patterns, sample code, and automation (e.g., reusable Terraform/Policy-as-Code, secrets patterns, logging schemas) to accelerate adoption.
Stakeholder leadership: partner with platform engineering, data science, enterprise architecture, cyber operations, and product teams to drive end-to-end secure outcomes.
Coaching and enablement: build education and guidance for architects, data scientists, and engineers on secure AI practices, design patterns, and common pitfalls.
Continuous improvement: track emerging threats, standards, and best practices; lead updates to architecture and controls; measure effectiveness via KPIs and control health.
Required Qualifications
12+ years in cybersecurity/enterprise securityarchitecture with 3+ years focused on AI/ML or data platform security at scale.
Expertise in cloud security (AWS/Azure/GCP) including identity, secrets management, key management (KMS/HSM), network segmentation, and policy-as-code.
Strong knowledge of AI/ML workflows: data ingestion/feature engineering, model training/inference, MLOps tooling (model registry, orchestrators, serving).
Practical experience with adversarial ML concepts and defenses; familiarity with model robustness, prompt injection risks, and secure evaluation methods.
Proficiency in designing observability/telemetry for AI systems (e.g., logging prompts/outputs, drift/quality metrics, safety events) with SIEM/SOAR integration.
Hands-on with infrastructure-as-code (Terraform/CloudFormation), CI/CD, and secure SDLC practices tailored to data/ML systems.
Deep understanding of data protection (encryption, tokenization, anonymization), privacy by design, and secure data lifecycle management.
Strong stakeholder management and communication skills; ability to convert complex risks into clear architecture decisions and implementation guidance.
Preferred Qualifications
Experience architectingsecure AI agents and LLM applications including guardrails, content filters, and output validation.
Familiarity with standards and frameworks relevant to AI and data (e.g., NIST AI RMF, cloud CIS benchmarks, OWASP for ML/LLM, privacy controls).
Background in model governance and risk management (e.g., testing for drift, bias, stability, and explainability) and integration with enterprise control frameworks.
Programming/scripting proficiency (Python preferred) for reference implementations, automation, and security tooling integrations.
Experience with container security, Kubernetes, service mesh, and microservices patterns in AI platforms.
Prior leadership in enterprise-scale transformations, enabling secure adoption of AI across multiple business lines.
At BNY, our culture speaks for itself, check out the latest BNY news at:
BNY Newsroom
BNY LinkedIn
Here's a few of our recent awards:
America's Most Innovative Companies, Fortune, 2025
World's Most Admired Companies, Fortune 2025
“Most Just Companies”, Just Capital and CNBC, 2025
Our Benefits and Rewards:
BNY offers highly competitive compensation, benefits, and wellbeing programs rooted in a strong culture of excellence and our pay-for-performance philosophy. We provide access to flexible global resources and tools for your life's journey. Focus on your health, foster your personal resilience, and reach your financial goals as a valued member of our team, along with generous paid leaves, including paid volunteer time, that can support you and your family through moments that matter.
BNY assesses market data to ensure a competitive compensation package for our employees. The base salary for this position is expected to be between $142,000 and $259,000 per year at the commencement of employment. However, base salary if hired will be determined on an individualized basis, including as to experience and market location, and is only part of the BNY total compensation package, which, depending on the position, may also include commission earnings, discretionary bonuses, short and long-term incentive packages, and Company-sponsored benefit programs.
This position is at-will and the Company reserves the right to modify base salary (as well as any other discretionary payment or compensation) at any time, including for reasons related to individual performance, change in geographic location, Company or individual department/team performance, and market factors.
$142k-259k yearly Auto-Apply 3d ago
Technical Security Architect
Federated Hermes, Inc.
Security architect job in Pittsburgh, PA
* Bachelor degree or equivalent required; Bachelor degree in IT related field preferred * Seven to twelve years of experience in the development and implementation of information security systems required * Experience or detailed technical knowledge of securing applications, operating systems and networks required
* Experience or detailed knowledge of security technology including: Next Generation Firewalls, Email Security, network monitoring, Identity Access Solutions and endpoint security devices required
* Working knowledge of: risk assessment products; IS automated tools; various authentication schemes (including Active Directory); browser security functionality; policy development; data privacy; and common information security issues preferred
MAJOR DUTIES:
* Works across multiple technology teams to effectively identify our technology vision.
* Ensures the overall environment continuously evolves to support the firm's objectives, across investment management, trading, IM operations, compliance, product development, marketing, sales, corporate management, etc.
* Create an Information Security Strategy that works across the enterprise to enable the secure use of leading edge technology.
* Assist in building a strategic roadmap that implements the strategy by properly sequencing people, process and technology solutions.
* Execute the strategic roadmap by streamlining the overall suite of security tools, and making cost effective and optimized investment in emerging security technology.
* Provide security expertise for security-relevant enterprise initiatives such as data governance, account administration, and governance processes.
* Assists in establishing and maintaining standards and policies related to Information Security.
HOURS/LOCATION:
* 8:30 a.m. - 5:00 p.m. (over time as required)
* Warrendale Location - Warrendale, PA 15086 (will be required to work at other Federated locations)
EXPLANATORY COMMENTS
* Strong oral and written communication skills
* Effective people management and customer service skills
* Demonstrates a cooperative attitude and effective interpersonal and communication skills with clients, coworkers and vendors.
* Demonstrates flexibility and the ability to work as a member of a team
* Possess the ability to facilitate technical discussions and negotiate resolutions when there are differing technical opinions
$117k-174k yearly est. 60d+ ago
Enterprise Security Architect
Excellerent Solutions
Security architect job in Pittsburgh, PA
Enterprise SecurityArchitect Duration: Full Time Interview mode: Inperson Brand new role
Serve as a member of the enterprise architecture team, providing technical security insight that aligns with business objectives and security requirements. Establish and evangelize the securityarchitecture (principles, policies, standards and patterns) to development groups, business groups and other stakeholders; Govern adherence to the architecture golden rules. Analyze gaps between current and target securityarchitecture and develops plans to close the gaps.
Responsibilities:
Works with IT departments, information securityarchitects, technical architects, data custodians, and governance groups to develop and update Client security policies, standards, procedures, and solutions for secure application architecture. Ensures that security practices are aligned with Client's overall business strategies.
Advises and drives the security maturity of the development lifecycle including secure coding and system security for operations. Recommends and implements changes in security procedures and practices using best-in-class information to ensure that Client is maintaining best-in-class security practices.
Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs. Conducts Penetration Test, Vulnerability, and Risk assessments to improve the securityarchitecture and security product toolset.
Prepares system security reports by collecting, analyzing, and summarizing data and trends. Executes validation by external vendors.
Verifies security systems and network configurations by developing and implementing test scripts while monitoring adherence to standards in architecture, application design, development, and testing frameworks.
Qualifications
Qualifications:
Bachelor degree with Master preferred. Security certification required.
7 to 10 years of experience operating in a cloud environment (e.g. Azure, AWS, Rackspace) along with at least 5 years working in a dedicated information security role with a focus on SecurityArchitecture for at least 3 years.
7 to 10 years of experience with PaaS, IaaS, SaaS, and/or mobile architecture
Solid experience with security hacking tools and techniques.
Solid understanding in application architectures and technology including web applications, mobile technology, identity and access management, security event and incident management as well as web security controls (e.g. Web Application Firewall, Database Activity Monitor, Distributed Denial of Service controls, etc.)
Extensive working knowledge of web application security best practices to include, but not limited to, Cloud Security Alliance controls matrix, OWASP Top 10.
Experience with compliance standards such as HIPAA, CMS, SOX, GLBA; as well as security frameworks such as SANS 20 CSC, CoBIT, or NIST.
Previous involvement with developing and/or maintaining an Enterprise SecurityArchitecture. Familiarity with TOGAF is a plus
Strong understanding and experience of software development methodologies and life cycles
Excellent written and verbal communications skills required, with the ability to explain advanced concepts to audiences of varying levels
Can be counted on to exceed goals successfully, very bottom-line orientated while steadfastly pushes self and others for results.
Has working knowledge of web application security best practices to include, but not limited to, Cloud Security Alliance controls matrix, OWASP Top 10.
Demonstrated ability to make sound decisions using a mixture of analysis, wisdom, experience, and judgement coupled with a strong ability to learn on the fly (quickly learns new tasks, open to change).
Certifications, licenses or registrations: Security+, CISSP, CISA, CEH
Proven ability to organize/manage multiple priorities coupled with the flexibility to quickly adapt to ever-changing business needs.
Additional Information
All your information will be kept confidential according to EEO guidelines.
$117k-174k yearly est. 60d+ ago
AI Security Architect
BNY Mellon 4.4
Security architect job in Pittsburgh, PA
AI, SecurityArchitect
At BNY, our culture allows us to run our company better and enables employees' growth and success. As a leading global financial services company at the heart of the global financial system, we influence nearly 20% of the world's investible assets. Every day, our teams harness cutting-edge AI and breakthrough technologies to collaborate with clients, driving transformative solutions that redefine industries and uplift communities worldwide.
Recognized as a top destination for innovators, BNY is where bold ideas meet advanced technology and exceptional talent. Together, we power the future of finance - and this is what #LifeAtBNY is all about. Join us and be part of something extraordinary.
We're seeking a future team member for the role of AI SecurityArchitect to join our Cybersecurity team. This role can be in Pittsburgh, PA or Lake Mary, FL or NYC, NY.
Overview
BNY is seeking a AI SecurityArchitect to lead the design, implementation, and governance of security controls for AI/ML systems across the enterprise. This role will define the target architecture and security patterns for AI-enabled products and platforms, ensuring resilient, compliant, and trustworthy AI. The ideal candidate combines deep expertise in cybersecurity and cloud with hands-on knowledge of modern AI/ML infrastructure, data protection, adversarial threat models, and secure MLOps.
Primary Responsibilities
Define enterprise AI securityarchitecture: develop reference architectures, guardrails, and standards for secure data pipelines, model training/inference, and AI-integrated applications across on-prem and cloud.
Secure MLOps/ML platforms: architect identity, secrets management, network segmentation, and least-privilege access for feature stores, model registries, orchestration, and deployment pipelines.
Data protection by design: establish controls for sensitive data ingestion, anonymization/pseudonymization, encryption (at rest/in transit), tokenization, and lineage across AI workflows.
Adversarial ML defense: design controls and tests for model poisoning, evasion, model theft/exfiltration, prompt injection, jailbreaking, data leakage, and output manipulation.
AI supply chain security: govern third-party models, APIs, and datasets; enforce SBOMs for AI components; evaluate provenance, licensing, and dependency risk.
Policy and governance integration: translate AI security requirements into actionable standards and control evidence; align with enterprise risk, compliance, and model governance processes.
Threat modeling and security testing: lead threat modeling for AI systems; design red-teaming and secure evaluation methods for models and agents; integrate chaos/resilience testing.
Secure development lifecycle: embed AI-specific security checks (static/dynamic scans, IaC policy-as-code, data quality gates, bias/robustness checks) into CI/CD and change management.
Runtime protection: implementing guardrails, content filters, output validation, rate limiting, anomaly detection, and monitoring for AI services and agentic workflows.
Observability and incident response: define logging/telemetry (model inputs/outputs, drift, performance, safety events); integrate AI-specific playbooks into SOC operations.
Zero Trust for AI: design identity-aware access, micro-segmentation, and continuous verification for data scientists, services, and agents.
Privacy and ethics controls: partner with privacy and legal to operationalize consent, minimization, purpose limitation, and responsible AI guardrails, including human-in-the-loop where appropriate.
Resilience and continuity: design disaster recovery, backup/restore, model reproducibility, and contingency plans for AI platforms and critical use cases.
Vendor/platform assessments: evaluate cloud AI services, open-source frameworks, and commercial tools for security posture, compliance, and fit-for-purpose.
Risk management: lead control testing and risk assessments for AI initiatives; document residual risks and remediation plans; support audits and regulatory queries.
Reference implementations: deliver secure patterns, sample code, and automation (e.g., reusable Terraform/Policy-as-Code, secrets patterns, logging schemas) to accelerate adoption.
Stakeholder leadership: partner with platform engineering, data science, enterprise architecture, cyber operations, and product teams to drive end-to-end secure outcomes.
Coaching and enablement: build education and guidance for architects, data scientists, and engineers on secure AI practices, design patterns, and common pitfalls.
Continuous improvement: track emerging threats, standards, and best practices; lead updates to architecture and controls; measure effectiveness via KPIs and control health.
Required Qualifications
12+ years in cybersecurity/enterprise securityarchitecture with 3+ years focused on AI/ML or data platform security at scale.
Expertise in cloud security (AWS/Azure/GCP) including identity, secrets management, key management (KMS/HSM), network segmentation, and policy-as-code.
Strong knowledge of AI/ML workflows: data ingestion/feature engineering, model training/inference, MLOps tooling (model registry, orchestrators, serving).
Practical experience with adversarial ML concepts and defenses; familiarity with model robustness, prompt injection risks, and secure evaluation methods.
Proficiency in designing observability/telemetry for AI systems (e.g., logging prompts/outputs, drift/quality metrics, safety events) with SIEM/SOAR integration.
Hands-on with infrastructure-as-code (Terraform/CloudFormation), CI/CD, and secure SDLC practices tailored to data/ML systems.
Deep understanding of data protection (encryption, tokenization, anonymization), privacy by design, and secure data lifecycle management.
Strong stakeholder management and communication skills; ability to convert complex risks into clear architecture decisions and implementation guidance.
Preferred Qualifications
Experience architectingsecure AI agents and LLM applications including guardrails, content filters, and output validation.
Familiarity with standards and frameworks relevant to AI and data (e.g., NIST AI RMF, cloud CIS benchmarks, OWASP for ML/LLM, privacy controls).
Background in model governance and risk management (e.g., testing for drift, bias, stability, and explainability) and integration with enterprise control frameworks.
Programming/scripting proficiency (Python preferred) for reference implementations, automation, and security tooling integrations.
Experience with container security, Kubernetes, service mesh, and microservices patterns in AI platforms.
Prior leadership in enterprise-scale transformations, enabling secure adoption of AI across multiple business lines.
At BNY, our culture speaks for itself, check out the latest BNY news at:
BNY Newsroom
BNY LinkedIn
Here's a few of our recent awards:
America's Most Innovative Companies, Fortune, 2025
World's Most Admired Companies, Fortune 2025
“Most Just Companies”, Just Capital and CNBC, 2025
Our Benefits and Rewards:
BNY offers highly competitive compensation, benefits, and wellbeing programs rooted in a strong culture of excellence and our pay-for-performance philosophy. We provide access to flexible global resources and tools for your life's journey. Focus on your health, foster your personal resilience, and reach your financial goals as a valued member of our team, along with generous paid leaves, including paid volunteer time, that can support you and your family through moments that matter.
BNY assesses market data to ensure a competitive compensation package for our employees. The base salary for this position is expected to be between $142,000 and $259,000 per year at the commencement of employment. However, base salary if hired will be determined on an individualized basis, including as to experience and market location, and is only part of the BNY total compensation package, which, depending on the position, may also include commission earnings, discretionary bonuses, short and long-term incentive packages, and Company-sponsored benefit programs.
This position is at-will and the Company reserves the right to modify base salary (as well as any other discretionary payment or compensation) at any time, including for reasons related to individual performance, change in geographic location, Company or individual department/team performance, and market factors.
$142k-259k yearly Auto-Apply 3d ago
Manager Information Security & Risk Management - Cloud Security Manager
Highmark Health 4.5
Security architect job in Homestead, PA
Company :en Gen :
This job provides Information Security and Risk Management services for the Organization. Works with peers within security, HM Health Solutions customers and application teams to ensure alignment with current and future security needs. Manages activities of various Information Security personnel. Makes decisions on personnel actions (promotions, hiring, terminations, etc.). Develops talent, addresses resource management, cultivates capabilities of staff, planning and coordination of work, and managing performance. Conducts the oversight of security technology products for network, systems, and data. Controls expenses within the operating unit and is responsible for meeting budget goals. Actively contributes to the Information Security ans Risk Management (ISRM) strategic planning process by working with the Directors to develop and implement department strategic plans and action steps that support the corporate strategic objectives. Actively involved in the coordination, implementation, problem solving, communication, and training of new technologies and processes, as they are developed and moved into the environment. Develops and presents Information Security awareness and training programs.
ESSENTIAL RESPONSIBILITIES
Perform management responsibilities including, but not limited to: involved in hiring and termination decisions; coaching and development; rewards and recognition; performance management and staff productivity.
Plan, organize, staff, direct and control the day-to-day operations of the department; develop and implement policies and programs as necessary; may have budgetary responsibility and authority.
Provide oversight of all aspects of project management to ensure continuous improvement of processes: negotiate and collaborate with leadership and staff to develop security solutions and options; develop and adhere to internal standards and strategies; ensure adherence to approved methodologies; coordinate resources, time, contingency plans and risk management.
Provide leadership to the department: lead and champion organizational change; encourage participation in activities that support relationship development; champion information security innovation; encourage and enforce proper training in regards to security issues.
Ensure compliance to Corporate and Information Security policies, standards and procedures.
Communicate effectively with all levels of the organization: facilitate meetings; plan, design and provide presentations; represent HM Health Solutions with outside entities; prepare divisional procedures, policies, reports and correspondence; spread awareness of new and existing security threats; provide oversight regarding metrics, funding, budgets and resources.
Other duties as assigned or requested.
EDUCATION
Required
Bachelor's Degree in Information Security, Information Systems, Information Assurance, Computer Science or related field
Substitutions
6 years of relevant experience substitution for a Bachelor's Degree
Preferred
Master's Degree in Computer Science, Information Security or related field
EXPERIENCE
Required
7 - 10 years in Information Security and/or Information Risk Management and/or Information Technology
7 - 10 years in developing, communicating and presenting Information Security and Risk Management concepts to varying audiences
1 - 3 years in mentoring others in a leadership role
1 - 3 years in Staff Management
1 - 3 years in developing and executing strategic plans to realize business objectives
Preferred
10 - 15 years in Information Security and/or Information Risk Management and/or Information Technology
Experience managing an information security function using the HITRUST Common Security Framework (HITRUST CSF), or the NIST 800-83 cyber security framework
Experience supporting SSAE 16 or SOC 2 Security Trust Principle audits
Experience establishing budgets and meeting fiduciary goals
Security industry organization participation/leadership (HITRUST, ISACA, InfraGard, ISC2, ISSA, etc.)
LICENSES AND CERTIFICATIONS
Required
None
Preferred
Certified Information Systems Security Professional (CISSP) OR
Certified Information Security Manager (CISM) OR
Certified in Risk and Information Systems Controls (CRISC) OR
Information Technology Infrastructure Library (ITIL)
SKILLS
Knowledge of regulatory requirements such as Health Insurance Portability and Accountability Act (HIPPA), Payment Card Industry Data Security Standards (PCI DSS), and FIPS-140
Strong teamwork and interpersonal skills
Experience in leading process improvement initiatives
Ability to motivate high performance, multi-discipline teams
Demonstrated competency in project execution
Demonstrated abilities in relationship management
Languages (Other than English)
None
Travel Requirement
0% - 25%
PHYSICAL, MENTAL DEMANDS and WORKING CONDITIONS
Position Type
Office-Based
Teaches/Trains others regularly
Frequently
Travels regularly from the office to various work sites or from site-to-site
Occasionally
Works primarily out-of-the office selling products/services (Sales employees)
Does Not Apply
Physical Work Site Required
Yes
Lifting: up to 10 pounds
Does Not Apply
Lifting: 10 to 25 pounds
Does Not Apply
Lifting: 25 to 50 pounds
Does Not Apply
Disclaimer:
The job description has been designed to indicate the general nature and essential duties and responsibilities of work performed by employees within this job title. It may not contain a comprehensive inventory of all duties, responsibilities, and qualifications required of employees to do this job.
Compliance Requirement: This job adheres to the ethical and legal standards and behavioral expectations as set forth in the code of business conduct and company policies.
As a component of job responsibilities, employees may have access to covered information, cardholder data, or other confidential customer information that must be protected at all times. In connection with this, all employees must comply with both the Health Insurance Portability Accountability Act of 1996 (HIPAA) as described in the Notice of Privacy Practices and Privacy Policies and Procedures as well as all data security guidelines established within the Company's Handbook of Privacy Policies and Practices and Information Security Policy.
Furthermore, it is every employee's responsibility to comply with the company's Code of Business Conduct. This includes but is not limited to adherence to applicable federal and state laws, rules, and regulations as well as company policies and training requirements.
Pay Range Minimum:
$108,000.00
Pay Range Maximum:
$201,800.00
Base pay is determined by a variety of factors including a candidate's qualifications, experience, and expected contributions, as well as internal peer equity, market, and business considerations. The displayed salary range does not reflect any geographic differential Highmark may apply for certain locations based upon comparative markets.
Highmark Health and its affiliates prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on any category protected by applicable federal, state, or local law.
We endeavor to make this site accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact the email below.
For accommodation requests, please contact HR Services Online at *****************************
California Consumer Privacy Act Employees, Contractors, and Applicants Notice
$108k-201.8k yearly Auto-Apply 55d ago
Network and Security Services Solutions Architect*
Accenture 4.7
Security architect job in Pittsburgh, PA
We Are: Navisite, part of Accenture, has evolved to become a trusted digital transformation partner for growing and established global brands. We provide global capabilities, customer-centric solutions, and flexible approaches that are specifically rightsized for the needs of mid-market and small enterprise customers. This team specializes in digital transformation and managed services with deep expertise in cloud, infrastructure and application services dedicated to assisting clients in building a strong digital core. With experience across multiple cloud providers, enterprise applications and digital technologies, Navisite serves clients in the health and industrial, life sciences, technology, consumer goods and retail industries. Given their customer-centric solutions and flexible approaches, this team is adept at scaling our services for clients seeking to modernize and build more agile, resilient, and scalable businesses. The Navisite team of more than 1,400 members globally joined Accenture in January 2024. As part of Accenture, you will be working with an ambitious, collaborative team more empowered than ever to help customers modernize their IT for the AI era.
You Are:
An Enterprise Solution Architect with deep expertise in network architecture and cybersecurity who can translate complex requirements into clear, value‑led solutions.
You engage confidently with C‑level executives and technical stakeholders, simplify risk and resilience decisions, and shape architectures that are secure, scalable, and compliant.
As a Presales Solution Architect specializing in Security and Network, you will serve as the technical expert and trusted advisor during the sales process, designing secure, scalable, and compliant network and cybersecurity solutions tailored to customer needs and business objectives.
You will collaborate closely with sales, engineering, product management, and customers (including C‑suite) to qualify opportunities, develop solution architectures, lead technical presentations/demonstrations, and ensure successful transition to delivery.
The Work:
You operate as a Solution Architect across opportunities from targeted upgrades to large multi‑tower managed services deals spanning enterprise networking (LAN/WAN/WLAN, SD‑WAN, cloud networking) and security stacks (NGFW, VPN/ZTNA/SASE, IDS/IPS, SIEM/XDR/SOAR, identity‑centric and Zero‑Trust models).
You will co‑create solutions with clients; define operating models, SLAs, and KPIs; and align proposals to compliance frameworks and enterprise governance.
Lead Pre‑Sales Architecture & Solutioning:
* Design and articulate high‑level network and cybersecurity architectures that align with customer requirements, compliance standards, and enterprise IT strategies.
* Define reference designs for SD‑WAN/SASE/Zero‑Trust, cloud networking (Azure/AWS/GCP), segmentation, firewalls, and secure remote access.
* Build delivery models (operate, enhance, transform) with clear SLAs, KPIs, RACI, and transition plans.
Qualify & Propose:
* Collaborate with sales stakeholders to qualify opportunities and craft compelling technical proposals addressing risk, security posture, and network resilience.
* Shape solution scope, assumptions, dependencies, and pricing inputs; contribute to SOWs and commercial terms with Legal/Commercial.
Client Engagements & Demonstrations:
* Lead client engagements, including technical demonstrations, proofs of concept, pilots, and security assessments to evidence value and feasibility.
* Present architecture rationale, trade‑offs, and value realization to IT leadership, CISOs, and business executives.
Trusted Advisory & Best Practices:
* Advise customers on security best practices, emerging threats, network modernization, and resilience improvements.
* Recommend controls and operating models aligned to ITIL, Zero‑Trust, and defense‑in‑depth principles.
Technology Mastery:
* Develop and maintain deep understanding of technologies such as firewalls, VPN/ZTNA, IDS/IPS, SIEM, XDR, SOAR, cloud security platforms, network observability, and automation.
Compliance, Governance & Risk:
* Ensure proposals meet enterprise security governance and regulatory compliance, including risk‑management frameworks and certifications relevant to customer environments (NIST, ISO 27001, PCI, SOC 2, FedRAMP, GDPR, etc.).
* Lead internal Technology Delivery sign‑off aligning scope, risks, commercials, and feasibility.
Cross‑Functional Handover & Delivery Readiness:
* Partner with engineering, delivery, and product teams to ensure smooth handover, readiness, and successful implementation.
* Where appropriate, support early deal stabilization to de‑risk transition.
Thought Leadership:
* Stay updated on industry trends, threat landscapes, and vendor roadmaps to continuously innovate offerings.
* Support technical training, marketing presentations, and participation in industry events.
Travel may range from 0% to 100% depending on deal stage, client discussions, and business need
Qualification
Here's what you need:
* Minimum 8 years in a technology environment, specifically in a Network and Cybersecurity capacity
* Minimum 5 years in solution planning, deal shaping, presales engineering, or enterprise solution architecture.
* Minimum of 2 years of hands‑on experience and knowledge of network architectures (LAN/WAN, SD‑WAN/SDN, cloud networking) and security technologies: firewalls (Palo Alto, Cisco, Fortinet, Check Point), endpoint protection, IDS/IPS, SIEM/XDR/SOAR, ZTNA/SASE, VPN, and cloud security controls.
* Understanding and familiarity with security frameworks and compliance standards (e.g., NIST, ISO 27001, FedRAMP, GDPR) and experience navigating customer accreditation processes.
* Bachelor's degree or equivalent (12 years of work experience). If Associate's Degree: 6 years minimum relevant experience required
Bonus Points if:
* You have relevant certifications (one or more preferred): CISSP, CCNP Security/CCIE Security, PCNSE, NSE, AZ‑500/AZ‑700, AWS Security/Specialty, GSEC/GCIH/GCIA.
* You have experience designing Zero‑Trust, SASE, micro‑segmentation, and cloud‑native securityarchitectures; familiarity with automation/orchestration (Terraform, Ansible, Python).
* You have strong understanding of ITIL service operations and managed‑service delivery models.
Compensation at Accenture varies depending on a wide array of factors, which may include but are not limited to the specific office location, role, skill set, and level of experience. As required by local law, Accenture provides a reasonable range of compensation for roles that may be hired as set forth below. We accept applications on an on-going basis and there is no fixed deadline to apply.
Information on benefits is here.
Role Location Annual Salary Range
California $73,800 to $218,800
Cleveland $68,300 to $175,000
Colorado $73,800 to $189,000
District of Columbia $78,500 to $201,300
Illinois $68,300 to $189,000
Maryland $73,800 to $189,000
Massachusetts $73,800 to $201,300
Minnesota $73,800 to $189,000
New York/New Jersey $68,300 to $218,800
Washington $78,500 to $201,300
Locations
$78.5k-201.3k yearly 5d ago
Sr. Security Analyst
Maximus 4.3
Security architect job in Pittsburgh, PA
Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned.
*This role is remote but requires working standard business hours in the US time zone of the client.*
Essential Duties and Responsibilities:
- Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary.
- Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget.
- Work closely with management and work groups to create and maintain work plan documents.
- Track the status and due dates of projects.
- Manage relationships with project staff responsible for projects.
- Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed.
- Facilitate regular meetings and reviews.
- Adhere to contract requirements and comply with all corporate policies and procedures.
Job Specific Duties and Responsibilities:
-Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects.
-Review project documentation and client materials and provide analysis of technical and security related topics.
-Participate in client meetings and offer observations and insight on technical and security related topics.
-Identify risk areas and potential problems that require proactive attention.
-Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to:
*System Security Plan
*Plan of Action and Milestones (POA&M)
*Security Assessment Plan
*Risk Assessment reports
*CMS ARC-AMPE forms and documentation
*Data Conversion and Migration Management Plan
*Deployment and/or roll-out plans
-Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects.
-Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues.
-Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work.
-Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager.
-Complete project work in compliance with Maximus standards and procedures.
-Support team to complete assigned responsibilities as outlined in the Project schedule.
-Support all other tasks assigned by Senior Manager / Project Manager.
Minimum Requirements
- Bachelor's degree in related field.
- 7-10 years of relevant professional experience required.
- Equivalent combination of education and experience considered in lieu of degree.
Job Specific Requirements:
-Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required.
-Bachelor's degree from an accredited college or university, or equivalent work experience.
-7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry.
-5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks.
-Familiar with operating systems: Windows, Linux/UNIX, OS/X.
-Familiar with AI tools, capabilities.
-Strong command of cloud computing topics.
-Strong command of agile software development practices as well as waterfall development practices.
-Strong desktop software skills: proficient in MS Office, Excel, Word, Project.
-Ability to explain and communicate technical subjects to non-technical audiences.
-Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills.
-Ability to work independently.
-Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously.
-Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential.
-Excellent verbal and writing skills and be comfortable working with customers.
-Ability to multi-task with supervision.
-Self-motivated fast learner.
Preferred Skills:
-Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid).
-Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional).
EEO Statement
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Accommodations
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
Minimum Salary
$
120,000.00
Maximum Salary
$
140,000.00
$88k-121k yearly est. Easy Apply 5d ago
Senior Cloud Security Engineer
Techstra Solutions
Security architect job in Pittsburgh, PA
Techstra Solutions is seeking an experienced and dedicated Senior Cloud Security Engineer to join our team. This role is crucial for ensuring the security and compliance of our cloud infrastructure in a highly regulated financial environment. The ideal candidate will have a strong background in cloud security, a deep understanding of regulatory requirements, and the ability to design, implement, and maintain secure cloud solutions.
Primary Success Factors
· Design, develop, and deploy scalable cloud-based security solutions to protect sensitive financial data and ensure compliance with industry regulations.
· Perform comprehensive vulnerability testing, risk analyses, and security assessments to identify and mitigate potential threats.
· Develop and coordinate robust cloud security procedures
· Monitor for and respond to security incidents in the cloud environment, utilizing advanced security tools and techniques.
· Collaborate with IT and development teams to ensure cloud solutions are securely integrated with existing software and infrastructure, following best practices and security standards.
· Keep abreast of the latest security issues, regulatory changes, and industry trends to proactively address emerging threats.
· Assist with the design of security training and awareness programs to educate staff about cloud security risks and responsibilities, fostering a culture of security within the organization.
· Regularly report on the status of cloud security, including any breaches or vulnerabilities, to senior management and stakeholders.
· Work with third-party vendors to ensure that security requirements are met and maintain strong relationships with external security partners.
· Maintain compliance with all relevant security and privacy laws and regulations, including PCI-DSS, GDPR, SOX, and other industry-specific standards
Required Experience
· Bachelor's or Master's degree in Computer Science, Information Security, or a related field. Specific experience will be considered in lieu of a degree.
· Minimum of 7 years of experience
· Relevant certifications in Cyber Security, with Cloud specific certifications a plus.
· Proven experience in cloud security engineering, preferably in a financial institution, with a track record of successfully implementing secure cloud solutions.
· Strong knowledge of cloud platforms and cloud security best practices, including identity and access management, encryption, and network security.
· Experience with regulatory compliance frameworks such as PCI-DSS, GDPR, and SOX, and the ability to navigate complex regulatory environments.
· Excellent problem-solving skills and the ability to work under pressure, with a proactive and detail-oriented approach to security.
· Strong communication and collaboration skills, with the ability to effectively convey complex security concepts to both technical and non-technical audiences.
· Experience with DevSecOps practices and tools, including continuous integration and continuous deployment (CI/CD) pipelines.
· Knowledge of infrastructure as code (IaC) and automation tools, such as Terraform, Ansible, or CloudFormation.
· Familiarity with security monitoring and incident response tools, such as SIEM, IDS/IPS, and EDR solutions.
· Ability to deliver with minimal management oversight
Location:
This position is based in Pittsburgh, PA and required to be on site (Hybrid)
This is a full-time W2 Salaried position. Applicants must be legally authorized to work in the United States now and in the future without the need for sponsorship.
At Techstra Solutions, we help top companies and brands achieve the business value of Digital and Talent Transformation. We believe there are three components in successful business transformation: Business Strategy, Technology and Talent. It is the coming together of these three disciplines that enables companies to take full advantage of opportunities. It differentiates us. Our approach is holistic and all-encompassing. We consider the full picture as we guide our clients on this journey. We are experts in transformation, business strategy, technology, innovation, and human capital management. We deliver our expertise through client consulting, innovative staffing solutions and software development. From strategy through implementation, we are dedicated to bringing our clients world-class business and talent solutions that fit strategic requirements and most importantly, deliver results.
Equal Employment Opportunity Statement
Techstra Solutions is an equal opportunity employer. The Company makes its decisions on merit, and its policy of equal opportunity prohibits discrimination in all phases of the employment process, including, but not limited to, recruitment, hiring, promotion, selection, transfer, demotion, layoff, termination, compensation, benefits, and other terms and conditions of employment. The policy of equal opportunity applies without regard to race, color, creed, religion, gender,, sexual orientation, gender identification, pregnancy, marital status, national origin, ancestry, age, disability that can reasonably be accommodated without undue hardship, military status, veteran status, genetic predisposition or carrier status, alienage or citizenship, domestic partnership status, arrest or conviction record, status as a victim of domestic violence, or any other protected categories under federal, state, or local law. The Company also prohibits discrimination or harassment based upon the perception that a person has, or is associated with a person who has, any of these characteristics.
$97k-135k yearly est. Auto-Apply 60d+ ago
Senior Cloud Security Engineer
Eliassen Group 4.7
Security architect job in Pittsburgh, PA
Job DescriptionDescription:
Hybrid in Pittsburgh, PA
Financial services & banking organization comprised of offerings for commercial banking, insurance, credit unions, and community development
This is a full-time, permanent opportunity, offering a competitive salary and comprehensive benefits package. Qualified applicants must be willing and able to work on a w2 basis.
Rate: $130,000 - $140,000 / yr. w2
Responsibilities:Cloud Security Engineering & Architecture
Design, develop, and deploy scalable cloud security solutions across AWS and Azure (experience with any major cloud provider accepted).
Harden existing cloud environments and implement best practices for IAM, RBAC, Zero Trust, CSPM, CNAPP, and SaaS Security Posture Management.
Lead the transition toward Terraform and Infrastructure as Code (IaC) maturity.
Build and refine KRIs and KPIs to measure cloud security posture and program effectiveness.
Security Operations & Governance
Conduct vulnerability assessments, risk analyses, and cloud security reviews.
Monitor and respond to cloud security incidents using modern tooling (SIEM, IDS/IPS, EDR).
Develop and maintain cloud security procedures and documentation.
Ensure compliance with regulatory frameworks including PCI-DSS, GDPR, SOX, and other financial-industry standards.
Collaboration & Leadership
Mentor and advise teams new to cloud security, guiding them through best practices and secure implementation patterns.
Partner with IT, engineering, and development teams to ensure secure integration of cloud services.
Work with third-party vendors and internal stakeholders to ensure security requirements are met.
Contribute to security training and awareness initiatives.
Experience Requirements:
Strong understanding of Infrastructure as Code (IaC) and cloud security best practices.
Experience with CSPM, Zero Trust, CNAPP, SaaS Security Posture Management, and cloud hardening.
Hands-on engineering experience in AWS and/or Azure (both not required).
Experience with Terraform, Ansible, CloudFormation, or similar tools.
Strong IAM and RBAC best practices.
Ability to build, measure, and improve cloud security metrics (KRIs/KPIs).
Education Requirements:
Bachelors Degree required
Recruitment Transparency Notice
Eliassen Group values transparency in our recruitment practices. Please be advised that Eliassen Group utilizes artificial intelligence (AI) tools as part of its initial application screening process. You may receive email and SMS notifications from the Eliassen Virtual Recruiting Team (noreply@eliassen.com, ************* inviting you to complete a brief voice screening as part of your application process. These tools assist our hiring teams in different ways, including but not limited to, assistance in reviewing application materials to help identify candidates whose qualifications most closely match the requirements of the position. All AI-assisted evaluations and responses are reviewed by human recruiters before any hiring decisions are made. The use of AI in our process is intended to support fairness, efficiency, and consistency, and Eliassen Group takes measures to prevent bias or discrimination in connection with its hiring practices. By proceeding, you acknowledge, agree, and consent to Eliassen Group's use of these tools, including AI tools, as part of the application and hiring process.
Skills, experience, and other compensable factors will be considered when determining pay rate. The pay range provided in this posting reflects a W2 hourly rate; other employment options may be available that may result in pay outside of the provided range.
W2 employees of Eliassen Group who are regularly scheduled to work 30 or more hours per week are eligible for the following benefits: medical (choice of 3 plans), dental, vision, pre-tax accounts, other voluntary benefits including life and disability insurance, 401(k) with match, and sick time if required by law in the worked-in state/locality.
Please be advised- If anyone reaches out to you about an open position connected with Eliassen Group, please confirm that they have an Eliassen.com email address and never provide personal or financial information to anyone who is not clearly associated with Eliassen Group. If you have any indication of fraudulent activity, please contact ********************.
About Eliassen Group:
Eliassen Group is a leading strategic consulting company for human-powered solutions. For over 30 years, Eliassen has helped thousands of companies reach further and achieve more with their technology solutions, financial, risk & compliance, and advisory solutions, and clinical solutions. With offices from coast to coast and throughout Europe, Eliassen provides a local community presence, balanced with international reach. Eliassen Group strives to positively impact the lives of their employees, clients, consultants, and the communities in which they operate.
Eliassen Group is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
Don't miss out on our referral program! If we hire a candidate that you refer us to then you can be eligible for a $1,000 referral check!
$130k-140k yearly 20d ago
Security Systems Engineer
Dagostino Electronic Services 4.1
Security architect job in Pittsburgh, PA
The Systems Engineer position is responsible for providing full cycle implementation and support of customer systems, while working across multiple company departments to ensure full client satisfaction. Under the direction of a manager or dispatcher, coordinates the design and maintenance of all access control, intrusion, and video surveillance systems. Incumbent receives and evaluates work orders and requests, investigates requests and troubleshoots problems where appropriate, establishes priorities and coordinates with contractors, when required.
Requirements
Essential functions and responsibilities:
Assists with security systems integration, mapping and software updates and helps train personnel in the use of these systems.
Assists on new projects in both existing areas and new construction helping with security assessments, vendor selection, technology upgrades, product selections, testing, field verification of systems and inspection of work in progress for compliance with standards
Assess work sites, conditions, and logistics for each project; Develop Method of Procedure based on pre-project assessment.
Design, develop and provide documentation of systems, configurations, and other pertinent information for the customer.
Communicate with clients to resolve issues in a professional and confidential manner; Develop and execute client specific solutions.
Manage the allocation of project resources, including software, hardware, tools, and related items specific to each customer and/or project.
Direct the work responsibilities of union labor personnel based on specific project needs.
Design and oversee training programs for new and existing customers; Determine which customers receive training.
Collaborate with Customer Relationship Managers on demonstrations for new and potential clients.
Perform installation, configuration, programming, and final commissioning of customer systems.
Work collaboratively with installation, project management and engineering teams.
Perform infrastructure services, including pulling cables, installing wall, and ceiling cabling, and installing surface mounted devices, as required.
Perform system wiring and terminations services, as required.
Deliver on-going remote and on-site technical support for existing customers and systems.
Additional responsibilities may be required as necessary, including but not limited to: Provide internal support for basic trouble shooting.
Organizes and manage parts stock and tools.
Perform other duties as needed.
Success factors/job competencies:
Effectively communicate both in writing and verbally
Work independently and prioritize multiple tasks and adapt to needed change
Analysis
Mechanical aptitude
Comprehend technical language and read and interpret blueprints, wiring diagrams, and schematics
Safety orientation
Customer Focus
Attention to Detail
Teamwork/Collaboration
Stay abreast of changes in security technology
Physical demands and work environment:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Individual will be required to travel to customer sites as needed.
While performing the duties of this job, the employee is occasionally exposed to moving mechanical parts.
The employee is occasionally exposed to outside weather conditions and risk of electrical shock.
Individual will regularly be required to lift, push, pull, and carry up to 50 pounds, and occasionally up to 75 pounds.
Incumbent will be required to use a computer with keyboard, telephone, or handheld mobile device for extended periods of time, and office machinery as needed.
Incumbent must be able to read, see, hear, and speak.
Workdays and Shifts:
Position works Monday-Friday, daylight hours, and additional time as needed to complete work.
Education/Certification(s)/License(s) required:
Bachelor's Degree in Electronics, Information Technology or related field, or equivalent experience.
May be required to participate in safety trainings and/or certifications provided by the Company or customers.
Valid driver's license, as employee will be required to travel to local and overnight client sites as needed.
Manufacturer specific certifications, as required.
Responsible to maintain active certifications and obtain new and updated certifications as required by the Company.
Experience/Other required:
Position requires two (2) to three (3) years of relevant experience in the electronic services.
Strong knowledge of Microsoft Office.
Strong computer skills with advanced software aptitude.
Security systems to include, service and maintenance across a broad spectrum of access control, intrusion and video surveillance systems such as, Genetec, Milestone, Bosch, and DMP.
Applicants must be currently authorized to work in the United States on a full-time basis.
Visa sponsorship is not available for this position.
This is a full-time, in-person position, and candidates must be able to work from our office located in Pittsburgh, Pennsylvania.
$90k-127k yearly est. 60d+ ago
Enterprise Infrastructure Patch and Security Engineer
All Lines Technology 3.3
Security architect job in Pittsburgh, PA
Job DescriptionPurpose Reduce security risk and maintain patch compliance across Infrastructure Services using approved tooling and processes (Windows Server, Enterprise Linux, cloud/on‑prem, network devices, and assets in scope). What You'll Do
Own Security Remediation Program management aligned to Security's findings (Critical/High/Medium).
Plan, schedule, and execute monthly OS patching (Windows/Linux) with canaries, maintenance windows, and rollback.
Run zero-day/out‑of‑band patching with expedited assessment and change controls.
Deliver extended remediations (cipher/protocol, file rights, 3rd‑party updates) and coordinate vendor engagement.
Operate tooling: MECM/SCCM, Ansible, Rapid7, Ivanti ITSM, Cisco DNA, Panorama, Venafi; perform manual deployments where required.
Manage quarterly component updates and certificate lifecycle (PKI/DigiCert), including self‑signed to PKI migration feasibility.
Publish compliance reports, audit artifacts, and governance updates; chair weekly Security-Infrastructure standups.
What You'll Bring
5+ years in infrastructure security/patch management across Windows Server & Enterprise Linux (RHEL/others).
Hands‑on experience with MECM/SCCM, Ansible, Rapid7, Ivanti ITSM, Cisco DNA, Panorama, Venafi/PKI.
Strong ITIL change & incident management, CMDB updates, compliance reporting.
Scripting skills (PowerShell/Bash/Python), canary strategies, rollback procedures.
Nice‑to‑have: ITIL v4, Security+, RHCSA/RHCE, Microsoft Certified, CCNA/CCNP, GIAC/GVM.
Powered by JazzHR
Z3CShR2iOT
$85k-112k yearly est. 12d ago
Senior AI Security Researcher
Cmu
Security architect job in Pittsburgh, PA
Are you a cybersecurity and/or AI researcher who enjoys a challenge? Are you excited about pioneering new research areas that will impact academia, industry, and national security? If so, we want you for our team, where you'll collaborate to deliver high-quality results in the emerging area of AI security.
The CERT Division of the Software Engineering Institute (SEI) is seeking applicants for the AI Security Researcher role. Originally created in response to one of the first computer viruses -- the Morris worm - in 1988, CERT has remained a leader in cybersecurity research, improving the robustness of software systems, and in responding to sophisticated cybersecurity threats. Ensuring the robustness and security of AI systems is the next big challenge on the horizon, and we are seeking life-long learners in the fields of cybersecurity, AI/ML, or related areas, who are willing to cross-train to address AI Security.
As part of the Threat Analysis Directorate, you will join a group of security experts focused on advancing the state of the art in AI security at a national and global scale. Our tasks include vulnerability discovery and assessments for AI systems, evaluation of the effectiveness and robustness of defenses and mitigations for AI systems, reverse engineering AI systems and models, and identifying new areas where security research is needed. We participate in communities of network defenders, software developers and vendors, security researchers, AI practitioners, and policymakers. You'll get a chance to work with elite AI and cybersecurity professionals, university faculty, and government representatives to build new methodologies and technologies that will influence national AI security strategy for decades to come.
You will co-author research proposals, execute studies, and present findings and recommendations to our DoW sponsors, decision makers within government and industry, and at academic conferences. The SEI is a non-profit, federally funded research and development center (FFRDC) at Carnegie Mellon University.
What you'll do:
Develop state of the art approaches for analyzing robustness of AI systems.
Apply these approaches to understanding vulnerabilities in AI systems and how attackers adapt their tradecraft to exploit those vulnerabilities.
Reverse engineer malicious code in support of high-impact customers, design and develop new analysis methods and tools, work to identify and address emerging and complex threats to AI systems and effectively participate in the broader security community.
Study and influence the AI security and vulnerability disclosure ecosystems.
Evaluate the effectiveness of tools, techniques and processes developed by industry and the AI security research community.
Uncover and shape some of the fundamental assumptions underlying current best practice in AI security.
Develop thought models, tools and data sets that can be used to characterize the threats to, and vulnerabilities in, AI systems, and publish those results. You will also use these results to aid in the testing, evaluation and transition of technologies developed by government-funded research programs.
Identify opportunities to apply AI to improve existing cybersecurity research.
Who you are:
You have BS in machine learning, cybersecurity, statistics, or related discipline with ten (10) years of experience; OR MS in the same fields with eight (8) years of experience; OR PhD in the same fields with five (5) years of experience.
You have a deep interest in AI/ML and cybersecurity with a penchant for intellectual curiosity and a desire to make an impact beyond your organization.
You have practical experience with applying cybersecurity knowledge toward vulnerability research, analysis, disclosure, or mitigation.
You have experience with advising on a range of security topics based on research and expert opinion.
You have familiarity with implementing and applying AI/ML techniques to solving practical problems.
You have familiarity with common AI/ML software packages and tools (e.g., Numpy, Pytorch, Tensorflow, ART).
You have knowledge or familiarity with reverse engineering tools (e.g. NSA Ghidra, IDA Pro)
You have experience with Python, C/C++, or low-level programming.
You have experience developing frameworks, methodologies, or assessments to evaluate effectiveness and robustness of technologies.
You have excellent communication skills (oral and written), particularly regarding technical communications with non-experts.
You enjoy mentoring and cross-training others and sharing knowledge within the broader community.
Candidates with strong technical proficiency in either AI/ML or cybersecurity are welcome to apply, provided a demonstrated intellectual agility and commitment required for accelerated learning within the role.
You are able to:
Travel to various locations to support the SEI's overall mission. This includes within the SEI and CMU community, sponsor sites, conferences, and offsite meetings on occasion (5%).
You will be subject to a background check and will need to obtain and maintain a Department of War security clearance.
Why work here?
Join a world-class organization that continues to have a significant impact on software.
Work with cutting-edge technologies and dedicated experts to solve tough problems for the government and the nation.
Be surrounded by friendly and knowledgeable staff with broad expertise across AI/ML, cybersecurity, software engineering, risk management, and policy creation.
Get 8% monthly contribution for your retirement, without having to contribute yourself.
Get tuition benefits to CMU and other institutions for you and your dependent children.
Enjoy a healthy work/life balance with flexible work arrangements and paid parental and military leave.
Enjoy annual professional development opportunities; attend conferences and training or obtain a certification and get reimbursed for membership in professional societies.
Qualify for relocation assistance and so much more.
Joining the CMU team opens the door to an array of exceptional benefits.
Benefits eligible employees enjoy a wide array of benefits including comprehensive medical, prescription, dental, and vision insurance as well as a generous retirement savings program with employer contributions. Unlock your potential with tuition benefits, take well-deserved breaks with ample paid time off and observed holidays, and rest easy with life and accidental death and disability insurance.
Additional perks include a free Pittsburgh Regional Transit bus pass, access to our Family Concierge Team to help navigate childcare needs, fitness center access, and much more!
For a comprehensive overview of the benefits available, explore our Benefits page.
At Carnegie Mellon, we value the whole package when extending offers of employment. Beyond credentials, we evaluate the role and responsibilities, your valuable work experience, and the knowledge gained through education and training. We appreciate your unique skills and the perspective you bring. Your journey with us is about more than just a job; it's about finding the perfect fit for your professional growth and personal aspirations.
Are you interested in an exciting opportunity with an exceptional organization?! Apply today!
Location
Pittsburgh, PA
Job Function
Software/Applications Development/Engineering
Position Type
Staff - Regular
Full Time/Part time
Full time
Pay Basis
Salary
More Information:
Please visit “Why Carnegie Mellon” to learn more about becoming part of an institution inspiring innovations that change the world.
Click here to view a listing of employee benefits
Carnegie Mellon University is an Equal Opportunity Employer/Disability/Veteran.
Statement of Assurance
$81k-119k yearly est. Auto-Apply 4d ago
AI Security Engineer
Preamble
Security architect job in Pittsburgh, PA
We are seeking an experienced AI Security Engineer to lead the development of next -generation cybersecurity solutions for advanced AI systems. This individual will be responsible for researching, designing, and implementing cutting -edge security controls to protect AI models, data pipelines, and infrastructure from adversarial attacks, privacy vulnerabilities, and regulatory risks. The ideal candidate has a strong background in AI and understanding of cybersecurity principles, has been published in leading academic conferences (NeurIPS, ICLR, Black Hat, DEFCON, etc.), and has experience working at a frontier AI lab.
Requirements
Experience: 5+ years in AI/ML with a strong focus on cybersecurity.
Education: Bachelor's or Master's in Computer Science, Cybersecurity, AI/ML, or a related field. PhD preferred.
Technical Expertise:
Strong understanding of AI security challenges, including adversarial ML, LLM backdoor, (in)direct prompt injections, model poisoning, and data leakage.
Proficiency in cybersecurity frameworks (NIST, MITRE ATLAS, OWASP AI Top 10) and security tools.
Hands -on experience with AI frameworks (TensorFlow, PyTorch, OpenAI API, Hugging Face) and securing AI pipelines.
Expertise in cryptography, secure data handling, and privacy -preserving AI techniques (federated learning, differential privacy).
Proficiency in Python and security -related programming (e.g., secure coding, AI model evaluation).
Familiarity with AI agents, autonomous agents, large language models (LLMs), and multi -modal AI systems.
Preferred: Experience in compliance, regulatory, or risk frameworks for AI (e.g., OWASP, MITRE, GDPR, HIPAA, GLBA, NIST AI RMF). An interest in robotics would be preferred as well.
Publication & Research: Proven track record of research contributions in top AI/ML and cybersecurity conferences.
Industry Experience: Prior work at a leading AI research lab, security -focused AI startup, or a major tech company's AI division.
Benefits
Competitive salary and equity options.
100% paid medical insurance coverage.
Research and publication opportunities.
Opportunity to work on cutting -edge AI security challenges that expand beyond software systems.
Flexible work environment with remote and in -office options.
Access to industry -leading AI security research and resources.
A dynamic, mission -driven team shaping the future of AI security.
$79k-110k yearly est. 60d+ ago
Application Security Engineer
HDJ & Associates
Security architect job in Pittsburgh, PA
Are you ready to elevate security practices to new heights? Our organization is on the lookout for a dynamic Application Security Engineer who will revolutionize our application security strategies. Located in the vibrant city of Pittsburgh, PA, this on\-site role is the perfect opportunity to collaborate with key stakeholders in Technology, Product, and Strategic Business Units to tackle the most pressing security challenges head\-on.
As a Application Security Engineer, you will spearhead the secure software development lifecycle, embedding cutting\-edge security practices at every step of our DevOps pipelines and application security processes. Your expertise in maturity models like DSOMM (DevSecOps Maturity Model), CI\/CD pipelines, and vulnerability management tools will be crucial in transforming our security landscape. Join forces with our engineering, DevOps, Product, and Technology teams to implement automated security controls, threat modeling, and risk mitigation strategies that will shape the future of our software development lifecycle.
This role requires minimal travel and the ability to work in a fast\-paced, dynamic environment. The position may involve working outside normal business hours to address urgent compliance or security incidents.
Key Responsibilities
DevSecOps & Maturity Measurement Implementation:
Assess, report, and assist with improving application security and DevSecOps Maturity, utilizing a measurement framework such as DSOMM or BSIMM, across the organization.
Define and implement security policies, standards, and best practices for DevOps, CI\/CD pipelines, and cloud security.
Work with development and DevOps teams to integrate automated security testing (SAST, DAST, SCA, IaC security scanning, etc.) into pipelines.
Establish security gates in CI\/CD workflows to prevent deployment of vulnerable code.
Application Security & Code Vulnerabilities:
Perform code reviews, static\/dynamic security testing (SAST\/DAST), and secure coding guidance to developers.
Identify and remediate vulnerabilities in application code, libraries, containers, and infrastructure as code (IaC).
Develop and enforce secure coding standards in alignment with OWASP, NIST, and other frameworks.
Conduct threat modeling and securityarchitecture reviews for applications and services. For example, assist application teams with developing accurate data flow diagrams and developing appropriate identity management solutions.
Manage and mature Bot Management services for all applications. Assist with WAF management and maturity.
Improve secrets management and API security.
Vulnerability Management & Risk Reduction:
Manage and mature enterprise\-wide Bug Bounty program (e.g. BugCrowd, HackerOne)
Manage vulnerability scanning tools (e.g., Tenable, Qualys, Sonar, Snyk) and prioritize remediation efforts.
Track, assess, and coordinate the remediation of vulnerabilities across the application, infrastructure, and cloud environments.
Develop risk\-based vulnerability management workflows and collaborate with engineering teams to drive fixes.
Monitor security dashboards and metrics, ensuring vulnerabilities are patched in alignment with SLAs.
Security CI\/CD Automation & Tooling:
Implement security automation using APIs, scripts, and cloud\-native security controls.
Work with DevOps engineers to integrate security tooling (like SemGrep, Snyk, Cycode) or within Jenkins, GitHub, GitLab CI\/CD, or AWS DevOps.
Automate security findings triage, reporting, and prioritization processes.
Security Awareness & Collaboration:
Train and mentor developers on secure coding, threat modeling, DevSecOps, and vulnerability management best practices.
Collaborate with security operations, incident response, and compliance teams on security initiatives.
Participate in security assessments, penetration testing, and security incident investigations.
Requirements Qualifications & Experience
Bachelor's Degree in Information Security, Cybersecurity, Computer Science, or a related field OR a minimum of 6 years' equivalent experience in lieu of a degree
4+ years of experience in application security, DevSecOps, and security engineering OR a combination of 2+ years experience as a developer and 2+ years in application security, DevSecOps, and security engineering
Hands\-on experience with DevSecOps tools (SAST, DAST, SCA, container security, IaC security), integrating security solutions within CI\/CD pipelines, strong knowledge of secure coding principles (OWASP Top 10, SANS CWE Top 25), and familiarity with AI ML or LLM usage within security tooling.
Experience with vulnerability management, web app penetration testing tooling, and security certifications like CISSP, OSCP, GCPN, GCSA, AWS Security Specialty, or CSSLP are preferred.
Proficiency in Bot Management tooling, client\-side monitoring tooling, and implementing maturity measurement frameworks such as DSOMM or BSIMM in an enterprise setting.
Ability to understand and communicate best\-practice system architectures, data flows, and security controls within modern web applications and cloud (SaaS\/PaaS, IaaS).
Excellent verbal and written communication skills, with the ability to communicate complex security concepts to technical and non\-technical stakeholders.
"}}],"is Mobile":false,"iframe":"true","job Type":"Full time","apply Name":"Apply Now","zsoid":"641871163","FontFamily":"PuviRegular","job OtherDetails":[{"field Label":"Industry","uitype":2,"value":"Engineering"},{"field Label":"Work Experience","uitype":2,"value":"5+ years"},{"field Label":"City","uitype":1,"value":"Pittsburgh"},{"field Label":"State\/Province","uitype":1,"value":"Pennsylvania"},{"field Label":"Zip\/Postal Code","uitype":1,"value":"15205"}],"header Name":"Application Security Engineer","widget Id":"**********00072311","is JobBoard":"false","user Id":"**********00133003","attach Arr":[],"custom Template":"5","is CandidateLoginEnabled":true,"job Id":"**********06714003","FontSize":"15","google IndexUrl":"https:\/\/hdjassociates.zohorecruit.com\/recruit\/ViewJob.na?digest=UnBknG4YeUTpH3g.ao7JoWAjgPO2l6C2tdKjPQTIaoc\-&embedsource=Google","location":"Pittsburgh","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do"}
$79k-110k yearly est. 60d+ ago
Security Architect
Deloitte 4.7
Security architect job in Pittsburgh, PA
Are you an experienced, passionate pioneer in technology who wants to work in a collaborative environment? As an experienced SecurityArchitect you will have the ability to share new ideas and collaborate on projects as a consultant without the extensive demands of travel. If so, consider an opportunity with Deloitte under our Project Delivery Talent Model. Project Delivery Model (PDM) is a talent model that is tailored specifically for long-term, onsite client service delivery.
Recruiting for this role ends on 03/13/2026
Work you'll do/Responsibilities
* Responsible for supporting the team with secure network designs and regulatory requirements.
* Translate business objectives and risk management strategies into practical, secure technological solutions.
* Ensure security principles are infused at every level of the enterprise.
* Communicate regularly with Engagement Managers (Directors), project team members, and representatives from various functional and / or technical teams, including escalating any matters that require additional attention and consideration from engagement management
* Independently and collaboratively lead client engagement workstreams focused on improvement, optimization, and transformation of processes including implementing leading practice workflows, addressing deficits in quality, and driving operational outcomes
The Team
Our Cyber Operate offering develops and transforms cyber programs in line with a client's strategic objectives, regulatory requirements, and risk appetite. It keeps the enterprise a step ahead of the evolving threat landscape and gives stakeholders confidence in the organization's cyber posture. Includes design of the cyber organization, governance, and risk assessments.
Qualifications
Required
* Bachelor's degree, preferably in Computer Science, Information Technology, Computer Engineering, or related IT discipline; or equivalent experience
* 5+ years of proven experience as a SecurityArchitect
* Experience with information security engineering
* Experience with security compliance (NIST Cybersecurity Framework)
* Strong understanding of securearchitecture methodologies.
* Experience with incidence response
* Limited immigration sponsorship may be available
* Ability to travel 10%, on average, based on the work you do and the clients and industries/sectors you serve
Preferred
* Experience with Security Operations
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $90,000 to $150,000.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
Additional Requirements
Information for applicants with a need for accommodation: ************************************************************************************************************
Recruiting tips
From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters.
Benefits
At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you.
Our people and culture
Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work.
Our purpose
Deloitte's purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Learn more.
Professional development
From entry-level employees to senior leaders, we believe there's always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte" means Deloitte Consulting LLP, a subsidiary of Deloitte LLP. Please see ********************************* for a detailed description of the legal structure of Deloitte LLP and its subsidiaries.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Qualified applicants with criminal histories, including arrest or conviction records, will be considered for employment in accordance with the requirements of applicable state and local laws, including the Los Angeles County Fair Chance Ordinance for Employers, City of Los Angeles's Fair Chance Initiative for Hiring Ordinance, San Francisco Fair Chance Ordinance, and the California Fair Chance Act. See notices of various fair chance hiring and ban-the-box laws where available. Fair Chance Hiring and Ban-the-Box Notices | Deloitte US Careers
Requisition code: 321158
Job ID 321158
$90k-150k yearly 3d ago
Network and Security Services Solutions Architect*
Accenture 4.7
Security architect job in Pittsburgh, PA
We Are: Navisite, part of Accenture, has evolved to become a trusted digital transformation partner for growing and established global brands. We provide global capabilities, customer-centric solutions, and flexible approaches that are specifically rightsized for the needs of mid-market and small enterprise customers. This team specializes in digital transformation and managed services with deep expertise in cloud, infrastructure and application services dedicated to assisting clients in building a strong digital core. With experience across multiple cloud providers, enterprise applications and digital technologies, Navisite serves clients in the health and industrial, life sciences, technology, consumer goods and retail industries. Given their customer-centric solutions and flexible approaches, this team is adept at scaling our services for clients seeking to modernize and build more agile, resilient, and scalable businesses. The Navisite team of more than 1,400 members globally joined Accenture in January 2024. As part of Accenture, you will be working with an ambitious, collaborative team more empowered than ever to help customers modernize their IT for the AI era.
You Are:
An Enterprise Solution Architect with deep expertise in network architecture and cybersecurity who can translate complex requirements into clear, value‑led solutions.
You engage confidently with C‑level executives and technical stakeholders, simplify risk and resilience decisions, and shape architectures that are secure, scalable, and compliant.
As a Presales Solution Architect specializing in Security and Network, you will serve as the technical expert and trusted advisor during the sales process, designing secure, scalable, and compliant network and cybersecurity solutions tailored to customer needs and business objectives.
You will collaborate closely with sales, engineering, product management, and customers (including C‑suite) to qualify opportunities, develop solution architectures, lead technical presentations/demonstrations, and ensure successful transition to delivery.
The Work:
You operate as a Solution Architect across opportunities from targeted upgrades to large multi‑tower managed services deals spanning enterprise networking (LAN/WAN/WLAN, SD‑WAN, cloud networking) and security stacks (NGFW, VPN/ZTNA/SASE, IDS/IPS, SIEM/XDR/SOAR, identity‑centric and Zero‑Trust models).
You will co‑create solutions with clients; define operating models, SLAs, and KPIs; and align proposals to compliance frameworks and enterprise governance.
Lead Pre‑Sales Architecture & Solutioning:
+ Design and articulate high‑level network and cybersecurity architectures that align with customer requirements, compliance standards, and enterprise IT strategies.
+ Define reference designs for SD‑WAN/SASE/Zero‑Trust, cloud networking (Azure/AWS/GCP), segmentation, firewalls, and secure remote access.
+ Build delivery models (operate, enhance, transform) with clear SLAs, KPIs, RACI, and transition plans.
Qualify & Propose:
+ Collaborate with sales stakeholders to qualify opportunities and craft compelling technical proposals addressing risk, security posture, and network resilience.
+ Shape solution scope, assumptions, dependencies, and pricing inputs; contribute to SOWs and commercial terms with Legal/Commercial.
Client Engagements & Demonstrations:
+ Lead client engagements, including technical demonstrations, proofs of concept, pilots, and security assessments to evidence value and feasibility.
+ Present architecture rationale, trade‑offs, and value realization to IT leadership, CISOs, and business executives.
Trusted Advisory & Best Practices:
+ Advise customers on security best practices, emerging threats, network modernization, and resilience improvements.
+ Recommend controls and operating models aligned to ITIL, Zero‑Trust, and defense‑in‑depth principles.
Technology Mastery:
+ Develop and maintain deep understanding of technologies such as firewalls, VPN/ZTNA, IDS/IPS, SIEM, XDR, SOAR, cloud security platforms, network observability, and automation.
Compliance, Governance & Risk:
+ Ensure proposals meet enterprise security governance and regulatory compliance, including risk‑management frameworks and certifications relevant to customer environments (NIST, ISO 27001, PCI, SOC 2, FedRAMP, GDPR, etc.).
+ Lead internal Technology Delivery sign‑off aligning scope, risks, commercials, and feasibility.
Cross‑Functional Handover & Delivery Readiness:
+ Partner with engineering, delivery, and product teams to ensure smooth handover, readiness, and successful implementation.
+ Where appropriate, support early deal stabilization to de‑risk transition.
Thought Leadership:
+ Stay updated on industry trends, threat landscapes, and vendor roadmaps to continuously innovate offerings.
+ Support technical training, marketing presentations, and participation in industry events.
Travel may range from 0% to 100% depending on deal stage, client discussions, and business need
Here's what you need:
+ Minimum 8 years in a technology environment, specifically in a Network and Cybersecurity capacity
+ Minimum 5 years in solution planning, deal shaping, presales engineering, or enterprise solution architecture.
+ Minimum of 2 years of hands‑on experience and knowledge of network architectures (LAN/WAN, SD‑WAN/SDN, cloud networking) and security technologies: firewalls (Palo Alto, Cisco, Fortinet, Check Point), endpoint protection, IDS/IPS, SIEM/XDR/SOAR, ZTNA/SASE, VPN, and cloud security controls.
+ Understanding and familiarity with security frameworks and compliance standards (e.g., NIST, ISO 27001, FedRAMP, GDPR) and experience navigating customer accreditation processes.
+ Bachelor's degree or equivalent (12 years of work experience). If Associate's Degree: 6 years minimum relevant experience required
Bonus Points if:
+ You have relevant certifications (one or more preferred): CISSP, CCNP Security/CCIE Security, PCNSE, NSE, AZ‑500/AZ‑700, AWS Security/Specialty, GSEC/GCIH/GCIA.
+ You have experience designing Zero‑Trust, SASE, micro‑segmentation, and cloud‑native securityarchitectures; familiarity with automation/orchestration (Terraform, Ansible, Python).
+ You have strong understanding of ITIL service operations and managed‑service delivery models.
Compensation at Accenture varies depending on a wide array of factors, which may include but are not limited to the specific office location, role, skill set, and level of experience. As required by local law, Accenture provides a reasonable range of compensation for roles that may be hired as set forth below. We accept applications on an on-going basis and there is no fixed deadline to apply.
Information on benefits is here. (************************************************************
Role Location Annual Salary Range
California $73,800 to $218,800
Cleveland $68,300 to $175,000
Colorado $73,800 to $189,000
District of Columbia $78,500 to $201,300
Illinois $68,300 to $189,000
Maryland $73,800 to $189,000Massachusetts $73,800 to $201,300
Minnesota $73,800 to $189,000
New York/New Jersey $68,300 to $218,800
Washington $78,500 to $201,300
Requesting an Accommodation
Accenture is committed to providing equal employment opportunities for persons with disabilities or religious observances, including reasonable accommodation when needed. If you are hired by Accenture and require accommodation to perform the essential functions of your role, you will be asked to participate in our reasonable accommodation process. Accommodations made to facilitate the recruiting process are not a guarantee of future or continued accommodations once hired.
If you would like to be considered for employment opportunities with Accenture and have accommodation needs such as for a disability or religious observance, please call us toll free at **************** or send us an email or speak with your recruiter.
Equal Employment Opportunity Statement
We believe that no one should be discriminated against because of their differences. All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law. Our rich diversity makes us more innovative, more competitive, and more creative, which helps us better serve our clients and our communities.
For details, view a copy of the Accenture Equal Opportunity Statement (********************************************************************************************************************************************
Accenture is an EEO and Affirmative Action Employer of Veterans/Individuals with Disabilities.
Accenture is committed to providing veteran employment opportunities to our service men and women.
Other Employment Statements
Applicants for employment in the US must have work authorization that does not now or in the future require sponsorship of a visa for employment authorization in the United States.
Candidates who are currently employed by a client of Accenture or an affiliated Accenture business may not be eligible for consideration.
Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process. Further, at Accenture a criminal conviction history is not an absolute bar to employment.
The Company will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Additionally, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the Company's legal duty to furnish information.
California requires additional notifications for applicants and employees. If you are a California resident, live in or plan to work from Los Angeles County upon being hired for this position, please click here for additional important information.
Please read Accenture's Recruiting and Hiring Statement for more information on how we process your data during the Recruiting and Hiring process.
$78.5k-201.3k yearly 5d ago
Engineer - Information Security
Federated Hermes, Inc.
Security architect job in Pittsburgh, PA
* Bachelor Degree in Computer Science, Information Systems, Information Security or Networking, or equivalent work experience required; Master Degree preferred * Minimum of 5 years of practical experience in leading development and implementation of at least two information technology disciplines Azure or other Cloud environment, including technical architecture, network management, application development, middleware, database management or operations required
* Advanced, specialized technical skills in Security Technologies, including IAM, PAM required
* Experience with implementing and configuring Identity Security tools required
* Demonstrated ability to estimate the financial impact of architecture alternatives; to apply solutions to business problems; and, to quickly comprehend the functions and capabilities of new technologies required
* Functional knowledge of cloud environments such as Azure, Office 365, AWS and related security tools such as Security Center, Sentinel or similar tools required
* Extensive experience with Delinea, SailPoint, Active Directory and CrowdStrike technologies and Just-in-Time access methods
* Experience applying best practices to management and best practices for privileged accounts and privileged entitlements
* Experience applying best practices to service account management
* Experience applying best practice methodologies to securing cloud environments, such as Cloud Security Alliance, NIST required
MAJOR DUTIES:
* Design, develop, test and implement solutions to problems involving multiple technologies utilizing advanced specialized technical skills in the context of defined Reference Architectures
* May establish and administer standards and conventions in relevant technologies
* Stand up Microsoft Servers and other Security products
* Develop system documentation to convey designs and develop support documentation as appropriate
* Keep abreast of advances and developing trends and standards in technology
* Upgrade and patch security Equipment
* Develop interfaces from Corporate/Cloud servers to IAM/PAM technologies
* Assist in the identification, response, investigation, and remediation of potential breaches of and issues surrounding data security
* Consult and assist internal IT staff in proving out concepts to support migration of existing on-premises applications and infrastructure to Azure hybrid PaaS/IaaS deployment
* Assist in implementing CIS Controls for hardware and Software environments
* Ensure deliverables relative to project needs
* Apply best practice methodologies to securing the company's cloud environments and applications
* Review technical designs and specification for adherence to standards
* Conduct third party Vendor Security Reviews as needed
* Participate in task estimation and planning
HOURS/LOCATION:
* 8:30 a.m. - 5:00 p.m. (Overtime as required)
* Warrendale location (Hybrid schedule)
* Work at downtown location when required
EXPLANATORY COMMENTS:
* Good communication and interpersonal skills
* Good decision making and problem solving skills
* Good analytical skills with attention to detail and accuracy
* Ability to work on multiple projects simultaneously
* Ability to work effectively both individually and as a member of a project team
$81k-110k yearly est. 60d+ ago
Enterprise Infrastructure Patch and Security Engineer
All Lines Technology 3.3
Security architect job in Pittsburgh, PA
Purpose Reduce security risk and maintain patch compliance across Infrastructure Services using approved tooling and processes (Windows Server, Enterprise Linux, cloud/on‑prem, network devices, and assets in scope). What You'll Do
Own Security Remediation Program management aligned to Security's findings (Critical/High/Medium).
Plan, schedule, and execute monthly OS patching (Windows/Linux) with canaries, maintenance windows, and rollback.
Run zero-day/out‑of‑band patching with expedited assessment and change controls.
Deliver extended remediations (cipher/protocol, file rights, 3rd‑party updates) and coordinate vendor engagement.
Operate tooling: MECM/SCCM, Ansible, Rapid7, Ivanti ITSM, Cisco DNA, Panorama, Venafi; perform manual deployments where required.
Manage quarterly component updates and certificate lifecycle (PKI/DigiCert), including self‑signed to PKI migration feasibility.
Publish compliance reports, audit artifacts, and governance updates; chair weekly Security-Infrastructure standups.
What You'll Bring
5+ years in infrastructure security/patch management across Windows Server & Enterprise Linux (RHEL/others).
Hands‑on experience with MECM/SCCM, Ansible, Rapid7, Ivanti ITSM, Cisco DNA, Panorama, Venafi/PKI.
Strong ITIL change & incident management, CMDB updates, compliance reporting.
Scripting skills (PowerShell/Bash/Python), canary strategies, rollback procedures.
Nice‑to‑have: ITIL v4, Security+, RHCSA/RHCE, Microsoft Certified, CCNA/CCNP, GIAC/GVM.
How much does a security architect earn in Greensburg, PA?
The average security architect in Greensburg, PA earns between $99,000 and $208,000 annually. This compares to the national average security architect range of $92,000 to $179,000.
Average security architect salary in Greensburg, PA