Enterprise Security Architect

Enterprise Security Architect

Job ID 
Information Technology
Posting date 
Remote base 

Job description

Company description

At Red Hat, we connect an innovative community of customers, partners, and contributors to deliver an open source stack of trusted, high-performing solutions. We offer cloud, Linux, middleware, storage, and virtualization technologies, together with award-winning global customer support, consulting, and implementation services. Red Hat is a rapidly growing company supporting more than 90% of Fortune 500 companies.

Job summary

The Red Hat Information Technology team is looking for an Enterprise Security Architect to join us in Raleigh, NC. In this role, you will serve as part of Red Hat's Global Information Risk and Security team, which is responsible for ensuring confidentiality, integrity, and availability of Red Hat's systems and data. You'll be a key player in taking the Information Security program to the next level. Excellent communication skills are a must, as you represent the Information Risk and Security team to the business and advocate for security initiatives which contribute to Red Hat's overall success.

Primary job responsibilities

  • Assume a key role in developing and refining the information risk and security strategy
  • Develop and maintain strategic relationships with stakeholders, both internal and external
  • Consult to understand the business environment to design and deliver wide-reaching and cross-functional enterprise security enhancements
  • Use an extensive knowledge of the security landscape and threat intelligence to inform the information security program
  • Apply an understanding of information security, operational and technical concepts to deliver exceptional enterprise security outcomes
  • Consult on architectural and technical solutions for security controls to meet security requirements inclusive of business controls
  • Participate in architectural reviews of solutions and provide concrete feedback and specific recommendations for technical security controls
  • Provide project and technical leadership to multiple complex projects utilizing standard project methodologies and resource management
  • Ensure professional growth through participation in professional organizations, seminars, user groups, and industry networking
  • Quickly learn and adapt to business drivers to deliver risk mitigation to the organization
  • Educate technical subject matter experts on the implementation of security controls from both a technical and business perspective
  • Share knowledge and experience to mentor associates
  • Display pragmatism in balancing the implementation of security controls with time-to-market taking into account business risk

Required skills

  • Proven track record working in a position of trust
  • 10+ years of experience in information security field, with a minimum 5+ years of experience in security architecture, risk assessment, threat intelligence, or security program development
  • Excellent communication and interpersonal skills, including the ability to communicate to a variety of business stakeholders and executives
  • Experience delivering key elements of information security programs
  • Experience developing reusable solutions to meet the requirements of specific information security and data protection requirements
  • In-depth understanding of enterprise security technologies
  • Motivated and engaged professional with enterprise risk and security background
  • Knowledge of Software Development Life Cycles (SDLC) and enterprise software engineering experience is preferred
  • Certified Information System Security Professional (CISSP), Certified Information Privacy Professional (CIPP), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CSIRC) or similar credentials are a plus

Red Hat is proud to be an equal opportunity workplace and an affirmative action employer. We review applications for employment without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, ancestry, citizenship, age, uniformed services, genetic information, physical or mental disability, medical condition, marital status, or any other basis prohibited by law.

Red Hat does not seek or accept unsolicited resumes or CVs from recruitment agencies. We are not responsible for, and will not pay, any fees, commissions, or any other payment related to unsolicited resumes or CVs except as required in a written contract between Red Hat and the recruitment agency or party requesting payment of a fee.


Interested in this job?

Share on your newsfeed