This is a Hybrid role with 3 days in office per week. Are you an advanced security architect who is passionate about shaping the future of information security at a Fortune 500 technology company?  If yes, we invite you to join our dynamic information security architecture team where you’ll play a critical role with technologies, processes, integrated solutions, and most importantly people across the enterprise!We are seeking an experienced and visionary Information Security Architect with a profound systems-level understanding of how infrastructure, applications, and cloud services interact. This role places a strong emphasis on expertise in network security, defense in depth, cybersecurity resiliency, and associated capabilities. The successful candidate will possess exceptional communication and collaboration skills, enabling them to effectively tailor discussions to a diverse range of stakeholders. Your expertise and innovative thinking will directly impact the decisions related to the security of infrastructure and data. The Information Security Architect will be a key partner to various IT teams, including networking, data center/server, identity and access management, cybersecurity, cloud, and will proactively engage across the enterprise, collaborating with business functions such as engineering and manufacturing. This role requires a keen focus on details, strong organizational skills, and the ability to assess requirements and develop secure solutions that align with business objectives.ResponsibilitiesArchitecture Design and Assessment: Develop a comprehensive systems-level understanding of the organization's infrastructure, applications, and cloud services. Design and implement robust security architectures that support defense in depth technologies and cybersecurity resiliency. Design secure solutions for complex environments that focus on production quality, resource availability, workflow enablement and productivity.Cybersecurity Subject Matter Expertise: Provide subject matter expertise in network firewalls, intrusion detection / prevention, network segmentation, data protection in motion, network architecture, DNS, endpoint detection and response, network detection and response, data loss prevention, and other cybersecurity related solutions.Cybersecurity Representative for Operational Processes: Partner with key stakeholders, technical experts, and business leaders to support operational objectives, define strategies, architect and validate configurations, and design policies to safeguard against advanced threats and attacks. Represent information security in key approval processes such as change management, architectural review boards, firewall management, new technology implementation, and security integration.Collaboration and Communication: Collaborate closely with cross-functional IT teams including networking, data center/server, and cloud specialists. Tailor communication to effectively convey security concepts to technical and non-technical audiences across the organization. Business Partnership: Proactively engage with business units such as engineering, manufacturing, and other functions to understand their security needs and challenges. Translate these insights into effective security solutions that align with overall business objectives. Security Solutioning: Evaluate business requirements and technical constraints to identify, pilot, and design secure and innovative solutions. Ensure that security measures complement the organization's strategic and operational goals. Risk Assessment and Mitigation: Conduct technical security assessments and security architecture reviews to identify vulnerabilities and potential risks. Collaborate with teams to implement mitigation strategies and enhance overall security posture.Security Standards and Best Practices: Lead the development and maintenance of security standards, guidelines, and documentation related to systems architecture, network firewalls, and associated technologies. Continuous Learning: Stay up-to-date with emerging security trends, threats, and technologies. Apply this knowledge to enhance the organization's security framework.