- Company Name
- Little Caesars Pizza
- Job Title
- Cybersecurity Architecture Engineer II
- Job Description
-
Job title: Cybersecurity Architecture Engineer II
Role Summary: Design, implement, and validate secure infrastructure across cloud, campus, and on‑premises environments. Act as subject‑matter expert on architecture, threat assessment, and security integration, ensuring alignment with business objectives.
Expectations: Deliver architecture solutions with minimal supervision; maintain documentation, perform threat modelling, and advise cross‑functional teams. Operate in fast‑paced, dynamic settings and contribute to open collaboration.
Key Responsibilities:
- Develop and enforce security architecture plans for hybrid IT landscapes.
- Conduct threat assessments, model potential risks, and design controls.
- Define and document platform‑specific security baselines, policies, and procedures (segmentation, VPN, firewalls, monitoring, IAM, SSO, conditional access, secrets management).
- Integrate security solutions into existing and new systems, ensuring compliance with frameworks and standards.
- Provide technical security advisories and best‑practice guidance to project teams.
- Review project designs for security adequacy, recommend improvements, and track implementation.
- Collaborate with stakeholders to prioritize business functions and embed security across operations.
- Maintain up‑to‑date documentation of requirements, designs, and post‑implementation reviews.
Required Skills:
- Proficiency with SIEM, DLP, IDS/IPS, firewalls, and encryption tools.
- Deep knowledge of security frameworks, zero‑trust architecture, IAM, and access control.
- Strong analytical, problem‑solving, and communication skills.
- Ability to manage multiple priorities and deliver on tight deadlines.
Required Education & Certifications:
- Bachelor’s degree in Computer Science, Information Security, Cybersecurity, or related field.
- 5+ years of experience in cybersecurity, focused on architecture and design.
- Advanced degree or certifications such as CISSP, CCSP, or equivalent preferred.