What you’ll be doing...

  • Develops in depth security architecture standards, frameworks and design patterns spanning all layers of product security from host, server, mobile, and network to application and data security.
  • Architects, designs, prioritizes, coordinates, and communicates the security technologies necessary to ensure a highly secure yet usable computing environment.
  • Provides security guidance across the product system development life cycle, including security architectural reviews.
  • Contributes to the development and implementation of security technology solutions for complicated and more complex environments and architecture.
  • Analyzes business impact and exposure based on emerging security threats, vulnerabilities and risks, and recommends technologies and solutions to mitigate them.
  • Stays current with security technologies and mobile security technologies and makes recommendations for use based on business value.
  • Works closely with other technology architects and stakeholders to ensure that security is properly represented in the product domain and to ensure
  • Actively communicates with stakeholders to drive awareness and understanding of security architecture roadmaps and directions.
  • Develops security architecture strategies that align to enterprise architecture strategy and the company's business strategy while tying directly to product security.

Technical Leadership

  • Maintains leadership role both in the security infrastructure space as well as acting an ambassador for his/her supported assets as part of enterprise initiatives.
  • Plays a pivotal role in the solution process serving as a technical stakeholder for his/her technology space ensuring that the proper foundation is set and can be maintained.
  • Acts as a subject matter expert in the technology space and has a strong understanding of the product roadmap, trends and industry practices.
  • Influences and leads the team to the ideal security infrastructure specification.
  • Drives the strategic vision for the technology space to align with the overall Technology Target, Business Strategy and standardization of assets.
  • Ensures adequate infrastructure monitoring, reporting, and alerting systems are in place.
  • Evaluates and recommends new technologies and techniques to improve infrastructure performance, availability, and scalability.
  • Acts as a subject matter expert on the implementation and capabilities of existing security controls.
  • Provides direction and thought leadership to enterprise-wide initiatives applying security principles such as access control, encryption, and host security as well as state of the art and emerging technologies such as cloud computing, mobile computing, and next generation architecture.
  • Identifies the need for new security technology solutions; designs, reviews and collaborates on the deployment of new solutions.
  • Acts as a resource for direction, training and guidance for less experienced staff.

Research and Development

  • Stays informed about the latest developments in the security field, including threats towards the organization, tools, attack vectors, and cutting edge preventative measures.
  • Participates in new products or technology solutions supported by appropriate ROI, total cost of ownership, and/or cost benefit analyses.
  • Helps to perform technical proof of concepts

What we’re looking for...

You'll need to have:

  • Bachelor’s degree or four or more years of work experience.
  • Six or more years of relevant work experience.
  • Experience with security architecture, compliance and/or risk management.

Even better if you have:

  • A degree.
  • Experience building security reference security architectures for hybrid/cloud scenarios.
  • Experience in helping enterprise customers deploy security solutions.
  • Experience advising customers on architectures meeting industry standards such as PCI DSS, ISO 27001, HIPAA, and NIST/DoD frameworks.
  • Experience working across multiple business units to achieve results.
  • Ability to think strategically about business, product, and technical challenges.
  • Knowledge of a wide range of system components including architecture, authentication, connectivity, system hardware and software components, virtualization, cloud computing, and mobile.
  • Ability to understand and suggest changes to system design choices in light of corporate security policy considerations and industry best security practices.
  • Ability to manage relationships with other business unit and external vendor stakeholders when security risks are present and system or process changes must be made to mitigate risk.
  • Ability to suggest appropriate controls based on product and corporate tolerance for risk.
  • Ability to monitor new developments in vulnerabilities and risks in security technology, as well as interpret and apply those to products.
  • Knowledge of product security and design, security and topology.
  • Knowledge of standard Product/ WAN/ Cloud technologies.
  • Ability to identify risk issues in product designs and communicate with key stake holders to address the risk and drive a solution.
  • Ability to write and modify product wide security policy.
  • Ability to create communication documents for all levels of understanding (high level to technical).
  • Knowledge of techniques and tricks used by hackers to gain entry into products
  • Knowledge of Operating Systems (OS's), their flaws, vulnerabilities and exposure to control circumvention Technical experience in security including architecture or security management, User, platform and device authentication, and various levels of access controls and authorization.
  • Enterprise class security products such as Identity Management, Web Access Management and Single Sign On. Working knowledge of application security, including Web Services and SOA, as well as Agile and DevOps. Mobile security and mobile development.
  • Knowledge of security for structured databases and unstructured data, such as access controls, encryption, monitoring and others.
  • Experience within the transformation of traditional data center security measures into industry adopted cloud technologies like Amazon Web Services, Azure, etc.
  • Ability to work with compliance frameworks and requirements such as PCI, HIPAA, SOX etc.
  • Knowledge on threat landscape, security threat and vulnerability management, and security monitoring and analytics.


When you join Verizon...

You’ll be doing work that matters alongside other talented people, transforming the way people, businesses and things connect with each other. Beyond powering America’s fastest and most reliable network, we’re leading the way in broadband, cloud and security solutions, Internet of Things and innovating in areas such as, video entertainment. Of course, we will offer you great pay and benefits, but we’re about more than that. Verizon is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Verizon.

Equal Employment Opportunity

We're proud to be an equal opportunity employer- and celebrate our employees' differences,including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. Different makes us better.