serp_jobs.breadcrumb.workplace_remote Architect serp_jobs.h1.location_city
serp_jobs.job_alerts.create_a_job
Architect • hialeah fl
- serp_jobs.job_card.promoted
Cybersecurity Architect
VirtualVocationsOlympia Heights, Florida, United States- serp_jobs.job_card.promoted
Technical Architect
Infinite Computer SolutionsMiami, FL, USArchitect
AtkinsRéalisMiami, FL, USPlatform Solution Architect
Atlas AirMiami, FL, United StatesProject Architect
GpacMiami, Florida, United StatesPrincipal Architect
ADPMiami, FLArchitect Lead
jobbotMiami, FLNaval Architect
Royal Caribbean GroupMiami, FL, USCybersecurity Architect
Expert Technology ServicesMiami, Florida, USA- serp_jobs.job_card.promoted
Security Architect (Firewall)
RIT SolutionsMiami, FL, US- serp_jobs.job_card.promoted
SAP Finance Architect
United ITMiami, FL, USProject Architect
RS&HMiami, FL, US- serp_jobs.job_card.promoted
Interior Architect
GenslerMiami, FL, USSolution Architect
BoardMiami, FLSolution Architect
Board InternationalMiami, FL, US- serp_jobs.job_card.promoted
Cloud Architect
RyderMiami, FL, US- serp_jobs.job_card.new
IT Architect
ASSURE IT SOLUTIONS LLCMiami, FL, United StatesConversation Architect
AldeaMiami, FL, USData Architect.
Millennium ManagementMiami, Florida, US of AmericaCybersecurity Architect
VirtualVocationsOlympia Heights, Florida, United States- serp_jobs.job_card.full_time
A company is looking for a Cybersecurity Architect to design and implement secure solutions across its global technology environment. Key Responsibilities Design secure architectures for enterprise and operational technology (OT) environments Contribute to the development of security reference architectures and design patterns Participate in architectural reviews and threat modeling sessions Required Qualifications Bachelor's degree in cybersecurity, computer science, information systems, or a high school diploma / GED with 4+ years of military cybersecurity training and experience 5+ years of experience in cybersecurity, IT, or software development 3+ years of experience with secure SDLC, DevSecOps, or Zero Trust principles