Job Summary

Security Architect - Applications

  • Location:
    Littleton , Colorado
  • Category:
    Information Systems
  • Contract Type:
    Direct Hire
  • Job reference:

If you feel that you have met the requirements for the Security Architect - Applications, please apply. James Foley will be in contact with you as soon as possible.
Experience / Education
Non-negotiable (game breaker) skill sets  
• Strong Application Security Architecture experience
• Experience in an Oracle ERP Application environment
• Ability to balance security needs and risk with the needs of the business
• Ability to conduct infrastructure and application security assessments
• Experience developing security strategy plans and road maps based on sound enterprise architecture practices.
Must possess direct, documented and verifiable experience with the following applications:
• Oracle ERP Suite of products, Microsoft Azure, Java, Linux, Windows and other applications normally encountered in a global enterprise.
• Development or audit experience with one or more general coding languages (Java, C/C++, Python, JavaScript, PHP)
• Required Bachelor's or Master's Degree in Computer Science, Information Systems, Cybersecurity or a related field or equivalent and relevant experience (10 to 12 years).
• Certifications such as CISSP, CISM, or similar are a plus.
• Less than 25% travel required.
Primary Emphasis:  An individual contributor working in a collaborative, team environment with colleagues around the world.
This is not: A role for someone wanting to work by themselves or to dictate requirements without collaboration
Target start date: As soon as possible
Job Description Summary
Reporting to the Chief Security Officer (CSO) and as a member of the Enterprise Security Services team, the security architect plays an integral role working with other Security Architects in defining and assessing the organization's security strategy, architecture and practices with emphasis on application security. The security architect will be required to effectively translate business objectives and risk management strategies into specific security processes enabled by security technologies and services.
The security architect will be responsible for the following activities and functions:
•Develop and maintain an application security architecture process enabling the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology and threat drivers.
•Assist in the developing security strategy plans and roadmaps based on sound enterprise architecture practices.
•Develop and maintain application security architecture artifacts (models, templates, standards and procedures) that can be used to leverage security capabilities in projects and operations.
•Track developments and changes in the digital business and threat environments to ensure that these are adequately addressed in security strategy plans and architecture artifacts.
•Participate in application and infrastructure projects to provide security planning advice.
•Draft security standards, procedures and guidelines to be reviewed and approved by executive management and/or formally authorized by the CSO.
•Conduct security assessments of internal systems and applications as part of the overall risk management practice of the organization.
•Conduct vulnerability assessments and other security reviews of systems and applications, and prioritize remediation based on the risk profile of the asset and guidance from the CSO.
•As needed, provide input and expertise in the review and assessment of security and application logs for indicators of compromise (IOCs) or other anomalous behavior within applications.
•Be familiar with OWASP top ten application security flaws and how to mitigate them, the Security Development Lifecycle (SDL) and other secure coding practices.
•Conduct static and dynamic code reviews of applications to determine security flaws or other issues that would impact the confidentiality, integrity or availability of the system.
•Coordinate with DevOps and other teams to advocate secure coding practices and escalate concerns related to poor coding practices to the CSO or the individual responsible for the overall security direction.
•To ensure security-related matters are adequately conveyed, strong communications skill (written and oral to all levels in the organization) along with strategic planning, financial analysis, and project management skills are necessary.
•Other duties as assigned.
Job Complexity
•Is recognized as an expert within the organization, both within and beyond own function
•Anticipates internal and/or external business challenges and/or regulatory issues; recommends process, product or service improvements
•Solves unique and complex problems that have a broad impact on the business
•Contributes to the development of functional strategy
•Leads project teams to achieve milestones and objectives
•Progression to this level is typically restricted on the basis of business requirements
•Operates with no supervision in a complex environment
Negotiables (nice to have but not a game breaker)
•Knowledge of IT Infrastructure Technologies
What is in it for you? (change everything above this section)
•Skills development
•Performance coaching, Medical, dental, vision, paid time off, 401k domestic partners program and more.
•Community involvement opportunities

Apply Below


Note: Required fields marked with an asterisk (*).


Primary Number
[Ctrl (Cmd Mac) + Click] to select multiple industries
Upload your resume
Terms of Use


Upload your resume using

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.

Equal employment opportunity information:
EEO is the Law (poster) | EEO is the Law (poster supplement) | Reaffirmation of Affirmative Action Policy Statement