|US or Canada (Remote)
|Preferred GIAC Certifications
At Algonquin-Liberty, we hire passionate people who care about doing the right thing for our customers. We are entrepreneurial, creative, and outcome-focused. Here, your natural talent and achievements will flourish in an inclusive environment of teamwork, trust and continuous learning. We are always pursuing excellence to exceed our ambitions goals, rewarding both the goal outcome and how we achieve it.
The Architect, Cybersecurity is the principal subject matter expert within the cybersecurity group. The role partners with teams across the Information Technology, Operational Technology, and Business units to provide technical expertise and security architecture solutions. The Architect, Cybersecurity provides end-to-end advisory services to the enterprise and management tapping into intricate technical knowledge covering a broad range of competencies. The Architect, Cybersecurity develops and maintains business, systems, and IT/OT process to support enterprise mission needs and requirements; translates technology and environmental conditions (e.g., legal & regulatory) into IT/OT requirements and standards describing Algonquin-Liberty’s target security architectures. The Architect, Cybersecurity operates independently and autonomously with little or no direct supervision.
Provide technical and security expertise to IT and business teams to identify security technology solutions and develop security reference architectures and strategies to achieve business results. Ensure appropriate implementation of security technology and reference architectures within both the development and production environments.
Analyze user needs and requirements to plan architecture.
Design and develop enterprise-wide security architecture and strategy for all aspects of the security domain in alignment with the business strategy and goals. Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements. Provide input on security requirements to be included in statements of work and other appropriate procurement documents.
Provide technical guidance and security expertise in the areas of secure application development, security architecture risk management and assessment, security policies and standards, security architectures and implementations.
Provide technology and security expertise and advice to leadership in the development of strategic security technology and plans to support business strategies. Translate proposed capabilities into technical requirements.
Establish, maintain, and enhance relationships with business and technology partners. Communicate status to key stakeholders on a regular basis.
Maintain awareness of trends and issues in area of security expertise, evaluate new security technologies or technology opportunities, and provide analysis of their potential impact to advantage the business.
Develop and maintain security reference architectures encompassing the full stack of Algonquin-Liberty technology
Education and Experience
University - Bachelor degree or equivalent experience
10-15 years of cybersecurity experience
CISSP, CCSP, CISM, GIAC Certifications (GDSA, GCIP, GICSP, GMON, etc.)
Expert knowledge of authentication, authorization, and access control methods.
Expert knowledge of computer algorithms
Expert knowledge of encryption algorithms
Expert knowledge of cryptography and cryptographic key management concepts
Expert knowledge of database systems
Expert knowledge of embedded systems
Expert knowledge of system fault tolerance methodologies
Expert knowledge of how system components are installed, integrated, and optimized
Expert knowledge of human-computer interaction principle
Expert knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
Ability to design architectures and frameworks
Skill in applying cybersecurity methods, such as firewalls, demilitarized zones, and encryption
Expert knowledge of network access, identity, and access
Expert knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services
Expert knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs
Expert knowledge of parallel and distributed computing concepts
Expert knowledge of key concepts in security management (e.g., Release Management, Patch Management).
Expert knowledge of configuration management techniques
Expert knowledge of cloud computing