You have successfully copied the job URL to clipboard!
Employment Type:
Location:
Job Category:
Job Number:
Job Description
What you will do
At Johnson Controls, we’re seeking a skilled Information Security Architect to join our Global Information Security team. In this role, you’ll collaborate with cybersecurity, IT, and business teams to design and implement robust security architectures, standards, and controls that protect our systems and data. You’ll play a key role in ensuring compliance, assessing security posture, and guiding secure technology deployments across the enterprise.
How you will do it
Design & Architecture
Develop and implement enterprise-wide security reference architectures.
Ensure alignment with global security standards and policies.
Approve final designs and validate builds for compliance.
Follow the Security Posture Assessment process, which involves research, validation, and evaluation of all new initiatives, with phase gates reviews presented to all stakeholders during the process.
Security Assessment & Compliance
Conduct security posture assessments for new initiatives.
Identify and mitigate risks in third-party solutions.
Ensure adherence to regulatory and internal security requirements.
Collaboration & Consulting
Partner with service management and stakeholders to gather requirements.
Act as a trusted advisor to business units and IT teams.
Provide expert input on security standards, roadmaps, and infrastructure.
Documentation & Communication
Create high-quality technical documentation, white papers, and presentations.
Communicate complex security concepts clearly to technical and non-technical audiences.
Continuous Improvement
Stay current on emerging threats, vulnerabilities, and technologies.
Recommend improvements in network, identity, and infrastructure security.
What we look for
Required
10+ years of experience implementing enterprise Identity and Access Management (IAM), Privileged Access Management (PAM) solutions in client environments.
Experience developing technical strategies, architectures, and roadmaps.
Outstanding communication and presentation skills. Able to articulate complex, technical concepts to non-technical audiences.
Experience defining and implementing delegation model.
Experience defining and implementing support scenarios for merger acquisition and divestitures.
Preferred
Experience hardening security for Active Directory, Windows, *nix OS.
Good knowledge of software development principles and design patterns.
Experience with IDaaS providers such as Microsoft, Okta, Ping Identity.
Experience with cloud architectures particularly Azure, AWS, GCP native IAM controls.
Experience with Identity Governance processes and solutions.
Knowledge of Applied Cryptography and PKI.
Development knowledge e.g. Python, Java, C#, .NET, Web Services, Shell programming/scripting.