ITT is an industrial manufacturer of critical, engineered components that serve fast-growing end markets in transportation, flow, energy, aerospace and defense. The company’s differentiation is sustained through a combination of several factors: execution, the quality of its leadership and our DNA as an engineering leader. We have a clear purpose as an organization: to provide our customers with cutting-edge solutions to help solve their most critical needs.
The company generated 2023 revenues of $3.3 billion and is comprised of three distinct segments:
ITT is headquartered in Stamford, Connecticut with over 10,000 employees in more than 35 countries and sales in approximately 125 countries.
THIS POSITION IS FULLY REMOTE AND CANDIDATE CAN LIVE IN ANY US STATE
Under the direction of the Global CISO, this individual plays a crucial role in bridging the gap between cybersecurity, IT
and business operations. This person is expected to be both technically experienced and business-aligned as s/he
works with business stakeholders to identify needs and then designs solutions to close the gaps.
We are seeking an experienced and highly skilled Cybersecurity Architect to join our team. The successful candidate will
be responsible for designing, engineering, implementing, and maintaining robust security architectures that protect ITT's
digital assets from cyber threats. The Cybersecurity Architect will work closely with IT, Cybersecurity Operations, and
other business units to ensure security is integrated into all aspects of the organization's technology infrastructure, from
architecture to engineering and deployment. This role is responsible for ensuring that projects are effectively and
efficiently executed, as well as envisioning, recommending, and facilitating business changes to digitally transform,
automate, streamline, and ensure a highly available service offering for our internal and external customers.
The Cybersecurity Architect will be expected to participate and lead various efforts related to the successful service
delivery of cybersecurity services across the global enterprise, both proactively and reactively. This role interfaces with
several technical peers (and potentially business leaders) in the performance of these services. In performance of this
role, s/he will be involved in a myriad of different types of projects and solution design efforts, as well as taking on the
responsibility to assess current state landscape / architecture / solutions and devise a set of recommendations to
modernize a highly scalable and modern suite of service offerings.
This individual will be highly driven (“high motor”), able to balance active priorities, be meticulous and planful. They will
be comfortable addressing ambiguity, able to consistently deliver results, be naturally curious and highly accountable,
and approach situations in a thoughtful and process-oriented manner. S/he will be able to identify opportunities that
enable continuous business process improvement, leveraging information technology to design, engineer and maintain
highly available and high performing environments for our user community. This person will work closely with
individuals at all levels of the information technology organization and business partners (executives, peers, staff
members, individual contributors, cross-functional team members) to identify, recommend, develop, implement, and
support cost-effective technology solutions for all aspects of the global organization.
Collaborate with IT teams and external IT services partners to ensure that best practices are being followed and
that risk to ITT proprietary and customer data is protected.
· Cybersecurity Architecture Design:
o Develop and maintain security architectures and frameworks that align with industry best practices and
regulatory requirements.
o Design secure network, systems, application, and cloud architectures, ensuring they are resilient to
cyber threats.
o Create security models, frameworks and standards to guide the organization’s cybersecurity practices.
o Cybersecurity engineering and administration of tools owned and managed by the Cybersecurity team.
· Cybersecurity Engineering:
o Lead the engineering and implementation of security solutions, including firewalls, encryption protocols,
Secure Email Gateways, SASE, DLP, and Security Information and Event Management (SIEM) tools.
o Develop and integrate security automation scripts and tools to enhance the organization’s security
posture.
o Work with development and operations teams to implement security controls within day-to-day IT
operations and CI/CD pipelines.
Education:
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field;
Professional certifications such as CISSP, CISM, CEH, or GDSA.
Experience: Minimum of 7 years of experience in cybersecurity, with a focus on architecture, engineering, and design.
Plus a total of at least 12 years of experience in IT, in an architecture or systems design focused role. The ideal
candidate will have a broad set of experiences (operations, engineering, and architecture) ranging subject matter areas
including but not limited to cloud architecture & security design, networking architecture & protocols, systems
architecture & design, SDLC models and best practices.
Skills/Knowledge:
· Strong knowledge of security frameworks (e.g., NIST CSF and 800-53 and 171, ISO/IEC 27001) and regulatory
requirements (e.g., GDPR, CMMC, NIS2).
· Experience with cloud security (IaaS, PaaS, SaaS, IDaaS, etc), network security, application security, and
endpoint protection.
· Proficiency in security technologies, including firewalls, encryption, IDS/IPS, SIEM, SASE, EDR and VPNs.
· Experience with automation tools and scripting languages (e.g., Python, PowerShell) for security automation.
· Excellent problem-solving and analytical skills.
· Strong communication skills, with the ability to explain complex security concepts to non-technical stakeholders.
· Experience with secure software development practices and DevSecOps.
· Familiarity with containerization and microservices security (e.g., Docker, Kubernetes).
· Experience with identity and access management (IAM) solutions.
· Knowledge of advanced threat detection techniques and tools.
· Proficiency in security operations and vulnerability management.
· Experience with Windows and Linux system administration.
· Knowledge of and experience with OT environments and ICS systems
Competencies/Traits:
- Highly self-motivated and self-directed.
- Proven experience to automate processes and work to drive repeatable outcomes.
- Passion for renewal and continuous improvement to drive performance and innovation.
- Comfortable with hands-on approach to addressing complex problems to gain a grounded and granular
understanding, make informed decisions and take appropriate actions
- Ability to be challenged with ambiguous situations; dissect and plan the work that simplifies the work for themselves
and others, with a focus on delivering results.
- Passion for data and innovation.
- Proven ability to manage multiple projects to completion while maintaining quality standards and project deadlines.
- Understands when new or alternate solutions are necessary and begins discussions with IT management and
business/functional partners to identify needed improvements to the solution/service framework.
- Leverages experience collaborating across cultures and organizations.
- High focus on interpersonal and cultural understanding across disparate teams work settings by initiating
conversations with others.
- Shares information proactively, directs workflows to leverage the expertise of individuals, and promotes a team
approach to achieve common goals.
- Provides solutions/services that conform to approved industry frameworks within his or her domain or country that
support best practices and standardization and meet requirements for risk, security, maintenance, scalability, and
performance. Initiates conversations with his/her manager and customers/partners when new, customized, or non-
standard solutions may be necessary.
- Leverages existing solutions, knowledge base, and best practices, and works within the approved
policy/governance framework.
- Gains trust by listening effectively, being open and transparent, and demonstrating results that the customer,
business, or function values.
- Demonstrates a sense of pride in the quality of his/her own work, and a willingness to take initiative to meet the
challenges of the customer, business, or function.
- Promotes accomplishments while holding others accountable for results.
- Excellent written and oral communication skills.
- Effective interpersonal skills, with a focus on listening and questioning skills.
- Strong documentation skills.
- Ability to conduct research into a wide range of computing issues as required.
- Ability to absorb and retain information quickly.
- Ability to present ideas in user-friendly language to non-technical staff and end users.
- Keen attention to detail.
- Ability to effectively prioritize and execute tasks in a high-pressure environment.
- Experience working in a team-oriented, collaborative environment.
- Self-directed, self-starter and strong analytical & problem-solving skills.
- Ability to work well under stress.
#LI-REMOTE
#CORP
#LI-BS1
Software Powered by iCIMS