Cyber Security Architect
Shelton, CT 06484, USA
Req #1562
Tuesday, April 29, 2025
We are Subway Headquarters! A dedicated team of professionals supporting thousands of franchisees around the globe.
Region: Shelton, CT Ready for a fresh, new career? Look no further because one of the world's most iconic brands can help you get there. Why Join Us? At Subway, "better" is baked into our DNA. We are a brand that believes in continued improvement ... in our lives, our businesses, and our planet. From the handshake that started our very first sandwich shop to earning our position as one of the world's leading restaurant brands, we've always embraced change and the path ahead. And today, we're making better living way easier. Our purpose is about more than the food we serve in our restaurants. It's centered on fueling healthy businesses and healthier lives. It is one of the most exciting times to join the Subway team and contribute to our transformational journey. About the Role: We have an exciting opportunity to support our Information Security team as a Cyber Security Architect based in Shelton, CT. The Cyber Security Architect is responsible for designing, implementing, and maintaining a comprehensive security architecture that protects the organization's information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. This role will work closely with executive leadership, IT teams, and business units to ensure that security measures align with the organization's strategic objectives and regulatory requirements. If you feel that this is the role for you, and you are successful with your application, be ready to be Bold, Empowered, Accountable, and ready to have Fun in a fast paced and agile working environment. Responsibilities include but are not limited to:
- Identify, assess, and prioritize security risks to inform the development of mitigation strategies.
- Create, implement, and enforce security standards, policies, and procedures to ensure compliance with industry best practices and regulatory requirements.
- Advise executive leadership and business units on security matters, including risk management, compliance, and incident response.
- Keep abreast of emerging security threats and technologies to ensure that the organization's security posture remains effective.
- Oversee security-related projects, including the implementation of new security technologies and the remediation of security vulnerabilities.
- Design, implement, and manage a robust security architecture that addresses the organization's specific needs and risks.
- Security Architecture Design & Implementation: The cornerstone responsibility is to design, build, implement, and provide ongoing support for robust, scalable, and enterprise-class security systems and architectures. You will create security blueprints for significant IT projects and initiatives, developing reference architectures, and ensure systems are configured securely from the outset.
- Threat & Vulnerability Management: Architects are tasked with proactively identifying, analyzing, and effectively communicating current and emerging security that impact the organization - creating architectural elements and controls aimed at mitigating these identified threats as they evolve.
- Cybersecurity Management: This involves conducting comprehensive assessments and analyses to understand Subway's security posture and potential exposures. Identify security design gaps or weaknesses in both existing and proposed architectures, recommending necessary changes or enhancements. Balancing Subway's business requirements and operational needs with information and cybersecurity imperatives.
- Technology Oversight & Approval: The role includes planning, researching, evaluating, and selecting appropriate security technologies, encompassing both hardware and software solutions. You will review and ensure that IT designs account critical security components and best practices.
- Security Testing & Validation: To ensure the effectiveness of security designs, you will oversee rigorous security testing activities, such as vulnerability testing, penetration testing, and broader security assessments to validate security or weaknesses.
- Identity and Access Management (IAM): You are responsible for designing, implementing, executing, and maintaining the organization's IAM security architecture. This includes enforcing principles like least privilege access for all users and systems.
- Incident Response Leadership: In the event of a security incident, the Security Architect is expected to respond immediately and play a key role in the response effort. This may involve providing technical guidance, leading response efforts, developing response plans, and conducting post-incident analyses to understand root cause.
- Team Guidance & Training: As senior technical lead, you will provide supervision, technical guidance, and mentorship to members of the security team, including engineers and analysts. They may also be responsible for leading security awareness training programs for the wider organization to foster a security-conscious culture.
- Communication & Reporting: Effective communication is crucial. You will regularly convey vital information regarding security posture, emerging threats, strategic needs, project priorities, identified risks, and architectural decisions to diverse audiences, including upper management, business stakeholders, and technical implementation teams. This includes meticulous documentation of architectures, policies, standards, and procedures.
Qualifications:
- Bachelor's in Computer Science or related field, or relevant experience.
- 8 or more years in Information Security, with a focus on architecture and design (minimum 2 years).
- Strong understanding of security frameworks and standards (e.g., NIST Cybersecurity Framework, ISO 27001, PCI DSS).
- Proven ability to develop and implement comprehensive security strategies.
- Comprehensive knowledge of networking, its core protocols and controls (OSI stack, VPNs, IDS/IPS, WAF) is fundamental. As well as proficiency with various operating systems (e.g., Windows, Linux/Unix, mobile OS) is necessary.
- Cloud Security: Strong knowledge of major cloud platforms (Amazon Web Services - AWS, Microsoft Azure, Google Cloud Platform - GCP) and their specific security features and services is essential. An understanding of frameworks like the NIST Cloud Computing Reference Architecture is preferred.
- Cryptography: A solid understanding of cryptographic concepts, algorithms (symmetric, asymmetric), protocols (SSL/TLS), and technologies is required. This includes practical knowledge of encryption techniques for data at rest and in transit, digital signatures, Public Key Infrastructure (PKI), and Certificate Authorities (CAs).
- Security Frameworks: Must be knowledgeable in various security, risk, and control frameworks that guide security practices (e.g., NIST CSF, NIST SP 800-53, and SANS CIS Controls.
- Endpoint Security: Knowledge of endpoint protection platforms (EPP), endpoint detection and response (EDR) technologies , and device hardening techniques is required to secure user devices and servers.
- Vulnerability Management & Testing: Practical experience with vulnerability assessment tools and methodologies is necessary. Proficiency in penetration testing techniques and approaches, threat modeling methodologies, and performing comprehensive risk analysis. Familiarity with security tools like SIEM platforms, network analysis, and IDS/IPS is required.
- Application Security: Strong understanding of secure software development practices and application security principles is important. Knowledge of API and web application security is essential, as well as familiarity with Open Web Application Security Project (OWASP) concepts.
- Scripting/Automation: Proficiency in scripting languages such as Python or PowerShell is preferred.
- Excellent communication and interpersonal skills, with the ability to effectively communicate with technical and non-technical stakeholders.
- Strong leadership and management skills, with the ability to motivate and inspire a team.
- Experience with security technologies, including firewalls, intrusion detection systems, encryption, and identity and access management.
- Certifications such as CISSP, CISM, or CISA are preferred.
- Experience with cloud security and cloud-based applications.
- Knowledge of data privacy regulations (e.g., GDPR, CCPA).
- Experience with incident response and disaster recovery planning.
- Strong analytical and problem-solving skills.
- Indirectly influence -Ability to use negotiation and persuasion to build consensus and gain cooperation.
- Proactively identifies problems/risks for all domain in a project and communicates these issues early to help course-correct.
- Expert in their domain.
- Collaborates on a project level.
What do we Offer?
- Insurance Plans (Medical/Life)
- 401K
- Competitive Bonus
- Mobility Allowance
- Tuition Reimbursement
- Company Holidays
- Volunteering time
- And Many More.....
Actual pay is determined based on a number of job-related factors including skills, education, training, credentials, qualifications, scope and complexity of role responsibilities, geographic location, performance, and working conditions.
The Company is only considering applicants who are currently authorized to work in the country the position is based. AA/EOE/D/V
Other details
Job Family Information Security
Pay Type Salary
|