CrawlJobs Logo

Threats architect

nicollcurtin.com Logo

Nicoll Curtin

Location Icon

Location:
Malaysia

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

A leading global bank is seeking a Threats Architect within the Information & Cyber Security (ICS) – Identity & Access Management (IAM) organization to lead the strategy and architecture for identity access controls and identity threat detection and response capabilities. This role defines and drives the roadmap for protecting the bank’s identities, platforms, and critical applications from identity-based attacks. The Threats Architect will address emerging risks including non-human identities (NHIs), Artificial Intelligence, and digital assets, while aligning cybersecurity capabilities with business and regulatory requirements. The role works closely with cybersecurity, engineering, architecture, and risk teams and reports to the Head of IAM Threats Architecture and Controls.

Job Responsibility:

  • Define the strategy, roadmap, and architecture for identity threat detection and response capabilities
  • Leverage MITRE ATT&CK, MITRE DEFEND, and cyber threat intelligence to design detection and response controls
  • Address emerging risks related to AI, digital assets, and non-human identities
  • Serve as the subject matter expert for identity threats and identity security controls
  • Define capability metrics, KPIs, and reporting frameworks
  • Maintain IAM security standards, policies, and control documentation
  • Evaluate and support selection of identity security technologies
  • Align cybersecurity capabilities with business priorities and strategic objectives
  • Partner with engineering, security operations, architecture, and risk teams to deliver capabilities
  • Translate security requirements into business outcomes and technology solutions
  • Provide technical leadership to engineers and architects working on identity security solutions
  • Collaborate with vendors and external partners where required
  • Design and enhance identity access control and threat detection capabilities
  • Support automation, process optimization, and agile delivery practices
  • Develop and operationalize identity threat response runbooks with cyber operations teams
  • Ensure alignment with cybersecurity standards, regulatory requirements, and internal governance frameworks
  • Maintain audit readiness and centralized audit trails for identity security controls
  • Identify and manage program risks, dependencies, and escalations

Requirements:

  • 15+ years cybersecurity experience
  • 8+ years in cyber threat detection, response, or threat intelligence
  • Strong expertise in MITRE ATT&CK and DEFEND frameworks
  • Experience designing threat detection and response solutions
  • Knowledge of enterprise identity platforms (Active Directory, Entra ID, Okta, SailPoint)
  • Familiarity with cloud platforms (Azure/AWS) and enterprise infrastructure security
  • Understanding of AI-related threats and non-human identity risks
  • Strong stakeholder management, communication, and strategic delivery skills
  • Experience in banking, financial services, or regulated industries preferred
  • Bachelor’s degree in Cyber Security, Computer Science, Engineering, or related field
  • Relevant certifications such as GOSI, GSOA, GCIA, GEIR, or GCIH
  • Experience with security technologies including Microsoft Defender, CrowdStrike, Palo Alto Cortex, CyberArk, BeyondTrust, Entra ID, Okta, or SailPoint

Additional Information:

Job Posted:
March 19, 2026

Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Threats architect

Principal Security Architect

As a Security Architect, your role involves designing, reviewing, and enhancing ...
Location
Location
United States , San Francisco
Salary
Salary:
164000.00 - 290000.00 USD / Year
ethoslife.com Logo
Ethos
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 7+ years of experience in Information Security with at least 2 years as a Security Architect
  • Bachelor’s Degree in Computer Science or related field, or an additional 3 years of pertinent work involvement preferred
  • Strong knowledge of prevalent security architectures, frameworks, standards and emerging threats along with strategies and technologies for defense
  • Deep understanding of network protocols, operating systems, databases, applied cryptography, least privilege, zero trust principles, identity & access management, and other core information security concepts
  • Expertise in cloud computing and its associated best security practices encompassing applications, infrastructure, storage, platforms, and data security
  • Ability to conduct threat modeling and risk assessments
  • Ability to come into our San Francisco, CA office once a week
Job Responsibility
Job Responsibility
  • Conduct Threat Modeling & Architectural Assessments to cover all Information Security domains to ensure Security by Design
  • Assess technologies and solutions to develop and enrich security capabilities
  • Identify security gaps and communicate associated business risks to relevant stakeholders
  • Craft solutions that harmonize business needs with security and compliance requirements
  • Verify the effectiveness of security controls in mitigating identified risks
  • Assist engineering projects across the Software Development Life Cycle (SDLC) and collaborate to prioritize product security elements effectively
  • Apply expertise in information security and application development to instigate organizational shifts aimed at managing and resolving security weaknesses and vulnerabilities
  • Contribute to the creation of security policies, standards, and guidelines
  • Devise and implement frameworks for data classification, retention, and disposal to ensure alignment with data privacy regulations
  • Spearhead initiatives for data security awareness and training
  • Fulltime
Read More
Arrow Right

IAM Architect

Sopra Steria offers tailored, end-to-end corporate technology and software solut...
Location
Location
Netherlands , Nieuwegein
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • A bachelor's or master’s degree in business administration, Cybersecurity, Information Technology, Computer Science or an equivalent
  • At least 2 years of experience in IAM business analysis or consulting, with hands-on experience with one or more leading IGA, PAM and/or CIAM solutions
Job Responsibility
Job Responsibility
  • Keeping Identity & Access Management processes reliable and implementing new solutions
  • Conducting threat analysis, risk management, and incident response
  • Implementing firewalls and conducting vulnerability assessments
  • Collaborating effectively with other departments
What we offer
What we offer
  • Flexible, location-independent work
  • Laptop, phone and home office necessities
  • A competitive salary and indefinite contract
  • A company car or mobility budget
  • 27 days paid time off (20 fixed days + 7 bonus days)
  • Fulltime
Read More
Arrow Right

Enterprise Security Architect

The leading technical authority of design, implementation, and validation of Cyb...
Location
Location
United States , Broomfield
Salary
Salary:
140000.00 - 190000.00 USD / Year
hunterdouglas.com Logo
Hunter Douglas
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Expert knowledge of security best practices (encryption, data protection, design, privilege access, etc.)
  • Expert knowledge and experience with managing and implementing standard security technologies (DLP, MDM, SIEM, AV, IDS)
  • Solid knowledge in compliance management and certification (PCI, GDPR, CCPA)
  • Solid knowledge of network technologies (protocols, design concepts, access control)
  • Solid knowledge of identity technologies (protocols, design concepts, access control)
  • Solid knowledge of application technologies (protocols, design concepts, access control)
  • Expert knowledge to demonstrate excellent written and verbal communication
  • Expert knowledge and proficiency in planning, reporting, establishing goals and objectives, standards, priorities, and schedules
  • Bachelor’s degree or equivalent in related field
  • Minimum of 5 years’ experience in a principal Security Engineer or Architect role
Job Responsibility
Job Responsibility
  • Threat intelligence and threat landscape: Continuously obtain updated, accurate threat intelligence to update the company’s threat landscape
  • Control design: Ideate, suggest, and design solutions to identified risks, including process modifications, improved configurations, and technology selection
  • Process improvements: Build, align, and update Cybersecurity standards, operating procedures, and other documentation to ensure effective Cybersecurity adherence across the company
  • Procurement: Develop requirements for InfoSec vendor selection for new and replacement technologies and services
  • Implementation: Lead the onboarding of technology-related projects to ensure alignment with the company’s security policies, guidelines, and processes. The candidate will also need to lead other Security Engineers and analysts in project deployment, driving the execution and completion of initiatives
  • Technical authority: Assist Security Engineers and Analysts with the management and operation of Cybersecurity tools as needed, including EDR, firewall, email security, vulnerability management, application security, and identity systems
  • Bake security into the business: Interfaces with management and the user community to understand business needs, implement security best practices, and identify opportunities for improving security and compliance
  • Improve security awareness: Partners with the training and professional development staff to promote security awareness among the user community with lessons from the field. Champions the continuous improvement of Cybersecurity across all entities
  • Planning: Review and develop the company’s overall security program and manage multiple security projects in each period
  • Incident response: Support incident response processes to ensure thoroughness and effectiveness
What we offer
What we offer
  • Bonus target range: 35-40%
  • Generous benefits package including medical, dental, vision, life, disability
  • A company culture that prioritizes internal development and professional growth
  • Time off with pay
  • 401(k) plan with a degree of employer matching
  • Paid parental leave
  • Wellness programs and product discounts
  • Fulltime
Read More
Arrow Right

Enterprise Security Architect

The leading technical authority of design, implementation, and validation of Cyb...
Location
Location
United States , Broomfield
Salary
Salary:
140000.00 - 190000.00 USD / Year
hunterdouglas.com Logo
Hunter Douglas
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Expert knowledge of security best practices (encryption, data protection, design, privilege access, etc.)
  • Expert knowledge and experience with managing and implementing standard security technologies (DLP, MDM, SIEM, AV, IDS)
  • Solid knowledge in compliance management and certification (PCI, GDPR, CCPA)
  • Solid knowledge of network technologies (protocols, design concepts, access control)
  • Solid knowledge of identity technologies (protocols, design concepts, access control)
  • Solid knowledge of application technologies (protocols, design concepts, access control)
  • Expert knowledge to demonstrate excellent written and verbal communication
  • Expert knowledge and proficiency in planning, reporting, establishing goals and objectives, standards, priorities, and schedules
  • Bachelor’s degree or equivalent in related field
  • Minimum of 5 years’ experience in a principal Security Engineer or Architect role
Job Responsibility
Job Responsibility
  • Threat intelligence and threat landscape: Continuously obtain updated, accurate threat intelligence to update the company’s threat landscape
  • Control design: Ideate, suggest, and design solutions to identified risks, including process modifications, improved configurations, and technology selection
  • Process improvements: Build, align, and update Cybersecurity standards, operating procedures, and other documentation to ensure effective Cybersecurity adherence across the company
  • Procurement: Develop requirements for InfoSec vendor selection for new and replacement technologies and services
  • Implementation: Lead the onboarding of technology-related projects to ensure alignment with the company’s security policies, guidelines, and processes. The candidate will also need to lead other Security Engineers and analysts in project deployment, driving the execution and completion of initiatives
  • Technical authority: Assist Security Engineers and Analysts with the management and operation of Cybersecurity tools as needed, including EDR, firewall, email security, vulnerability management, application security, and identity systems
  • Bake security into the business: Interfaces with management and the user community to understand business needs, implement security best practices, and identify opportunities for improving security and compliance
  • Improve security awareness: Partners with the training and professional development staff to promote security awareness among the user community with lessons from the field. Champions the continuous improvement of Cybersecurity across all entities
  • Planning: Review and develop the company’s overall security program and manage multiple security projects in each period
  • Incident response: Support incident response processes to ensure thoroughness and effectiveness
What we offer
What we offer
  • Bonus target range: 35-40%
  • Generous benefits package including medical, dental, vision, life, disability
  • A company culture that prioritizes internal development and professional growth
  • Time off with pay
  • 401(k) plan with a degree of employer matching
  • Paid parental leave
  • Wellness programs and product discounts
  • Fulltime
Read More
Arrow Right

Senior Product Security Researcher

As a Product Security Researcher at Island, you will dive deep into the security...
Location
Location
Israel , Tel Aviv
Salary
Salary:
Not provided
island.io Logo
Island
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong understanding of browser internals, OS security mechanisms, or application-layer security
  • Proficiency in one or more programming/scripting languages (e.g., Python, JavaScript, C/C++, Go)
  • Experience in vulnerability research, bug hunting, reverse engineering, or exploit development
  • Familiarity with common vulnerability classes (e.g. RCE, memory corruption, sandbox escapes)
  • Curiosity-driven mindset with a passion for breaking things and understanding how they work
  • Experience with fuzzing tools, debuggers, or reverse engineering frameworks is a strong plus
Job Responsibility
Job Responsibility
  • Vulnerability Research: Identify and analyze vulnerabilities in browser components, system integrations, and third-party libraries relevant to the Island Enterprise Browser
  • Security Testing & Tooling: Develop custom tooling and automation for security testing, fuzzing, and vulnerability detection tailored to our product stack
  • Threat Modeling: Collaborate with developers, architects, and the Product Security Lead to assess threat scenarios and attack surfaces for new features and integrations
  • Exploit Prototyping: Build proof-of-concepts to validate the impact and exploitability of discovered security issues
  • Collaboration & Knowledge Sharing: Support development teams in secure coding practices, and contribute to internal knowledge bases and playbooks
  • Security Research Enablement: Stay ahead of the curve by tracking current exploits, security trends, and techniques
  • attend or present at security conferences and engage with the broader security community
  • Fulltime
Read More
Arrow Right

Lead SIEM Engineer

Are you ready to take the lead in shaping one of the most advanced SIEM environm...
Location
Location
United Kingdom , Farnborough
Salary
Salary:
70000.00 - 75000.00 GBP / Year
thepeoplenetwork.co.uk Logo
Fynity
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong hands-on experience leading SIEM engineering projects using platforms such as Splunk, Sentinel or QRadar
  • A deep understanding of cybersecurity frameworks and best practice (NIST, ISO, CIS, PCI DSS)
  • Scripting ability in Python, PowerShell and Regex for tuning and automation
  • Excellent communication skills and the ability to collaborate across teams and projects
  • DV Clearance must be eligible and willing to obtain
Job Responsibility
Job Responsibility
  • Leading the design, development and tuning of SIEM content – rules, dashboards, alerts and reports that spot threats fast
  • Acting as the technical authority on SIEM engineering, ensuring the platform runs efficiently and delivers real value
  • Working with SOC Analysts, Threat Hunters and Architects to enhance SIEM use cases and boost detection accuracy
  • Bringing new ideas and threat intelligence to evolve the SIEM strategy and stay ahead of emerging risks
  • Mentoring junior engineers, setting standards, and helping shape the future of SIEM operations
  • Fulltime
Read More
Arrow Right

Cyber Security Soc Analyst

The SOC Analyst (L1/L2) and Lead are responsible for proactive monitoring, detec...
Location
Location
India , Chennai
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong knowledge of SIEM platforms and alert investigation
  • Advanced incident response, malware analysis, and RCA expertise
  • Deep knowledge of endpoint and network security tools
  • Threat hunting and forensic investigation capabilities
  • Familiarity with vulnerability management and DLP/email security
  • Experience with threat intelligence platforms and TTP mapping
  • Strong analytical, communication, and documentation skills
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
Job Responsibility
Job Responsibility
  • Proactive monitoring, detection, investigation, and response to security threats using industry-leading solutions
  • Guide and architect SOC workflows and systems to ensure robust organizational security
  • Threat hunting and forensic investigation
  • Administer DLP and email security systems
  • Operate Microsoft Defender for Endpoint, conduct threat hunting via EDR telemetry and memory dumps
  • Use, configure, and optimize SIEM tools (Splunk, IBM QRadar, Microsoft Sentinel, LogRhythm, ArcSight, Elastic SIEM) for threat identification and alert management
  • Guide development of SOC procedures/runbooks and continuous improvement initiatives
  • Leadership and team management
What we offer
What we offer
  • Inclusive and respectful work environment
  • Positions open to people with disabilities
  • Fulltime
Read More
Arrow Right

Senior Product Security Low-Level Researcher

As a Product Security Low-Level Researcher at Island, you will focus on deep tec...
Location
Location
Israel , Tel Aviv
Salary
Salary:
Not provided
island.io Logo
Island
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong understanding of operating system internals, kernel architectures, or driver development (Linux, Windows, macOS, or mobile OSes)
  • Hands-on experience with low-level programming in C/C++, Rust, or assembly
  • scripting experience (e.g., Python) for tooling and automation
  • Background in kernel vulnerability research, driver auditing, exploit development, or advanced reverse engineering
  • Deep familiarity with low-level vulnerability classes (e.g., UAF, race conditions, logic bugs, privilege escalation, sandbox and isolation bypasses)
  • Experience with kernel debuggers, fuzzers, emulation, or virtualization-based analysis frameworks
  • Strong curiosity and research mindset, with a passion for understanding systems at their lowest layers and breaking assumptions they rely on
Job Responsibility
Job Responsibility
  • Low-Level Vulnerability Research: Research and discover vulnerabilities in operating system kernels, drivers, system services, virtualization layers, and low-level system components relevant to Island’s execution and trust boundaries
  • Kernel & OS Internals Analysis: Analyze kernel subsystems (memory management, scheduling, IPC, filesystems, networking) and OS security primitives to identify design flaws, logic bugs, and exploitation opportunities
  • Exploit Development & Validation: Develop proof-of-concept exploits for kernel- and driver-level issues to validate impact, assess exploitability, and inform mitigation strategies
  • Security Testing & Tooling: Design and build custom tooling for kernel fuzzing, syscall/interface testing, driver analysis, and low-level instrumentation across supported platforms
  • Cryptography & Trust Mechanisms: Assess the implementation and usage of cryptographic primitives, key management, secure boot, attestation, and hardware-backed security features, identifying weaknesses or misuse patterns
  • Threat Modeling at the System Level: Collaborate with architects, platform engineers, and the Product Security Lead to model threats across privilege boundaries, boot chains, isolation mechanisms, and OS-level integrations
  • Research Enablement & Knowledge Sharing: Track emerging exploitation techniques, kernel research, and advanced persistent threat tradecraft
  • contribute findings to internal playbooks, design guidance, and long-term security strategy
Read More
Arrow Right