Job ID: TX-529601668 (913590409)
Hybrid/Local AWS Security Architect (CISSP/CISM/AWS/15+) with TCF/NIST, IAM/Zero Trust Architecture, threat modeling, microservices/APIs, CSPM, AI/LLM, PII/PHI experience
Location: Austin, TX (HHSC)
Duration: 3 Months
Position will be 3 days remote with 2 days (Mondays and Thursdays) required to be onsite at the location listed above. Program will only accept LOCAL ONLY candidates for this position.
Skills:
8 Required experience in information security and systems architecture
8 Required experience in information security and systems architecture Proven experience designing secure cloud-native architectures (AWS preferred)
8 Required In-depth knowledge of Texas Cybersecurity Framework (TCF) and NIST 800-53
8 Required Expertise in Identity and Access Management (IAM) and Zero Trust Architecture
8 Required Experience performing threat modeling for complex systems
8 Required Experience securing microservices, APIs, and containerized environments
8 Required Experience configuring cloud security posture management (CSPM) tools
8 Required Experience integrating security into DevSecOps pipelines
4 Preferred Familiarity with securing AI/LLM-based systems and data pipelines
4 Preferred Experience with data protection strategies for PII, PHI, and sensitive data
4 Preferred Experience presenting risk assessments to executive leadership
4 Preferred Ability to draft enterprise security policies and architecture standards
2 Preferred Certifications: CISSP, CISM, AWS Certified Security Engineer
Description:
8 or more years of experience, relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected.
Understands business objectives and problems, identifies alternative solutions, performs studies and cost/benefit analysis of alternatives. Analyzes user requirements, procedures, and problems to automate processing or to improve existing computer system: Confers with personnel of organizational units involved to analyze current operational procedures, identify problems, and learn specific input and output requirements, such as forms of data input, how data is to be; summarized, and formats for reports. Writes detailed description of user needs, program functions, and steps required to develop or modify computer program. Reviews computer system capabilities, specifications, and scheduling limitations to determine if requested program or program change is possible within existing system.
Cloud Security Architect Leads the design and implementation of secure-by-default architectures across cloud-native, microservices, and AI-enabled systems. Ensures compliance with state and federal frameworks while enabling modernization and transformation initiatives.
