image
  • Snapboard
  • Activity
  • Reports
  • Campaign
Welcome ,
loadingbar
Loading, Please wait..!!

Consultant Cybersecurity V

  • ... Posted on: Feb 20, 2026
  • ... TekWissen LLC
  • ... Services - See below for details, California
  • ... Salary: Not Available
  • ... Full-time

Consultant Cybersecurity V   

Job Title :

Consultant Cybersecurity V

Job Type :

Full-time

Job Location :

Services - See below for details California United States

Remote :

No

Jobcon Logo Job Description :

Overview:
TekWissen is a global workforce management provider headquartered in Ann Arbor, Michigan that offers strategic talent solutions to our clients worldwide.
Job Title: Consultant, Cybersecurity V
Location: Rosemead, CA, 91770
Duration: 12 Months
Job Type: Temporary Assignment
Work Type: Onsite
Shift: M-F 8-5
Job Description:
Job duties may include:
  • Manages and oversees large, long range, or multiple complex projects; develops project scope, cost estimates, human resource requirements, work plans, time schedules, communication plans, and makes work assignments to meet project or program objectives...
Education/Experience:
  • Bachelor Degree in applicable profession, business, or technical discipline or an equivalent combination of education, training, and experience.
  • Project Management certification preferred. Possesses one to three years of project management experience.
Day-to-Day Responsibilities/Workload
  • Client is looking for a Cybersecurity Architect to bridge the gap between IT, engineering, product, and Cyber Security teams to evaluate and design security solutions across enterprise Cybersecurity technology environments (on-premises, hybrid, SaaS, and where applicable, cloud).
  • You will translate business objectives and regulatory requirements into security architectures, standards, and repeatable patterns that enable delivery teams to build securely.
  • Additionally, you will serve as a subject matter expert and technical leader for Cybersecurity architecture and technology.
Responsibilities
  • Serves as a trusted cyber security architecture subject matter expert (SME), aligning security solutions to strategic objectives, business outcomes, and risk posture across enterprise technology domains Partners with business, IT, and cyber stakeholders to elicit and scope end-user requirements; translates needs into clear security architecture guidance, control objectives, and design recommendations
  • Evaluates technical feasibility and architecture tradeoffs for proposed solutions, ensuring security requirements are practical, scalable, and consistent with enterprise standards
  • Owns, develops, and maintains enterprise security reference architectures, secure design patterns, and guardrails for common capabilities (e.g., identity, network security, endpoint/workload protections, application security, data protection, logging/monitoring, and secure remote access)
  • Establishes and governs security architecture principles aligned to recognized security engineering practices (e.g., least privilege, defense-in-depth, secure-by-design, segmentation) and drives adoption through standards, architecture review, and enablement
  • Conducts architecture and design reviews for new initiatives and major changes; documents security decisions, assumptions, residual risks, and compensating controls, and recommends actionable remediation paths
  • Defines security requirements and control objectives for platforms, systems, and services; ensures requirements are measurable, testable, and traceable through implementation and validation (while not owning delivery execution)
  • Collaborates with the Cybersecurity Technology team to shape product/technology roadmaps, maturity paths, and prioritized capability improvements based on threat landscape, business direction, and architecture gaps
  • Fosters strong relationships with senior leaders and stakeholders to understand and map business priorities, advising on how to engage security architecture to enable secure, timely outcomes
  • Develops and maintains security architecture documentation (standards, patterns, diagrams, decision records) and provides technical guidance, coaching, and mentorship to uplift engineering and cyber team capabilities
Required Skills/Attribute
  • Ten or more years of experience in information technology, information security and/or cybersecurity
  • Experience designing security architectures for enterprise-scale environments, including identity, network segmentation, data protection, and security monitoring
  • Working knowledge of control design and implementation (e.g., IAM, MFA, encryption, logging/monitoring, vulnerability management, endpoint/workload protections)
  • Experience partnering with engineering and infrastructure teams to deliver secure solutions in iterative delivery models; ability to translate security requirements into actionable technical designs
  • Ability to communicate complex technical concepts to diverse audiences and produce clear architecture artifacts (reference architectures, standards, patterns, and risk decision records)
Desired Skills/Attributes
  • Bachelor s or Master s degree in Cybersecurity, Computer Science, Information Systems, or a related field.
  • Three or more years of experience in cloud cybersecurity.
  • Strong collaboration, communication, and stakeholder engagement skills. Experience designing and architecting cloud cybersecurity solutions. Experience as a technical leader or mentor.
  • Experience architecting security for hybrid environments (on-prem, cloud, and SaaS), including secure connectivity, segmentation, and identity boundaries
  • Familiarity with secure SDLC/DevSecOps practices and common tooling (code scanning, dependency scanning, configuration and policy validation, and CI/CD security controls)
  • Experience with Zero Trust concepts, identity governance, privileged access management (PAM), and strong authentication/conditional access strategies
  • Experience defining logging/telemetry requirements and partnering with SOC/SIEM teams to develop detections, response playbooks, and measurable security outcomes
  • Knowledge of security frameworks and control mapping (e.g., NIST, CIS, ISO 27001) and experience supporting audits and compliance initiatives
  • Strong ability to influence without authority and drive adoption of standards through enablement, reusable patterns, and practical guardrails that improve developer and operator experience
TekWissen Group is an equal opportunity employer supporting workforce diversity.

Jobcon Logo Position Details

Posted:

Feb 20, 2026

Employment:

Full-time

Salary:

Not Available

City:

Services - See below for details

Job Origin:

CIEPAL_ORGANIC_FEED

Share this job:

  • linkedin

Jobcon Logo
A job sourcing event
In Dallas Fort Worth
Aug 19, 2017 9am-6pm
All job seekers welcome!

Consultant Cybersecurity V    Apply

Click on the below icons to share this job to Linkedin, Twitter!

Overview:
TekWissen is a global workforce management provider headquartered in Ann Arbor, Michigan that offers strategic talent solutions to our clients worldwide.
Job Title: Consultant, Cybersecurity V
Location: Rosemead, CA, 91770
Duration: 12 Months
Job Type: Temporary Assignment
Work Type: Onsite
Shift: M-F 8-5
Job Description:
Job duties may include:
  • Manages and oversees large, long range, or multiple complex projects; develops project scope, cost estimates, human resource requirements, work plans, time schedules, communication plans, and makes work assignments to meet project or program objectives...
Education/Experience:
  • Bachelor Degree in applicable profession, business, or technical discipline or an equivalent combination of education, training, and experience.
  • Project Management certification preferred. Possesses one to three years of project management experience.
Day-to-Day Responsibilities/Workload
  • Client is looking for a Cybersecurity Architect to bridge the gap between IT, engineering, product, and Cyber Security teams to evaluate and design security solutions across enterprise Cybersecurity technology environments (on-premises, hybrid, SaaS, and where applicable, cloud).
  • You will translate business objectives and regulatory requirements into security architectures, standards, and repeatable patterns that enable delivery teams to build securely.
  • Additionally, you will serve as a subject matter expert and technical leader for Cybersecurity architecture and technology.
Responsibilities
  • Serves as a trusted cyber security architecture subject matter expert (SME), aligning security solutions to strategic objectives, business outcomes, and risk posture across enterprise technology domains Partners with business, IT, and cyber stakeholders to elicit and scope end-user requirements; translates needs into clear security architecture guidance, control objectives, and design recommendations
  • Evaluates technical feasibility and architecture tradeoffs for proposed solutions, ensuring security requirements are practical, scalable, and consistent with enterprise standards
  • Owns, develops, and maintains enterprise security reference architectures, secure design patterns, and guardrails for common capabilities (e.g., identity, network security, endpoint/workload protections, application security, data protection, logging/monitoring, and secure remote access)
  • Establishes and governs security architecture principles aligned to recognized security engineering practices (e.g., least privilege, defense-in-depth, secure-by-design, segmentation) and drives adoption through standards, architecture review, and enablement
  • Conducts architecture and design reviews for new initiatives and major changes; documents security decisions, assumptions, residual risks, and compensating controls, and recommends actionable remediation paths
  • Defines security requirements and control objectives for platforms, systems, and services; ensures requirements are measurable, testable, and traceable through implementation and validation (while not owning delivery execution)
  • Collaborates with the Cybersecurity Technology team to shape product/technology roadmaps, maturity paths, and prioritized capability improvements based on threat landscape, business direction, and architecture gaps
  • Fosters strong relationships with senior leaders and stakeholders to understand and map business priorities, advising on how to engage security architecture to enable secure, timely outcomes
  • Develops and maintains security architecture documentation (standards, patterns, diagrams, decision records) and provides technical guidance, coaching, and mentorship to uplift engineering and cyber team capabilities
Required Skills/Attribute
  • Ten or more years of experience in information technology, information security and/or cybersecurity
  • Experience designing security architectures for enterprise-scale environments, including identity, network segmentation, data protection, and security monitoring
  • Working knowledge of control design and implementation (e.g., IAM, MFA, encryption, logging/monitoring, vulnerability management, endpoint/workload protections)
  • Experience partnering with engineering and infrastructure teams to deliver secure solutions in iterative delivery models; ability to translate security requirements into actionable technical designs
  • Ability to communicate complex technical concepts to diverse audiences and produce clear architecture artifacts (reference architectures, standards, patterns, and risk decision records)
Desired Skills/Attributes
  • Bachelor s or Master s degree in Cybersecurity, Computer Science, Information Systems, or a related field.
  • Three or more years of experience in cloud cybersecurity.
  • Strong collaboration, communication, and stakeholder engagement skills. Experience designing and architecting cloud cybersecurity solutions. Experience as a technical leader or mentor.
  • Experience architecting security for hybrid environments (on-prem, cloud, and SaaS), including secure connectivity, segmentation, and identity boundaries
  • Familiarity with secure SDLC/DevSecOps practices and common tooling (code scanning, dependency scanning, configuration and policy validation, and CI/CD security controls)
  • Experience with Zero Trust concepts, identity governance, privileged access management (PAM), and strong authentication/conditional access strategies
  • Experience defining logging/telemetry requirements and partnering with SOC/SIEM teams to develop detections, response playbooks, and measurable security outcomes
  • Knowledge of security frameworks and control mapping (e.g., NIST, CIS, ISO 27001) and experience supporting audits and compliance initiatives
  • Strong ability to influence without authority and drive adoption of standards through enablement, reusable patterns, and practical guardrails that improve developer and operator experience
TekWissen Group is an equal opportunity employer supporting workforce diversity.

Loading
Please wait..!!