What you will do

    Johnson Controls is looking for an Information Security Architect. The role is part of the Global team, reporting into the Chief Security Architect. Our new colleague will partner closely with technology (Cybersecurity, IT) and business teams to generate new security architectures, technical standards, controls, and processes which protect Johnson Controls systems and data. As part of Security Posture Assessment, the individual will ensure compliance with established architecture direction and standards is followed during deployment. Works with Service Management and Stakeholders to collect functional requirements and ensure the most effective solution is used.

    How you will do it

    The responsibilities of the Information Security Architect include, but are not limited to:

    • Design and follow-up on the implementation of security reference architectures across the enterprise and in Global Information Security
    • Review system security measures and security processes and recommend enhancements. Ensure that controls, current designs and processes are adequate to protect the sensitive information systems
    • Produce high-quality security architecture specifications, white papers, technical documentation, roadmaps and presentation materials
    • Provide technical input into security related standards, technology roadmaps, support requirements and management infrastructure designs
    • Make recommendations for improvements in network, identity and access & identity management and infrastructure based on current industry standards
    • Stay knowledgeable of current advances in all areas of information technology concerning vulnerabilities, security breaches or malicious attacks
    • Follow the Security Posture Assessment process, which involves research, validation, and evaluation of all new initiatives, with phase gates reviews presented to all stakeholders during the process
      • Design Approval. Approve the finished design, ensuring it follows company policies and procedures
      • Build approval. Validate that the project has implemented a system that conforms to company policies and procedures.
    • Provide team support with validating security controls
    • Identifies relevant risks for third party solutions that are assessed
    • Acts as an internal consultant to business units and Infrastructure IT
    • Provides management with accurate and complete status information

    What we look for

     The successful candidate will be a passionate information security professional with the ability to communicate to different business and Project managers. The candidate will be able to execute the Information Security architecture management strategy defined by leaders. The candidate will demonstrate drive, intelligence, maturity, and energy and will be a proven team leader and security strategist. 

    Required

    • A minimum bachelor’s degree in computer engineering, computer security or computer science discipline or equivalent experience
    • 3-5 years of information security related experience working with teams in security operations, incident analysis, developing applications, and security applications. 
    • Advanced understanding of tools and techniques used by attackers to gain entry into corporate networks, including common IT system flaws and vulnerabilities
    • Demonstrated knowledge on threat landscapes and threat modelling, security threat and vulnerability management, and security monitoring
    • Broad technical experience in several security disciplines including endpoint and platform (Unix/Linux/Windows, mobile) controls, encryption/tokenization, identity and access management, PKI, data protection, Cloud Security (AWS, GCP, Azure), network security (web proxies, reverse proxies, load balancing, IDS/IPS, firewall, wireless, and remote connectivity) and security tooling integration in complex environments
    • Knowledge of network security architecture, understanding of the TCP/IP protocol, and remote access security techniques/products.
    • Expert ability to analyse and identify risks in network and system designs and communicate with key stakeholders to address the risk and drive a solution
    • Demonstrated experience in communicating complex security concepts, both verbally and in writing, to a variety of audiences 
    • Candidate must be able to react quickly, decisively, and deliberately in high stress situations 
    • Highly motivated individual with the ability to self-start, prioritize, multi-task and work in a global team setting
    • Ability to create and maintain good business relationships with counter parts, customers, and external entities to achieve the security operations management goals
    • Ability to maintain a high level of discretion and personal integrity in the exercise of duties, including the ability to professionally address confidential matters
    • Familiarity of regulatory compliance requirements (PCI-DSS, HIPAA, FISMA, SOX)
    • Familiarity in National Institute of Standards and Technology (NIST) as they apply to FISMA 

     Desired Certifications (but not required): 

    • Certified Information Systems Security Professional (CISSP)
    • Certified Cloud Security Professional (CCSP)
    • Certified Information Systems Security Professional - Information Systems Security Architecture Professional (CISSP-ISSAP)
    • Certified Information Security Manager (CISM)
    • Certified Information Systems Auditor (CISA)
    • Certified Ethical Hacker (CEH)
    • Cisco Certified Network Associate Security (CCNA Security)
    • Cisco Certified Network Associate (CCNA)
    • Cisco Certified Network Professional Security (CCNP Security)
    • Cisco Certified Network Professional (CCNP)
    • Server Platform Certifications (Microsoft, Linux)
  • *
    *
    *
    *
    *
    *
    Import LinkedIn profile
    or

    My Information

    My Experience

    Application Questions

    Review

    My Information

    My Experience

    Application Questions

    Review

    *

    Contact Information
    I confirm that I am submitting this electronic application on my own behalf, and not on behalf of any other person, and that the information contained in this application is my own personal information. I hereby affirm that the information provided during the application process and any accompanying documents attached including my resume/CV or provided during any discussion or interviews, are true and complete to the best of my knowledge. To the extent permitted by applicable local law, I authorize Johnson Controls and its affiliates, subsidiaries and operating segments (collectively, the Company) to investigate all statements in this application and accompanying documents and to secure any necessary information from all my employers, references, and educational institutions.

    I understand that should I receive an offer of employment with Johnson Controls, such offer is conditional on successful completion of all aspects of the application process including such background and reference checks as are applicable and permitted under local law. Submission of this electronic application by me does not constitute to me an offer of employment, an employment agreement or any other contractually binding commitment by Johnson Controls.

    I understand and agree that the information submitted by me will be used, disclosed and stored in accordance with Johnson Control's Privacy Notice, which I have fully reviewed and accept. For individuals located in the United States, applicants are not required to provide any age related information and/or graduation date(s). We will transfer your personal information across borders in accordance with the Privacy Notice. To the extent permitted by applicable local law, by clicking the button below, you consent to the cross-border transfer of your personal information. For individuals located in China: please read the Addendum – Rules on Cross Border Transfer of personal information for China (HR Management). By clicking the button below, you consent to Johnson Controls collecting, processing and transferring your personal information (including sensitive personal data) in accordance with our Privacy Notice and the Addendum for China.

    To provide you with the most effective recruiting process, Johnson Controls may use artificial intelligence (“AI”) to help us better understand how your candidate information matches the requirements of the role you have applied to. We may process your answers to the application and qualification questions, information in your resume, and, if applicable, information from your Johnson Controls personnel record, using tools that rely on AI. All hiring decisions will be made by the hiring team after considering your candidate profile in full. These tools help us to match the information provided by you with the job and preferred qualifications. All hiring decisions will be made by our hiring team after considering your candidate profile in full, and the use of AI insights is just one of the tools and one of numerous factors that we use to help us evaluate candidates and reach a decision.

    Johnson Controls would also like to consider you for additional and future job openings, and we may use AI to help with this process. These AI tools help us understand how your candidate information matches the requirements of future job openings (using the same process as described above). Johnson Controls recruiters may use these insights to help them decide whether to reach out to you to regarding a future job opening. If you are located in the United Kingdom or European Union, the use of the AI insights is necessary for Johnson Controls’ legitimate interests to provide a streamlined and efficient recruitment process, and to consider you for future roles. Please note, the use of AI insights is just one of the tools and one of many factors our recruiters use to help evaluate candidates for upcoming roles.

    DO NOT E-SIGN UNTIL YOU HAVE READ THE ABOVE STATEMENT.
    *
    Work Experience
    Work Experience
    Remove
    + Add work experience
    Education
    Education
    Remove
    + Add education
    Skills
    Please provide your relevant Skills
    Websites
    Add any relevant websites (include https:// in URL)
    Website
    Remove
    + Add websites
    Application Questions

    Personal Information
    Johnson Controls values a diverse and inclusive workplace. Providing this information will help us to ensure our recruitment practices promote equality of opportunity.
    Your response to the self-identification questionnaire below is voluntary. It is however mandatory to answer the questions, even if you choose not to provide the information.
    The information will be kept anonymous and your answer will be treated with the strictest confidence and protected from misuse. We assure you that your answers will be used only for the purposes of monitoring our equal opportunities policy and will not be used by us to make any unlawful decisions affecting you, whether in a recruitment exercise or during the course of any employment with us.

    You are not obliged to provide this information and you will not suffer any penalty if you choose not to do so.
    My Information
    Edit Hide
    My Experience
    Edit Show
    Application Questions
    Edit Show
Go to Top