Cybersecurity Senior Architect - Application Threat Modeler jobs in United States
cer-icon
Apply on Employer Site
company-logo

ICONMA · 1 day ago

Cybersecurity Senior Architect - Application Threat Modeler

ICONMA is a Commercial Banking company looking for a Cybersecurity Senior Architect - Application Threat Modeler. The role involves conducting threat modeling and risk identification, embedding security practices into the Technology Delivery Lifecycle, and collaborating with various teams to ensure secure application design.

Staffing & Recruiting
check
H1B Sponsor Likelynote

Responsibilities

Conduct structured threat modeling for applications, APIs, and services across the Technology Delivery Lifecycle (TDLC)
Identify potential threats, attack vectors, design flaws, and vulnerabilities that may impact delivery timelines, system security, or regulatory compliance
Assess risks to confidentiality, integrity, availability, and resiliency of business-critical systems
Embed security-by-design practices into each TDLC phase (requirements, design, build, test, deploy)
Collaborate with delivery teams to ensure security controls and mitigations are defined early and consistently implemented
Track and validate mitigation strategies throughout delivery cycles to ensure secure releases
Document threat models, risk scenarios, and security design considerations in clear, actionable reports
Deliver tailored risk communication to technical teams, product owners, and executive stakeholders
Provide risk ratings and recommendations to support informed go/no-go release decisions
Partner with architects, engineers, product managers, and delivery leads to balance security and business objectives
Act as a subject matter expert on secure application design, emerging attack vectors, and industry frameworks (e.g., STRIDE, PASTA, OWASP)
Mentor TDLC team members on threat modeling practices and proactive risk identification
Refine threat modeling processes, frameworks, and automation for scalability across delivery portfolios
Incorporate real-world threat intelligence, incident data, and vulnerability management findings into TDLC risk assessments
Contribute to the creation of reusable playbooks, secure design patterns, and threat libraries for enterprise-wide adoption

Qualification

Cybersecurity architectureThreat modelingApplication securityNetwork securityIncident responseEncryption technologiesDatabase securityCloud securityVirtualization technologiesRisk communicationContinuous improvementSoft skillsMentoringCollaboration

Required

Eight years of demonstrated experience of systems engineering and/or architecture in at least one of the information security areas: network security, access management, end point protection, data loss prevention, vulnerability management, application security, forensics, web security, mainframe, incident response and/or cyber threat management in a medium to large corporation
Highly experienced in network security architecture, including design tools, methods, and techniques and the application of Defense-in-Depth principles; knowledge of network design processes, including understanding of security objectives
Specialized depth and thorough Knowledge of The Open Group Architecture Framework (TOGAF), including infrastructure, data, information security, applications, architectural concepts, and associated disciplines
Deep knowledge of: Mainframe security, including access control, monitoring, integration with non-mainframe technologies, and virtualization
Authentication and authorization technologies including remote access
Application security and the security development lifecycle and ability to apply to client-server and web-based application development environments
Enterprise databases and database security, including database activity monitoring and database access control technologies
Encryption methods and technologies for data-in-transit and data-at-rest scenarios
Incident response processes
Denial of Service prevention mechanisms
Firewall technologies and intrusion prevention methods
Cloud technologies and hosting
Operating system hardening
Virtualization technologies
Mobile technologies
Encryption and key management technologies
Endpoint Protection (includes malware)
Data Loss Protection technologies
Experience with peripheral component interconnect and other security audit processes, evidence gathering and development/management of remediation plans used in resolution of finding

Preferred

Industry certifications in cyber security and forensics, such as CISSP, CFCE, GCFE, GCFA, GCIH and other related credentials preferred
Industry certifications in general technology (MCP, MCSE, Network+, etc)
Industry certifications in networking, such as CCNA, CWNA, and cloud security (AWS, Azure,and GCP)

Benefits

Health Benefits
Referral Program

Company

ICONMA: Your Partner in Global Staffing Solutions and Digital Transformation ICONMA is a globally recognized, Woman-Owned staff augmentation and technology consulting firm.

H1B Sponsorship

ICONMA has a track record of offering H1B sponsorships. Please note that this does not guarantee sponsorship for this specific role. Below presents additional info for your reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2025 (34)
2024 (31)
2023 (26)
2022 (39)
2021 (37)
2020 (69)

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Claudine George
Founder and CEO of ICONMA, LLC
linkedin
Company data provided by crunchbase