US Citizen
Green Card
EAD (OPT/CPT/GC/H4)
H1B Work Permit
Corp-Corp
W2-Permanent
W2-Contract
Contract to Hire
Consulting/Contract
UG :- - Not Required
PG :- - Not Required
No of position :- ( 1 )
Post :- 12th Jan 2026
1. Perform Threat Analysis & Create/Update the Threat Modelling
The Information Security Architect performs threat analyses for complex technical designs and reports the results using standard templates.
? The Information Security Architect creates the initial Threat Modelling (with new applications/systems) or updates an existing Threat Modelling (with upgraded applications/systems).
? The Information Security Architect tracks critical and high findings and updates the respective changes in the Threat Modelling.
2. Derive Security Requirements
? Given application or system descriptions, the Information Security Architect derives security requirements that will match the respective level of abstraction.
3. Review Design and Report Issues
? The Information Security Architect reviews the design documents with respect to
o Fulfilment of security requirements
o (Common) design errors
o Already known design shortcomings (are they fixed or not)
? The Information Security Architect submits a written report that lists all shortcomings and suggestions on how to fix them.
4. Review Implementation and Report Issues
? The Information Security Architect reviews the implementation with respect to
? Fulfilment of security/design requirements
? (Common) implementation errors,
? Already known implementation shortcomings (e.g., from Code scan or Pen Testing, are they fixed or not?)? The Information Security Architect submits a written report that lists all shortcomings and suggestions on how to fix them.
5. Review Project Security Planning and Report Issue
? The Information Security Architect reviews various project management documents with respect to o plausibility of effort estimates for planned security tasks,
o plausibility of cost estimates for planned security tasks,
o overall plausibility of the timeline for security tasks,
o the overall progress of security, o completeness of planned security tasks o security budget planning,
o ordering status of mandatory security services,
o mandatory security-related tasks? The Information Security Architect submits a written report that lists. o all shortcomings, together with suggestions on how to fix them,
o all possible risks to achieving project goals that relate to information security.6. Cyber Security Incident Management? Responsible for end-to-end cyber security incident management process.7. Various Expert Consulting
? The Information Security Architect will answer explicit questions on various security-related subjects, e.g. on
o Information Classification, o Security aspects of project management,
o Technical information security, etc.
o Cryptography,
o Cloud Security,
o TPRM
? Third-Party Risk Management
o Vulnerability Review and Assessment,
o Dev Sec-ops
o Security Tools
o Audit Support (External and Internal)
8. Technical Security Tasks
? Given the necessary input, the Information Security Architect will perform complex tasks with a specific, well-described result.
Competencies: Cyber Security - Information Security
Experience (Years): 10 & Above