Network Security Architect

Verizon Verizon · Telecom · Southlake, TX +4

Network Security Architect role focused on designing, implementing, and managing security solutions for Verizon's core, edge, and access networks. Responsibilities include threat monitoring, incident response, vulnerability management, security architecture definition, and threat hunting, with an emphasis on automation and scripting.

What you'd actually do

  1. Identifying technology gaps to lead in the design, architecture, and implementation of appropriate security solutions.
  2. Creating formal guidelines, policies, and procedures to ensure smooth and error-free operations.
  3. Driving and leading relevant, strategic solutions in a highly scalable environment, and leading the implementation of said solutions.
  4. Partner across the Operations, Engineering, and Planning organizations to ensure secure design patterns are embedded into new deployments and major changes
  5. Working independently on strategic technical challenges.

Skills

Required

  • Bachelor’s degree or four or more years of work experience.
  • Six or more years of relevant experience required, demonstrated through one or a combination of work and/or military experience, or specialized training.
  • Expert-level ability to write complex, optimized Splunk SPL (Search Processing Language) searches, including macros, data models, and lookups for efficient threat hunting and investigation.
  • Strong foundational knowledge of incident response lifecycles (NIST or SANS) with experience designing, testing, and maintaining automation playbooks using SOAR platforms to automate triage and response actions.
  • In-depth experience with risk-based alerting, managing notable events, asset/identity correlation, and defining/tuning correlation searches.
  • Expert in conflict resolution and negotiation to ensure that design, strategy, and decisions consistently support security requirements.
  • Strong analytical skills and attention to detail with a proven track record of managing and delivering results.
  • Leadership experience as a subject matter expert with effective written, interpersonal, and verbal communication skills.

Nice to have

  • Security certifications such as CompTIA Security+, CISSP, CCIP, CISM, CCSP, OSCP (Offensive Security Certified Professional), Ethical Hacking (CEH, OSCP)
  • Experience with Identity and Access Management (IAM) solutions.
  • Ability to build consensus and a common understanding of security objectives, goals, and execution steps.
  • Experience with network protocols and information security with networking certifications such as PCNSE, CCNP or CCNA.
  • Experience with networks, 4G/5G wireless network functions or virtualization technologies like OpenStack and Kubernetes.
  • Experience with scripting languages like Python and/or automation tools like Ansible.

What the JD emphasized

  • Expert-level ability to write complex, optimized Splunk SPL (Search Processing Language) searches, including macros, data models, and lookups for efficient threat hunting and investigation.
  • Strong foundational knowledge of incident response lifecycles (NIST or SANS) with experience designing, testing, and maintaining automation playbooks using SOAR platforms to automate triage and response actions.
  • In-depth experience with risk-based alerting, managing notable events, asset/identity correlation, and defining/tuning correlation searches.
  • Expert in conflict resolution and negotiation to ensure that design, strategy, and decisions consistently support security requirements.
  • Strong analytical skills and attention to detail with a proven track record of managing and delivering results.
  • Leadership experience as a subject matter expert with effective written, interpersonal, and verbal communication skills.