Allstate Logo

Allstate

Cybersecurity Architect

Job Posted 24 Days Ago Posted 24 Days Ago
Remote
Hiring Remotely in US
112K-197K Annually
Senior level
Remote
Hiring Remotely in US
112K-197K Annually
Senior level
The Cybersecurity Architect will design and implement Zero Trust security architecture, lead cybersecurity delivery, and collaborate across teams to identify risks and enforce security policies.
The summary above was generated by AI

At Allstate, great things happen when our people work together to protect families and their belongings from life’s uncertainties. And for more than 90 years our innovative drive has kept us a step ahead of our customers’ evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device and identity protection. 

Job Description

Allstate’s Enterprise Cybersecurity Platform Consulting Team evaluates solutions relative to the broader enterprise security architecture and strategic direction. We thoughtfully craft and iterate paths towards strategic solutions that emphasize simplification and reuse while driving enterprise level informed decision-making to create optimal paths to value. Engineering excellence, outcome based iterative delivery, strategic design / systems thinking, along with impact and influence are key success factors in our toolkits to be both efficient and effective as we mature our practice.
As a Cybersecurity Architect (specialization Zero Trust Security Architecture) you will:
1. Drive outcome-based delivery leadership to mature our cybersecurity platforms and services.
2. Develop formal enterprise-level strategies and authoritative documentation.
3. Drive decision clarity when addressing complex cross-functional challenges (for key design decisions, cyber risk and return decisions, and GRC issues).
This new role on our team will be responsible for helping to design a comprehensive enterprise security architecture based on "Zero Trust" principles, which means never implicitly trusting any device, user, or network, requiring continuous verification before granting access to critical systems and data. Key responsibilities include assessing existing roadmaps, identifying maturity gaps, helping to select appropriate Zero Trust technologies, and defining policies to enforce strict access controls across our entire IT environment.

Key Responsibilities

Architecture Design:

  • Help refine and expand our Zero Trust security architecture blueprint, defining how to segment networks, implement granular access controls, and continuously monitor user activity across different platforms.

  • Define security policies and standards aligned with Zero Trust principles, including least privilege access, multi-factor authentication, and strong identity management.

  • Provide experience in architecting Zero Trust solutions, roadmaps, and capabilities in alignment with industry standards, including NIST SP 800-207 (ZTA), SP 1800-35 (Implementing ZTA), SP 800-63 (digital identity guidelines) along with Microsoft guidance for the CISA Zero Trust Maturity Model.

Influence Engineering team’s implementations and deployments:

  • Consult with various technical SMEs as they deploy Zero Trust security controls across the IT infrastructure, including on-premises and our public cloud environments.

  • Align with various stakeholders on their roadmaps of various security tools to enforce Zero Trust policies, such as granular access controls, real-time threat analysis, and continuous monitoring.

  • Consult with network engineers that will implement network segmentation strategies to isolate critical systems and data.

Security Assessment and Cyber Risk Management:

  • Provide thought leadership for our security assessments to identify vulnerabilities and potential threats within the Zero Trust architecture.

  • Partner with response teams that analyze security incidents and breaches to refine Zero Trust policies and improve overall security posture.

  • Provide thought leadership on how to monitor compliance with relevant security regulations and industry standards related to Zero Trust principles.

Collaboration and Communication:

  • Collaborate with IT and Information Security teams across the organization to integrate Zero Trust security capabilities/controls into existing systems and applications.

  • Communicate Zero Trust security strategies and policies to key stakeholders, including executive management, senior management, and technical teams.

  • Champion Zero Trust concepts and best practices across our architecture domains of Identity, Endpoints, Data, Applications, Infrastructure, Networking, and Security Operations.

Key Skills & Qualifications

  • 8+ years of experience desired in governance, risk management, compliance, designing, and/or engineering enterprise IT and cybersecurity solutions, and architecture design and solutions.

  • BS in Computer Science, Engineering, Software Development, Information Technology, Cybersecurity, or related field. Additional years of experience and cyber certifications may be considered in lieu of degree.

  • At least two or more of the following certifications:

    • Certified Information Systems Security Professional (CISSP)

    • Certified Cloud Security Professional (CCSP)

    • Certified Information Security Manager (CISM)

    • Certified Information Systems Auditor (CISA)

    • Information Systems Security Architecture Professional (ISSAP)

    • AWS Certified Solutions Architect Associate or Professional

    • AWS Certified Security - Specialty Certification

    • Microsoft Certified Cybersecurity Architect Expert

    • Microsoft Certified Azure Solutions Architect Expert

    • Microsoft Certified Identity and Access Administrator Associate

    • Zscaler Zero Trust Certified Associate (ZTCA)

    • Cloud Security Alliance Certificate of Competence in Zero Trust (CCZT)

    • GIAC Defensible Security Architecture (GDSA)

    • SABSA Chartered Security Architect

  • Excellent analytical and problem-solving skills. Ability to communicate complex security concepts to non-technical stakeholders.

  • Deep understanding of Zero Trust security principles and best practices

  • Expertise in network security architectures, including segmentation and micro-segmentation.

  • Strong knowledge of Identity and Access Management (IAM) systems, including single sign-on (SSO), multi-factor authentication (MFA), identity governance, and privileged access – specifically migrating from a CyberArk PAM (Privileged Access Management) to a Microsoft PIM (Privileged Identity Management) strategy for “Just In Time — Just Enough Access” (JIT-JEA) PoLP architecture to further reduce our attack surface on standing elevated privileges.

  • Broad knowledge of cloud security concepts and technologies (especially AWS and Azure).

  • Familiarity with DevSecOps practices and integrating security into CI/CD pipelines, microservices architecture and container security (e.g., Kubernetes, Docker), API security, application-level segmentation, and secure containerization techniques.

Skills

Cloud Security, Cybersecurity, DevSecOps, Identity Access Management (IAM), IT Governance Risk and Compliance (GRC), Network Security Architecture, Problem Solving, Security Architecture Design, Technical Leadership, Zero Trust Architecture

Compensation

Compensation offered for this role is $112,000.00 - 196,750.00 annually and is based on experience and qualifications.

The candidate(s) offered this position will be required to submit to a background investigation.

Joining our team isn’t just a job — it’s an opportunity. One that takes your skills and pushes them to the next level. One that encourages you to challenge the status quo. And one where you can impact the future for the greater good.  

You’ll do all this in a flexible environment that embraces connection and belonging. And with the recognition of several inclusivity and diversity awards, we’ve proven that Allstate empowers everyone to lead, drive change and give back where they work and live. 

Good Hands. Greater Together.

Allstate generally does not sponsor individuals for employment-based visas for this position.

Effective July 1, 2014, under Indiana House Enrolled Act (HEA) 1242, it is against public policy of the State of Indiana and a discriminatory practice for an employer to discriminate against a prospective employee on the basis of status as a veteran by refusing to employ an applicant on the basis that they are a veteran of the armed forces of the United States, a member of the Indiana National Guard or a member of a reserve component.

For jobs in San Francisco, please click “here” for information regarding the San Francisco Fair Chance Ordinance.
For jobs in Los Angeles, please click “here” for information regarding the Los Angeles Fair Chance Initiative for Hiring Ordinance.

To view the “EEO is the Law” poster click “here”. This poster provides information concerning the laws and procedures for filing complaints of violations of the laws with the Office of Federal Contract Compliance Programs

To view the FMLA poster, click “here”. This poster summarizing the major provisions of the Family and Medical Leave Act (FMLA) and telling employees how to file a complaint.

It is the Company’s policy to employ the best qualified individuals available for all jobs. Therefore, any discriminatory action taken on account of an employee’s ancestry, age, color, disability, genetic information, gender, gender identity, gender expression, sexual and reproductive health decision, marital status, medical condition, military or veteran status, national origin, race (include traits historically associated with race, including, but not limited to, hair texture and protective hairstyles), religion (including religious dress), sex, or sexual orientation that adversely affects an employee's terms or conditions of employment is prohibited. This policy applies to all aspects of the employment relationship, including, but not limited to, hiring, training, salary administration, promotion, job assignment, benefits, discipline, and separation of employment.

Top Skills

AWS
Cyberark
Identity And Access Management (Iam)
Azure
Nist Sp 800-207
Zero Trust Security Architecture

Similar Jobs

3 Hours Ago
Remote
14 Locations
157K-212K
Senior level
157K-212K
Senior level
Hardware • Information Technology • Other • Software • Analytics
The Cybersecurity Architect will design and implement security architectures, conduct risk assessments, and collaborate on security policies while addressing security incidents and coordinating with teams.
Top Skills: AWSAzureFirewallsIntrusion Detection SystemsIso 27001NistPowershellPythonSIEMSocTerraform
8 Days Ago
Remote
2 Locations
216K-339K
Expert/Leader
216K-339K
Expert/Leader
Artificial Intelligence • Computer Vision • Hardware • Robotics • Metaverse
As Principal Cybersecurity Architect, you will design and implement security architectures, collaborate with technology owners, and lead innovative security solutions to protect enterprise environments.
Top Skills: Cloud SecurityDlpEndpoint SecurityIam SolutionsIdentity And AccessIds/IpsLoggingMonitoringNetwork SecuritySIEM
13 Days Ago
Remote
San Diego, CA, USA
130K-200K Annually
Senior level
130K-200K Annually
Senior level
Information Technology
As a Cybersecurity Architect, you will ensure CMMC compliance by designing security solutions, engaging with clients, and improving processes to enhance security posture.
Top Skills: AzureConfiguration ManagerCrowdstrikeEntra IdMicrosoft 365Microsoft Defender XdrMicrosoft IntuneMicrosoft SentinelOktaPingfederate

What you need to know about the Boston Tech Scene

Boston is a powerhouse for technology innovation thanks to world-class research universities like MIT and Harvard and a robust pipeline of venture capital investment. Host to the first telephone call and one of the first general-purpose computers ever put into use, Boston is now a hub for biotechnology, robotics and artificial intelligence — though it’s also home to several B2B software giants. So it’s no surprise that the city consistently ranks among the greatest startup ecosystems in the world.

Key Facts About Boston Tech

  • Number of Tech Workers: 269,000; 9.4% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Thermo Fisher Scientific, Toast, Klaviyo, HubSpot, DraftKings
  • Key Industries: Artificial intelligence, biotechnology, robotics, software, aerospace
  • Funding Landscape: $15.7 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Summit Partners, Volition Capital, Bain Capital Ventures, MassVentures, Highland Capital Partners
  • Research Centers and Universities: MIT, Harvard University, Boston College, Tufts University, Boston University, Northeastern University, Smithsonian Astrophysical Observatory, National Bureau of Economic Research, Broad Institute, Lowell Center for Space Science & Technology, National Emerging Infectious Diseases Laboratories
By clicking Apply you agree to share your profile information with the hiring company.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account