Security Architect

Security (SC)


Security Architect

  • R10426
  • Remote, United States
  • Bay Area, California, United States
  • Remote, District of Columbia, United States
  • Remote, Georgia, United States
  • Remote, New York, United States
  • Remote, Texas, United States
  • Remote, Washington, United States
  • Security (SC)
  • Full time

Work Styles at Zoom

In most cases, you will have the opportunity to choose your preferred working location from the following options when you join Zoom: in-person, hybrid or remote. Visit this page for more information about Zoom's Workstyles.

About Us

Zoomies help people stay connected so they can get more done together. We set out to build the best video product for the enterprise, and today help people communicate better with products like Zoom Contact Center, Zoom Phone, Zoom Events, Zoom Apps, Zoom Rooms, and Zoom Webinars.

We’re problem-solvers, working at a fast pace to design solutions with our customers and users in mind. Here, you’ll work across teams to deliver impactful projects that are changing the way people communicate and enjoy opportunities to advance your career in a diverse, inclusive environment.

Security Architect

U.S. Full-Time Remote


We are looking for a security architect to be responsible for the design, building, testing, and implementation of security systems within our  cloud and corporate networks. The security architect's responsibilities include reviewing our current security measures, recommending enhancements, and identifying areas of weakness.. You will also be responsible for conducting regular system tests and ensuring the continuous monitoring of the network's security.

To be a successful security architect, you should be experienced in information security and IT risk assessment, with a strong understanding of security protocols, authentication, and security. You should also possess strong interpersonal and communication skills and be able to work with a wide variety of global teams.


  • Develop a complete understanding of a company’s technology and information systems

  • Design, build, implement and support enterprise-class security systems

  • Create documentation to outline full solution architecture

  • Align organizational security strategy and infrastructure with overall business and technology strategy

  • Identify and communicate current and emerging security threats

  • Design and amend security architecture elements to mitigate threats as they emerge

  • Plan, research and design robust security architectures for any IT/Security project

  • Create solutions that balance business requirements with information and cybersecurity requirements

  • Identify security design gaps in existing and proposed architectures and recommend changes or enhancements

  • Define, implement and maintain corporate security policies and procedures

  • Regularly communicate vital information, security needs and priorities to upper management

  • Develop and review installation requirements across cloud, data center, and corporate environments 

  • Developing project timelines for system upgrades and preparing cost estimates.

  • Testing the final security system and updating and upgrading it as needed.


Skills and Experience:

  • Utilizing emerging technologies to design and implement security solutions; monitoring and improving those solutions while working with an information security team

  • Consulting and engineering in the design and development of security best practices; implementation of security measures to meet business goals, customer needs and regulatory requirements

  • Expert in designing solutions in various cloud (AWS, Azure, OCI, GCP), datacenter and corporate environments

  • Good working knowledge of current IT risks and experience implementing security solutions

  • Experience implementing multi-factor authentication, single sign-on, identity management or related technologies

  • Extensive experience in information security and/or IT risk management with a focus on security, performance and reliability

  • Solid understanding of security protocols, cryptography, authentication, authorization and security

  • Outstanding communication skills; strong critical thinking and analytical skills

  • Strong leadership, project and team-building skills, including the ability to lead teams and drive initiatives in multiple departments

  • Ability to identify risks associated with business processes, operations, technology projects and information security programs

  • Ability to function as an enterprise security subject matter expert who can explain complex topics to those without a technical background

Technical Skills and Knowledge:

  • Working knowledge for Windows, MacOS, UNIX and Linux operating systems

  • Subject matter expert in cloud environment network architecture

  • Subject matter expert in data center and corporate environment network architectures

  • VB.NET, Java/J2EE, ColdFusion, API/web services, scripting languages and a relational database management system (RDBMS) such as MS SQL Server or Oracle

  • Thorough understanding of relevant industry security standards and protocols including ISO27001 and National Institute of Standards and Technology (NIST); Control Objectives for Information and Related Technologies (COBIT); Committee of Sponsoring Organizations (COSO) of the Treadway Commission, a joint initiative to combat corporate fraud

  • The ISO 27001 specifications for an information security management system

  • Risk assessment procedures, policy formation, role-based authorization methodologies, authentication technologies and security attack pathologies

  • A bachelor's or associate degree in IT, computer science, or related field.

  • CISSP, CCSP, cloud specific certifications, advanced IT/security certifications may be advantageous.

  • 10+ years’ experience in information security and IT risk management.

  • A strong working knowledge of current IT risks, security implementations, and computer operating and software programs.

  • The ability to interact with a wide range of teams globally.

  • Excellent teaching, problem-solving, communication, and interpersonal skills.

We believe that the unique contributions of all Zoomies is the driver of our success. To make sure that our products and culture continue to incorporate everyone's perspectives and experience we never discriminate on the basis of race, religion, national origin, gender identity or expression, sexual orientation, age, or marital, veteran, or disability status. Zoom is proud to be an equal opportunity workplace and is an affirmative action employer. All your information will be kept confidential according to EEO guidelines. 

We welcome people of different backgrounds, experiences, abilities and perspectives including qualified applicants with arrest and conviction records and any qualified applicants requiring reasonable accommodations in accordance with the law. If you need any assistance or accommodations due to a medical condition, or if you need assistance accessing our website or completing the application process, please let us know by emailing us at

Zoom requires all U.S. employees who will work in person at a Zoom office, attend in-person Zoom meetings or have in-person customer meetings to be fully vaccinated.  Zoom will consider requests for reasonable accommodations for religious or medical reasons as required under applicable law.

At Zoom, we care about our employees, their families, and their well-being. As part of our award-winning workplace culture and commitment to delivering happiness, our benefits program offers a variety of perks, benefits, and options to help employees maintain their physical, mental, emotional, and financial health; support work-life balance; and contribute to their community in meaningful ways. To view our benefits, click here.

Explore Zoom:


Fraudulent Employment Offers

Zoom is aware of scams that involve fake Zoom job listings posted on third-party sites. Responding applicants are contacted primarily over email, InMail and/or chat applications by people impersonating Zoom employees. Eventually a fake offer letter is sent in exchange for personal identification information as part of a fake new-hire screening process.

Please be advised that these offers, communications and impersonations are illegitimate and fraudulent. All communication with Zoom employees come from a “” email address. Zoom job applicants complete an interview process including in-person (on Zoom) meetings and phone calls. Our process also requires you to create an account with our applicant tracking system, Workday.

Zoom will never ask for your personally identifying information during the interview process or ask you to pay money or purchase equipment. If you have received a message from Zoom that appears suspicious, please contact 


Sign up for job alerts

Find roles that are just the right fit for you, delivered straight to your inbox. The next opportunity you see could become your new career.


Not You?

We have emailed you a code to verify your identity

Thank you for signing up for job alerts from Zoom!

Person, Laptop, Pc, Mouse, Hair, Sitting, Female, Table, Woman, Girl