Enable job alerts via email!

Information Security Architect

Johnson Controls

Województwo mazowieckie

On-site

PLN 180,000 - 240,000

Full time

8 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A global technology company in Warsaw seeks an Information Security Architect to develop and implement security architectures. You will collaborate with cybersecurity teams and ensure compliance with security standards. The ideal candidate has 3+ years in information security and solid communication skills. Join a diverse and inclusive team where your expertise will drive meaningful projects.

Benefits

Diversity and inclusion initiatives
Collaborative team culture

Qualifications

  • 3+ years of experience in information security.
  • Strong understanding of vulnerability management.
  • Excellent communication skills, both written and verbal.

Responsibilities

  • Design and implement security architectures.
  • Conduct security posture assessments.
  • Create technical documentation and communicate security concepts.

Skills

Attacker techniques
Threat landscapes
Vulnerability management
Security monitoring
Communication skills
Cloud security
Identity and access management
Endpoint and platform security

Education

Bachelor’s degree in Computer Science or related field

Tools

AWS
Azure
GCP
PKI
Encryption/tokenization
Job description
What you will do

At Johnson Controls, we’re seeking a skilled Information Security Architect to join our Global Information Security team. In this role, you’ll collaborate with cybersecurity, IT, and business teams to design and implement robust security architectures, standards, and controls that protect our systems and data. You’ll play a key role in ensuring compliance, assessing security posture, and guiding secure technology deployments across the enterprise.

How you will do it
  • Design & Architecture
    • Develop and implement enterprise-wide security reference architectures.
    • Ensure alignment with global security standards and policies.
    • Approve final designs and validate builds for compliance.
    • Follow the Security Posture Assessment process, which involves research, validation, and evaluation of all new initiatives, with phase gates reviews presented to all stakeholders during the process
  • Security Assessment & Compliance
    • Conduct security posture assessments for new initiatives.
    • Identify and mitigate risks in third‑party solutions.
    • Ensure adherence to regulatory and internal security requirements.
  • Collaboration & Consulting
    • Partner with service management and stakeholders to gather requirements.
    • Act as a trusted advisor to business units and IT teams.
    • Provide expert input on security standards, roadmaps, and infrastructure.
  • Documentation & Communication
    • Create high‑quality technical documentation, white papers, and presentations.
    • Communicate complex security concepts clearly to technical and non‑technical audiences.
  • Continuous Improvement
    • Stay current on emerging threats, vulnerabilities, and technologies.
    • Recommend improvements in network, identity, and infrastructure security.
What we look for
Required
  • 3+ years of experience in information security, including application development and security applications.
  • Strong understanding of attacker techniques, threat landscapes, vulnerability management, and security monitoring.
  • Broad technical expertise in:
    • Endpoint and platform security (Windows, Linux, mobile)
    • Identity and access management (IAM), PKI, encryption/tokenization, data protection
    • Cloud security (AWS, Azure, GCP)
    • Network security (web proxies, reverse proxies, load balancing, IDS/IPS, firewall, wireless, and remote connectivity, TCP/IP protocol, and remote access security techniques/products)
  • Excellent communication skills—both written and verbal.
  • Ability to work independently and collaboratively in a global team.
  • High integrity and discretion in handling confidential matters.
Preferred
  • Bachelor’s degree in Computer Science, Engineering, or a related field (or equivalent experience).
  • Familiarity with compliance frameworks (PCI‑DSS, HIPAA, FISMA, SOX).
  • Overview of NIST standards and security architecture frameworks (e.g., SABSA, TOGAF).
  • Experience in security operations or incident analysis.
  • Certifications
    • Certified Information Systems Security Professional (CISSP)
    • Certified Information Systems Security Professional - Information Systems Security Architecture Professional (CISSP‑ISSAP)
    • Certified Cloud Security Professional (CCSP)
    • Certified Information Security Manager (CISM)
    • Certified Information Systems Auditor (CISA)
    • Certified Ethical Hacker (CEH)
    • Cisco Certified Network Associate Security (CCNA Security)
    • Cisco Certified Network Associate (CCNA)
    • Cisco Certified Network Professional Security (CCNP Security)
    • Cisco Certified Network Professional (CCNP)
    • Server Platform Certifications (Microsoft, Linux)
Our culture

At Johnson Controls you’ll have the opportunity to work on some of the most exciting projects in today’s market. Our hardworking people empower us, and we believe in being part of a team that is open, collaborative, results‑oriented, hardworking and above all fun.

We believe that diversity and inclusion matter and make a difference. By embracing the true value of diversity and inclusion, getting comfortable with having crucial conversations, and valuing different perspectives, we will be one of the most desirable places to work.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.