bamboohr17
Information Security Architect
At a Glance
- Location
- Utah Hybrid
- Experience
- 7+ years
- Posted
- 2026-02-19T14:23:26-05:00
Key Requirements
Required Skills
Domain Knowledge
- Engineering
- SaaS
Benefits & Perks
s that include 4 weeks of vacation, 12 company holidays, parenta
Requirements
Bachelor’s degree in Information Security, Computer Science, Information Systems, or a related field, or equivalent professional experience.
6–7+ years of hands-on experience in information security, security engineering, cloud security, or closely related roles.
Demonstrated experience leading security architecture or design decisions for production cloud and/or corporate environments.
Strong
working knowledge of at least one major cloud platform (AWS, Azure, or GCP), including IAM, networking, encryption, key management, and logging.
Practical
Responsibilities
The Information Security Architect will lead hands-on security architecture design across BambooHR’s cloud environment and corporate information systems, partnering with engineering, IT, and security teams to embed security into platforms, processes, and day-to-day technology decisions.
A typical day includes leading architecture and design reviews, defining secure cloud and corporate security patterns, advising on identity and data protection strategies, and guiding teams through complex security tradeoffs to enable secure, scalable delivery.
The Information Security Architect will own outcomes across cloud and corporate security architecture, delivering scalable designs, standards, and measurable risk reduction. This role operates with a high degree of autonomy and influence, partnering across engineering, IT, product, and security to embed security into how BambooHR designs, builds, and operates.
You will:
Lead the design and evolution of security architecture across cloud infrastructure, SaaS platforms, and corporate information systems, ensuring solutions are secure-by-design, scalable, and operationally sustainable.
Own and maintain security architecture standards, reference architectures, and secure design patterns spanning identity and access management, data protection, logging/telemetry, endpoint security, and third-party integrations.
About the Company
A
Great Company Culture
that has been recognized by multiple organizations like
Inc
, and
Salt Lake Tribune