The University of Texas Rio Grande Valley logo

The University of Texas Rio Grande Valley

INFORMATION SECURITY ARCHITECT

🇺🇸 Edinburg, TX

🕑 Full-Time

💰 TBD

💻 Cybersecurity

🗓️ December 9th, 2025

SQL Python ITSM

Edtech.com's Summary

The University of Texas Rio Grande Valley is hiring an Information Security Architect. The role involves designing secure systems and services across the university and its Regional Security Operations Center, managing cybersecurity operations, conducting risk assessments, and ensuring security compliance for infrastructure, applications, cloud services, and endpoint devices.

Highlights
  • Consult on secure system design for university infrastructure, applications, and Cloud services.
  • Coordinate cyber investigations, incident response, and forensics.
  • Design and manage firewall configurations and security standards.
  • Conduct vulnerability and penetration testing and oversee SIEM and Office 365 security.
  • Evaluate cloud architecture and recommend security controls.
  • Participate in IT security risk management and compliance reporting.
  • Required bachelor's degree in information security, IT, computer science, or related field.
  • Preferred certifications include GPEN and CISSP within two years of hire.
  • Four years of professional experience in information security or related fields required (options for education and experience substitution).
  • Knowledge of programming languages like SQL, PowerShell, Python and familiarity with Cloud security, Active Directory, AWS, Office 365, and IAM products.

INFORMATION SECURITY ARCHITECT Full Description

Office Location
The University of Texas Rio Grande Valley
1201 W. University Drive
Human Resources
MASS Building 2nd Floor
Edinburg, TX  78539


Edinburg: (956)665-2451
Brownsville: (956) 882-8205

Office hours:
Monday-Friday
8:00a.m. - 5:00p.m.
 

Staff Recruitment: careers@utrgv.edu

School of Medicine Recruitment: SOMCareers@utrgv.edu

Graduate Assistantships: assistantships@utrgv.edu

Faculty Recruitment:
College of Engineering & Computer Science: cecs@utrgv.edu

Robert C. Vackar College of Business & Entrepreneurship: cobe@utrgv.edu

College of Sciences Office of the Dean: cos@utrgv.edu

College of Education and P-16 Integration: cep@utrgv.edu

College of Fine Arts: cofa@utrgv.edu

College of Liberal Arts: liberalarts@utrgv.edu

Website: https://careers.utrgv.edu

INFORMATION SECURITY ARCHITECT

Below you will find the details for the position including any supplementary documentation and questions you should review before applying for the opening.  To apply for the position, please click the Apply for this Job link/button.

If you would like to bookmark this position for later review, click on the Bookmark link.  If you would like to print a copy of this position for your records, click on the Print Preview link.

 

Bookmark this Posting Print Preview | Apply for this Job

Please see Special Instructions for more details.
Dear Applicant,

Human Resources will not be held responsible for redacting any confidential information from the documents you attach with your application. The confidential information includes the following:

*Date of Birth
*Social Security Number
*Gender
*Ethnicity/Race

Please make sure that you omit this information prior to submission. We are advising that Human Resources will be forwarding your application to the department as per your submission.

If you have any questions, please do not hesitate to contact us at (956)665-8880 and/or careers@utrgv.edu.
Posting Details
Position Information
Posting Number SRGV8689
Working Title INFORMATION SECURITY ARCHITECT
Number of Vacancies 1
Location Edinburg, Texas
Department Information Security
FTE 1.0
FLSA Exempt
Scope of Job
Responsible for the consultation on the design of secure systems and services across the institution and Regional Security Operations Center (RSOC), to include the University’s infrastructure, applications, Cloud services, and endpoint devices.
Description of Duties
  • Assists in coordinating cyber investigations, incident response, and forensics.
  • Designs and sets configuration standards and oversees the firewall rule set to ensure compliance with both law and best practices.
  • Incorporates the principles of privacy-by-design in all aspects of information security.
  • Coordinates and conducts vulnerability and penetration analysis/tests on University systems and services to identify weakness.
  • Oversees the Information Security Office SIEM tools and primary Information Security oversight of 0365 security.
  • Evaluates and recommends security controls for infrastructure systems, local and remote, endpoint devices, and applications, local and remote.
  • Evaluates Cloud architecture for security compliance.
  • Consults on disaster recovery and business continuity of operations plans.
  • Conducts independent risk assessments of systems and services.
  • Conducts security analysis on systems and services. Coordinates and oversees Office 365 and other Cloud services security setting and standards.
  • Develops automated event monitoring and alert tracking.
  • Assists with overall IT security risk management.
  • Assists with IT security planning and compliance reporting.
  • Oversees, plans, and conducts penetration tests.
  • Develops security standard configurations.
  • Reviews, tests, and approves non-standard security configurations.
  • Serves as a member of the IT-CERT team.
  • Keeps current with IT network security and recommends improvements for disaster recovery, business continuity, intrusion detection, incident remediation, monitoring of network and bandwidth resources, and other pertinent security software and utilities.
  • Keeps current with advancements in information security related subjects, participates as an internal consulting resource on viruses, spyware, exploits, computer forensics, recovery and similar subject matter and recommends improvements to the university security program.
  • Evaluates and recommends new information security policies, procedures, standards, guidelines, tools, technologies, organizational changes, etc.
  • Actively participates in the higher education security community such as Educause, REN-ISAC, Unisog, etc.
  • Participates in university committees and meetings with the UT System Security Council.
  • Performs other duties as assigned.
Supervision Received
General supervision from assigned supervisor.
Supervision Given
Direct supervision of assigned staff.
Required Education
Bachelor’s degree from an accredited university in information security, information technology, computer sciences, risk management, or closely related field.
Preferred Education
Bachelor’s degree in Cyber security or similar field from an accredited University
Licenses/Certifications
Preferred: Certified penetration tester (GPEN), or Certified Information Systems Security Professional (CISSP) within two (2) years of hire; and the Certified Information Systems Security Professional with Information Systems Security Architecture Professional designation.
Required Experience
  • Four (4) years of professional experience in Information Security, Identity and Access Management, PCI, application security, networking, or device security including experience conducting risk assessments and identifying effective risk mitigation strategies or
  • Bachelor’s degree in unrelated field from an accredited university with six (6) years of the required experience.or
  • Master’s degree in information or cybersecurity with three (3) years of the required experience.
  • Required experience can be substituted for up to two (2) years of education on a 1-for-1 basis.
Preferred Experience
  • Knowledge and experience with programing and computer languages such as
  • SQL, PowerShell, Python, or similar.
  • Experience in managing, configuring, deploying, and monitoring security infrastructure.
  • Experience with standard concepts, practices, and procedures for security operation centers
  • Knowledge of ITIL processes and standards.
  • Demonstrated ability to multitask and self-manage assigned projects and daily tasks in an environment with shifting priorities.
  • Demonstrated ability to follow established procedures, even in a high-pressure situation.
  • Excellent communication skills, verbal and written, including the ability to convey technical information to a non-technical audience.
  • Knowledge of and familiarity with Cloud security practices, network operating systems, endpoint devices, Active Directory, ITSM, Amazon Web Services, Environment and PII vulnerability scanning, Office 365, and Oracle Identity Manager or similar IAM product.
  • Ability to independently analyze Information Security Threat Intelligence and vulnerability information and provide recommendations for remediation.
  • Ability to coordinate IT security and compliance projects to meet legal, regulatory, and contractual guidelines.
Equipment
Proficiency in the use of a personal computer and applicable software necessary to perform work assignments e.g. word processing, spreadsheets (Microsoft Office preferred). Use of standard office equipment.
Working Conditions
Needs to be able to successfully perform all required duties. Exposure to standard office conditions. Indoor activity, exposure to fluorescent lighting, computer emissions, and confined space. Frequent use of personal computer, copiers, printers, and telephone. Frequent standing, sitting, listening, and talking. Frequent work under stress, as a team member, and in direct contact with others. Job involves moderate amount of walking daily, occasional bending and stooping and infrequent lifting and climbing. Some travel and weekend work is required, including travel to meetings and training outside the area. May work extended hours. UTRGV is a distributed institution, which requires presence at multiple locations throughout the Rio Grande Valley. Work is performed primarily in a general office environment.
Other
Strong attention to detail and ability to problem solve. Ability to function independently and as a team player in a fast-paced environment. Demonstrated ability to develop and maintain collaborative working relationships with varying constituencies and teams. Knowledge of security best practice standards such as the Center for Internet Security (CIS) Top 20 Critical Security Controls, NIST Cybersecurity Framework and OWASP. Exceptional planning and organizational skills. Demonstrated ability to perform independent research and apply critical reasoning skills to solve technical issues. Familiarity with information security compliance and best practices, including COBITS, PCI, NIST, ISO, CJIS, and information security related federal and state laws and regulations, including privacy protection, identity protection, HIPAA, FERPA, records retention requirements, and CALEA.

To the extent this position requires the holder to research, work on, or have access to critical infrastructure as defined in Section 117.001(2) of the Texas Business and Commerce Code, the ability to maintain the security or integrity of the critical infrastructure is a minimum qualification to be hired and to continue to be employed in the position.
Physical Capabilities
N/A
Employment Category Full-Time
Minimum Salary Commensurate with Experience
Posted Salary Commensurate with Experience
Position Available Date 12/05/2025
Grant Funded Position No
If Yes, Provide Grant Expiration Date
Posting Detail Information
EEO Statement
It is the policy of The University of Texas Rio Grande Valley to promote and ensure equal employment opportunities for all individuals without regard to race, color, national origin, sex, age, religion, disability, sexual orientation, gender identity or expression, genetic information or protected veteran status. In accordance with the requirements of Title VII of the Civil Rights Act of 1964, the Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973, and the Americans with Disabilities Act of 1990, as amended, our University is committed to comply with all government requirements and ensures non-discrimination in its education programs and activities, including employment. We encourage women, minorities and differently abled persons to apply for employment positions of interest.
Special Instructions to Applicants
Dear Applicant,

Human Resources will not be held responsible for redacting any confidential information from the documents you attach with your application. The confidential information includes the following:

Date of Birth
Social Security Number
Gender
Ethnicity/Race

Please make sure that you omit this information prior to submission. We are advising that Human Resources will be forwarding your application to the department as per your submission.

If you have any questions, please do not hesitate to contact us at (956)665-8880 and/or careers@utrgv.edu.
Additional Information
UTRGV is a distributed location institution and working location is subject to change based on need.

All UTRGV employees are required to have a criminal background check (CBC). Incomplete applications will not be considered.

Substitutions to the above requirements must have prior approval from the VP of HR & Talent Development .
Quick Link https://careers.utrgv.edu/postings/49608
Posting Supplemental Questions

Required fields are indicated with an asterisk (*).

  1. Are you now, or previously, employed by The University of Texas System or any of its institutions?
    • Yes - I currently am employed by the UT System or its institutions
    • Yes - I have previously been employed by the UT System or its institutions
    • No - I have never been employed by the UT System or its institutions
  2. Are you a current UTRGV employee?
    • Yes
    • No
  3. Please select your highest level of completed education.
    • 6th grade education
    • 10th grade education
    • High School Diploma or GED
    • Associates Degree, Technical, or Trade School Degree/Certification or 60 Hours of College Hours
    • Bachelors Degree from an accredited university
    • Masters Degree from an accredited university
    • Ph. D. or other terminal degree from an accredited university
    • None of the above
  4. Please provide the field of study for your education:

    (Open Ended Question)

  5. Do you meet the minimum requirements for this position?
    • Yes
    • No
  6. Please indicate the number of years of work experience you have directly related to the position in which you are applying for:
    • Less than 1 year
    • 1 year
    • 2 years
    • 3 years
    • 4 years
    • 5 years
    • 6 years
    • 7 years
    • 8 years
    • 9 years
    • 10 years
    • Over 10 years
Applicant Documents
Required Documents
  1. Resume

Optional Documents

  1. Cover Letter/Letter of Application
  2. Curriculum Vitae
  3. Unofficial Transcripts
  4. Reference Letter 1
  5. Reference Letter 2
  6. Reference Letter 3
  7. Certifications and Licenses
  8. Training Certificates
  9. Other Document
  10. List of 3 References
  11. Unofficial Transcripts 2
  12. Unofficial Transcripts 3
  13. Letter of Interest
  14. Unofficial Graduate Transcripts
  15. Additional Document

To ensure the security of your data, you will be logged out due to inactivity in 3 minutes at
.

Any data not saved will be lost.

Click 'OK' to keep your session active.