Manager, Architecture - Information Systems Security

  • Full-time
  • Job Category Org: Domino’s Technology
  • Location Name - Location Code: Domino's Pizza LLC-WHQ

Company Description

Domino’s Pizza, which began in 1960 as a single store location in Ypsilanti, MI, has had a lot to celebrate lately: we’re a reshaped, reenergized brand of honesty, transparency and accountability – not to mention, great food! In the rise to becoming a true technology leader, the brand is now consistently one of the top five companies in online transactions and 65% of our sales in the U.S. are taken through digital channels. The brand continues to ‘deliver the dream’ to local business owners, 90% of which started as delivery drivers and pizza makers in our stores. That’s just the tip of the iceberg…or as we might say, one “slice” of the pie! If this sounds like a brand you’d like to be a part of, consider joining our team!

Job Description

As the Information Security Architect, Manager, you will be at the forefront of fortifying Domino’s against the evolving landscape of cyber threats. We are seeking a highly skilled and experienced Security Architect with managerial experience to join our team. The ideal candidate will have a strong background in cybersecurity, with expertise in supporting cloud environments, on-premises infrastructure, and multiple enterprise-grade software packages. This role will be instrumental in designing and building out our security landscape to ensure the protection of our organization's assets and data. This position will work closely with all departments within the Domino’s Technology group. Your expertise and leadership will be crucial in ensuring the ongoing protection of our organization's data and assets. This role is multi-faceted as a senior leader along with being highly technical.

Responsibilities:
Security Architecture Design:

  • Collaborate with cross-functional teams to design and implement robust security architectures for cloud environments, on-premises systems, and various enterprise software packages.

Risk Assessment and Management:

  • Work with risk management and compliance teams to identify potential gaps and risks. Assist with development and implement risk mitigation strategies and security controls.

Security Policies and Procedures:

  • Develop and enforce security policies, standards, and procedures to ensure compliance with regulatory requirements and industry best practices.

Security Tool Evaluation and Implementation:

  • Assist with evaluation, selection, and implementation of security tools and technologies to enhance our security posture. This includes (but not limited to) intrusion detection systems, firewalls, encryption tools, etc.

Vendor Management:

  • Manage relationships with third-party vendors and service providers to ensure that security requirements are met and maintained throughout the vendor lifecycle.

Security Audits and Compliance:

  • Conduct regular security audits, assessments, and compliance checks. Work with internal and external auditors to address findings and ensure continuous compliance with relevant standards and regulations.

Security Monitoring and Analysis:

  • Implement and manage security monitoring tools and systems to detect and respond to security threats in real-time. Conduct security log analysis and forensic investigations as needed. Work closely with Security Engineering team during monitoring, analysis and implementation projects.

Qualifications

  • Bachelor's degree in Information Technology, Computer Science, or a related field, or relevant job experience with extended education.
  • Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or equivalent certifications.
  • Proven experience (5+ years) in security architecture design, implementation, and management in complex environments.
  • Strong knowledge of cloud security concepts and technologies (e.g., AWS, Azure, Google Cloud).
  • Experience with on-premises security solutions, network security, endpoint security, and identity and access management (IAM).
  • Excellent analytical, problem-solving, and decision-making skills.
  • Strong communication and interpersonal skills, with the ability to collaborate effectively with diverse teams.
  • Experience in project management and leading security initiatives from conception to implementation.

Additional Information

All your information will be kept confidential according to EEO guidelines.

Privacy PolicyImprint