top of page

Senior Security Architect

Are you interested in leading the transformation of cancer care through software that puts world-leading scientific knowledge in the hands of patients and their doctors?  If so, join our growing team at VieCure, the company that is revolutionizing cancer care by putting A.I. driven technology tools and an unparalleled knowledge base into the hands of physicians.

Job Description

The Senior Security Architect is responsible for the overall design and implementation of VieCure’s security controls for corporate, customer, and integrated third party data protection.

Remote, United States


  • Develop a complete understanding of a company’s technology and information systems

  • Design, build, implement and support enterprise-class security systems

  • Align organizational security strategy and infrastructure with overall business and technology strategy

  • Identify and communicate current and emerging security threats

  • Design security architecture elements to mitigate threats as they emerge

  • Plan, research and design robust security architectures for any IT project

  • Perform or supervise vulnerability testing, risk analyses and security assessments

  • Create solutions that balance business requirements with information and cybersecurity requirements

  • Identify security design gaps in existing and proposed architectures and recommend changes or enhancements

  • Review and approve installation of firewall, VPN, routers, IDS scanning technologies and servers

  • Test security systems to ensure they behave as expected

  • Use current programming language and technologies to writes code, complete programming and performs testing and debugging of applications

  • Provide supervision and guidance to a security team

  • Define, implement and maintain corporate security policies and procedures

  • Train users in implementation or conversion of systems

  • Respond immediately to security-related incidents and provide thorough remedial solutions and analysis

  • Regularly communicate vital information, security needs and priorities to upper management

Skills, Competencies & Experience


  • 10+ Years Security Design/Implementation

  • CISSP or equivalent


  • Utilizing emerging technologies to design and implement security solutions; monitoring and improving those solutions while working with an information security team

  • Consulting and engineering in the design and development of security best practices; implementation of security measures to meet business goals, customer needs and regulatory requirements

  • Security considerations of cloud computing, including data breaches, hacking, account hijacking, malicious insiders, third parties, authentication, APTs, data loss and DoS attacks

  • Identity and access management; tracking and creating/enforcing policies that govern access sensitive technology resources and information assets


  • Outstanding communication skills; strong critical thinking and analytical skills

  • Strong leadership, project and team-building skills, including the ability to lead teams and drive initiatives in multiple departments

  • Demonstrated ability to identify risks associated with business processes, operations, technology projects and information security programs

  • Ability to function as an enterprise security subject matter expert who can explain complex topics to those without a technical background

Technical Competencies

  • Windows, UNIX and Linux operating systems

  • VB.NET, Java/J2EE, ColdFusion, API/web services, scripting languages and a relational database management system (RDBMS) such as MS SQL Server or Oracle

  • Thorough understanding of relevant industry security standards and protocols including but not limited to HiTrust; National Institute of Standards and Technology (NIST); Service Organization Control 2 (SOC2)

  • Router, switch and VLAN security; wireless security

  • Risk assessment procedures, policy formation, role-based authorization methodologies, authentication technologies and security attack pathologies

Apply Now

To apply, please submit your resume to

bottom of page