Security Architect Jobs in USA with Visa Sponsorship
Security architects design and implement enterprise security frameworks, making them strong candidates for H-1B and other work visa sponsorship. The role requires specialized cybersecurity knowledge and typically mandates a bachelor's degree in computer science, information security, or engineering, aligning well with specialty occupation requirements. For detailed occupation requirements, see the O*NET profile.
See All Security Architect JobsOverview
Showing 5 of 905+ security architect jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 905+ Security Architect jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Security Architect roles.
Get Access To All Jobs
Job Description
Role Purpose
The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
-
Design and develop enterprise cyber security strategy and architecture
a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses
b. Identify risks associated with business processes, operations, information security programs and technology projects
c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge
d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations
f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc.
g. Provide support during technical deployment, configuration, integration and administration of security technologies
h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc.
i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity
j. Provide solution of RFP’s received from clients and ensure overall design assurance
i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives
ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture
iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs
iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology
v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions
vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps
vii. Evaluate and recommend solutions to integrate with overall technology ecosystem
viii. Tracks industry and application trends and relates these to planning current and future IT needs -
Stakeholder coordination & audit assistance
a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations
b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security
c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements
d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers
e. Provide training to employees on issues such as spam and unwanted or malicious emails
Deliver
No
Performance Parameter
Measure
1. Customer centricity
Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers.
2. Support sales team to create wins
% of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led
Experience:
10 YEARS
The expected compensation for this role ranges from $100,000 to $185,000. Final compensation will depend on various factors, including your geographical location, minimum wage obligations, skills, and relevant experience. Based on the position, the role is also eligible for Wipro's standard benefits including a full range of medical and dental benefits options, disability insurance, paid time off (inclusive of sick leave), other paid and unpaid leave options. Applicants are advised that employment in some roles may be conditioned on successful completion of a post-offer drug screening, subject to applicable state law.
Wipro provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Applications from veterans and people with disabilities are explicitly welcome.
Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention.

Job Description
Role Purpose
The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
-
Design and develop enterprise cyber security strategy and architecture
a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses
b. Identify risks associated with business processes, operations, information security programs and technology projects
c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge
d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations
f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc.
g. Provide support during technical deployment, configuration, integration and administration of security technologies
h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc.
i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity
j. Provide solution of RFP’s received from clients and ensure overall design assurance
i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives
ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture
iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs
iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology
v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions
vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps
vii. Evaluate and recommend solutions to integrate with overall technology ecosystem
viii. Tracks industry and application trends and relates these to planning current and future IT needs -
Stakeholder coordination & audit assistance
a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations
b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security
c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements
d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers
e. Provide training to employees on issues such as spam and unwanted or malicious emails
Deliver
No
Performance Parameter
Measure
1. Customer centricity
Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers.
2. Support sales team to create wins
% of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led
Experience:
10 YEARS
The expected compensation for this role ranges from $100,000 to $185,000. Final compensation will depend on various factors, including your geographical location, minimum wage obligations, skills, and relevant experience. Based on the position, the role is also eligible for Wipro's standard benefits including a full range of medical and dental benefits options, disability insurance, paid time off (inclusive of sick leave), other paid and unpaid leave options. Applicants are advised that employment in some roles may be conditioned on successful completion of a post-offer drug screening, subject to applicable state law.
Wipro provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Applications from veterans and people with disabilities are explicitly welcome.
Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention.
How to Get Visa Sponsorship in Security Architect
Highlight security framework expertise
Emphasize experience with enterprise security architectures, zero-trust models, and compliance frameworks like SOX, HIPAA, or PCI-DSS. These specialized skills demonstrate the technical depth required for specialty occupation classification.
Document certification achievements
Security certifications like CISSP, SABSA, or TOGAF strengthen your H-1B case by proving specialized knowledge. Include certification numbers and renewal dates to show ongoing professional development in cybersecurity architecture.
Target financial services and healthcare
Banks, healthcare systems, and government contractors frequently sponsor security architects due to strict regulatory requirements. These industries understand the specialized nature of the role and regulatory compliance needs.
Quantify security impact in applications
Document specific achievements like reducing security incidents by percentages, implementing frameworks that protected specific data volumes, or achieving compliance certifications. Numbers demonstrate your specialized impact beyond generic security work.
Address the architecture versus engineering distinction
Clearly differentiate your role from security engineers or analysts. Emphasize strategic planning, enterprise-wide design decisions, and cross-functional leadership that requires advanced technical judgment and specialized architectural knowledge.
Consider consulting and contractor opportunities
Security architecture consulting firms and government contractors often have established visa sponsorship processes. These organizations frequently need specialized security expertise for client engagements and compliance-heavy projects.
Security Architect jobs are hiring across the US. Find yours.
Find Security Architect JobsSee all 905+ Security Architect jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Security Architect roles.
Get Access To All JobsFrequently Asked Questions
What degree do I need for security architect H-1B sponsorship?
A bachelor's degree in computer science, information security, cybersecurity, or engineering is typically required. Some employers accept related fields like mathematics or physics with relevant security experience. A master's degree in cybersecurity or MBA with security focus can strengthen your application, especially for senior architect roles.
Do security architects qualify for specialty occupation requirements?
Yes, security architect roles typically meet specialty occupation criteria due to the specialized technical knowledge required for enterprise security design, compliance frameworks, and risk assessment. The role requires understanding of complex security architectures that demand advanced technical education and specialized training beyond basic IT support.
Which industries sponsor security architects most frequently?
Financial services, healthcare, government contractors, and large technology companies sponsor security architects regularly due to regulatory compliance requirements and data protection needs. These industries understand the specialized nature of security architecture and have established processes for visa sponsorship of technical professionals.
Can security consultants get H-1B sponsorship?
Yes, security consulting firms often sponsor H-1B visas for architects working on client projects. The key is demonstrating that your role involves specialized security architecture work rather than general IT consulting. Document specific frameworks, compliance standards, and architectural decisions you'll be responsible for in client engagements.
How do I prove specialized knowledge for security architect roles?
Document experience with enterprise security frameworks like NIST, ISO 27001, or zero-trust architectures. Include certifications like CISSP, SABSA, or TOGAF. Quantify achievements like compliance certifications obtained, security incidents prevented, or enterprise-wide implementations you've led. This demonstrates specialized architectural knowledge beyond basic security tasks.
What is the prevailing wage requirement for sponsored Security Architect jobs?
U.S. employers sponsoring a visa must pay at least the prevailing wage, which is what workers in the same role, area, and experience level typically earn. The Department of Labor sets this rate to make sure companies aren't hiring foreign workers simply because they'd accept lower pay than a U.S. worker. It varies by job title, location, and experience. You can look up current prevailing wage rates for any occupation and location using the OFLC Wage Search page.
See which Security Architect employers are hiring and sponsoring visas right now.
Search Security Architect Jobs