Our technology organization is transforming how we work at Smurfit Westrock. We align with our businesses to deliver innovative solutions that: • Address specific business challenges, integrate processes, and create great experiences • Connect our work to shared goals that propel Smurfit Westrock forward in the Digital Age • Imagine how technology can advance the way we work by using disruptive technology We are looking for forward thinking technologists that can accelerate our focus areas such as building stronger foundational technology capabilities, reducing complexity, employing digital transformation concepts, and leveraging disruptive technology. Location and/or Business/Division Details (if applicable) Title Principal Security Architecture, Atlanta, Georgia Position Summary: The opportunity: A Principal Security Architect plays a critical role in designing, implementing, and overseeing security strategies for enterprise environments. Responsibilities include: • Security Framework Design-establishing security architectures that align with business objectives and regulatory requirements. • Risk assessment and Mitigation-identifying vulnerabilities and developing risk mitigation standards • Enterprise security governance-Defining security policies, standards, and best practices. • Technology Selection and Implementation-evaluating and deploying security technologies such as SIEM, encryption, and identity management • Threat Modeling -Anticipate attack vectors and collaborating with the rest of IT organization • Security Analysis and advisory to the business How you will impact Smurfit Westrock: • Demonstrate a deep knowledge of all security domains. • Actively engage and lead strategic engagements with regards to both technical and business values. • Lead technical presentations with key stakeholders. • Active contributor to the internal Cloud Architecture Review Board (CARB)by participating in calls, publishing reference architectures, and creating decks and other reusable assets for technical topics. • Build relationships and establish key internal partnerships. • Monitor industry trends and recognize opportunities for new and emerging technologies. • Translate business requirements into well-architected solutions. • Document technical solutions that are aligned with critical business objectives. What you need to succeed: MAJOR TASKS, RESPONSIBILITIES AND KEY ACCOUNTABILITIES Primary Responsibilities / Tasks: • Promotes security and privacy as a business enabler through effective partnership with product, strategy and engineering teams. • Works closely with project teams to fully understand business priorities and strategy. • Reviews solution designs and identifies opportunities for security integration. • Assigns risk-based security and privacy requirements to project teams. • Ensures solutions are secure through participation in all phases of the lifecycle, from requirements gathering to design, then implementation, followed by validation. • Works with project teams to identify and mitigate security and privacy risks. • Leads cost-risk tradeoff discussions with the project teams, helping to decide how important and at what increased cost each security requirement can be justifiably implemented. • Documents status of projects assigned security and privacy requirements including risks and exceptions. • Influences product selection and negotiates security and privacy requirements with teams and vendors. • Identifies security trends and relates to current and future needs of project teams as well as security and privacy standards. • Establishes functional goals for improving security and privacy operations and then initiates and drives team members toward achieving those goals. Delivery & Execution: • Drives configuration, debugging, and support for infrastructure • Drives field and corporate rollouts of security solutions • Drives the stand up of necessary system software, hardware, and equipment (physical or virtual) to meet changing infrastructure needs Support & Enablement: • Collaborates with product and project teams to understand needs and enable them with infrastructure • Supports technology architecture design review efforts for project and product teams • Leverages tooling and custom applications to monitor the operational status of applications, infrastructure, networks, databases, and security; optimizes and tunes performance as appropriate • Drives root cause analysis, debugging, support, and post-mortem analysis for security incidents and service interruptions • Maintains, upgrades, and supports existing systems and infrastructure to ensure operational stability • Opens and manages vendor problem tickets to resolution • Drives the production of in-house documentation around solutions • Monitors tools and proactively help teams struggling with systems issues • Provides application support for software running in production • Creates scripts and tools that drive automation and enables product teams and end users to move towards self service Learning: • Keeps abreast of innovations and industry trends as well as changes to internal systems and determines how they impact tools, training, and support necessary to keep systems up, running, and secure • Participates in and contributes to learning activities around modern systems engineering core practices (communities of practice) • Proactively view articles, tutorials, and videos to learn about new technologies and best practices being used within other technological organizations • Bachelor’s Degree or in related field of study, including any of the following but not limited to: Information Systems, Network Engineering, or Information Security. • Certifications in related field, including any of the following but not limited to: CISSP, AWS Certification, Agile Certification. • Exposure to design pattern and application architecture • Ability to interpret additional computer languages and learn new ones as needed Minimum: • 5+ years of experience working in security architecture, operations, design, or development. • Strong experience across multiple security domains related to Data Protection, IT Risk, Network Security, Application Security, Security Operations, and Identity and Access Management. • Working knowledge of encryption concepts and implementation methods. • Working knowledge of remote access technologies and implementation best practices. • Knowledge of security operations including change management, incident management, configuration management, and vulnerability management. • Ability to manage multiple engagements and prioritize workload. • Expert level understanding of identity management and lifecycle, privileged access, access governance, contextual access, authorization, authentication and next generation authentication signals, access delegation, directory services, certificate lifecycle management, immutable vs mutable identifiers, and interoperability between the components • Experience with identity standards and protocols including SAML, OAuth, OIDC, SCIM • Experience with best-practice and implementation frameworks for zero trust, SSO, MFA, adaptive and risk-based authentication, ephemeral credentials, secrets management, role/attribute/policy-based access controls, and cloud native identity and access solutions • Experience implementing and integrating with enterprise-grade systems that are highly scalable, performant, reliable, and secure in global environments • Experience with published standards, guidance, best practices, profiles, and frameworks related to IAM and cyber security and practical implementation in an enterprise (NIST, ISO, SANS CIS Critical Security Controls) • Experience with at least one of the major cloud providers (AWS, Azure, GCP), cloud-native architecture, data security and integration services • Strong problem-solving skills. • Strong oral and written communication skills. Preferred: • BS/BA in a related discipline (i.e., Computer Science, Information Systems, Engineering, Business, etc.); and/or 5 years of experience in related field. • At least one relevant industry certification - CISSP, CISM, CISA, etc. • Knowledge of IT and security frameworks, such as NIST or CIS. • Experience with public cloud security architecture and solutions. • Experience with container security architecture and solutions. • Experience with integrating security with agile development teams. What we offer: • Corporate culture based on integrity, respect, accountability and excellence • Comprehensive training with numerous learning and development opportunities • An attractive salary reflecting skills, competencies and potential • A career with a global packaging company where Sustainability, Safety and Inclusion are business drivers and foundational elements of the daily work.
Job Type
Fulltime role
Skills required
Agile, Azure
Location
Atlanta, Georgia
Salary
No salary information was found.
Date Posted
May 29, 2025
WestRock Company is seeking a Principal Analyst in Cyber Security to design and implement security strategies for enterprise environments. The role involves risk assessment, security governance, and collaboration with project teams to enhance security measures.