Search Jobs

IT Cyber Security Architect/Engineer

Status: Actively Recruiting

Interested candidates can post their updated resume to

Location: Ohio
Available Opening: 1
Duration: 6 Months

During the interviewing process we are looking for 'demonstrated'
skills and ability to perform the functions listed below (along with other items on our job posting).  We are looking for a very strong, professional candidate that will represent AEP and the Security Engineering team as they are working with BU & IT partners and customers, as well as external vendors.  We want to know that they can perform risk assessments and explain to the project team, customers, or vendors the security recommendation based on the risk, as well as AEP's Security Policies & Standards.

The successful candidate will be part of AEP’s Cyber Security Engineering team supporting gridSMART and other projects as assigned. The position involves applying the candidate’s security engineering and problem solving skills to develop solutions to complex problems in the electric power delivery infrastructure related to grid modernization. The Security Architect’s role is to provide end-to-end security architecture (holistic, enterprise-wide view) for the assigned projects.

Typical responsibilities will include:
·     Designing and/or architecting end-to-end secure solutions for one or
more of the following: network-centric systems, secure wireless mesh networking and embedded systems, large IT systems and internet security.
·     Security Policy/Standards - provide consultation and Enterprise
Security Policy/Standard interpretation
·     Process - analyze the business processes to identify issues with
service or product delivery caused by failure of internal controls, information systems or through weaknesses in operating procedures
·     Reviewing requirements and approving implementation plans - The
requirements must consider a holistic approach to security, all layers:
network; host; application (presentation logic, business logic and data access logic); runtime services and components; platform services and components and operating system
·     Architecture design - The security architect must have a thorough
understanding of the technical architecture to recommend and implement security controls
·     Implementation guidance - hands-on project consulting on security
issues and design
·     Regulatory and legislative compliance (NERC CIP, SOX, PII) – consult
and provide guidance on complying with appropriate policy/standards/measures
·     Assists testing lead to ensure that security related test cases are
written and executed
·     Participate in all stages of the SDLC process; includes business
process analysis, requirements documentation & reviews, system and architecture designs, testing, deployment & implementation, etc. (meeting deadlines and providing documentation/deliverables are critical)
·     Attending meetings, participating in activities and developing
relationships with other managers and project team members; and
·     Performing other duties and responsibilities as requested.

Basic Qualifications:

CISSP or other security certification preferred. Bachelors Degree in Computer Science, Security/Systems Engineering or a related field; or an equivalent combination of education, training, and work experience.
Typically possesses five or more years of experience in Information

Technology security with a focus on:

·     Process: SDLC; communications and network security, Vulnerability
Management; Threat Management
·     Deployment & Infrastructure:  data, applications, host, network
·     Architecture & Design:  Authentication; authorization; configuration
management; sensitive data, session management; cryptography; parameter manipulation; exception management; auditing & logging
·     Component Analysis: Web Services; Enterprise Services; Remote
Services; Data Access
·     Interest or participation in regulatory or national organizations
such as NIST, NERC, DOE, ISO, etc., as collaboration with these agencies is needed for policies & standards, data security, and privacy.

Core Competencies:

·     Demonstrated experience performing analysis, developing
specifications, designing, constructing, testing and implementing secure solutions designs (i.e. red team analysis, penetration testing).
·     Demonstrated ability to abstract the solution architecture into
different views and domains, apply critical thinking skills, technical ingenuity, creativity, and resourcefulness to ensure the security will continue to be viable.
·     Demonstrated knowledge of security standards and testing tools and
methods (i.e. NIST800-53, PKI).
·     Demonstrated strong oral and written communication skills, and be
customer focused to understand and appropriately respond to business requirements.
·     Demonstrated experience interfacing and collaborating with clients,
peers, and management to develop solutions.
·     Must demonstrate the ability to integrate work across relevant areas,
develop the business and services to enhance customer satisfaction and productivity, manage risks and safety appropriately, develop and execute business plans, manage information, and provide exceptional service to internal and external customers.
·     Must demonstrate effective resource and project planning, decision
making, results delivery, team building, and staying current with relevant technology and innovation.
·     Must demonstrate strong ethics, influence and negotiation,
leadership, interpersonal skills, communication, the ability to effectively manage stress and engage in continuous learning.


  1. Cyber insurance plans cover a variety of costs related to cyber attacks, including revenue lost from downtime, notifying customers impacted by a data breach, and providing identity theft protection for such customers.
    dataroom software

  2. But what types of specific transactions can be handled in online collaboration platforms such as virtual data rooms? Well, the answer depends on the type of law that you practice.

  3. This comment has been removed by the author.

  4. Great post, you have pointed out some fantastic points , I likewise think this s a very wonderful website. servicio de hacker

  5. I have a mission that I'm a little while ago chipping away at, and I have been at the post for such data
    siber güvenlik

  6. The extent of the chip set is critical as it characterizes two things: how well the camera can find in low level lighting conditions and the greatest determination of the camera. best home surveillance systems

  7. They ought to have an OK battery life. They ought to likewise have a high goals if at all conceivable. It is smarter to spend somewhat more to guarantee these highlights than to pay out some cash and be frustrated later on. Mr. Stevens

  8. Similarly as with the spy stores, you might need to gather data from a few destinations. Indeed, even a decent camera will have spoilers. Witty Spy

  9. Additionally, they are extremely little, which presents the two favorable circumstances and detriments - their little size guarantees greatest viability as spy cameras, yet in addition limit the structure decisions and equipment that goes into them. spy birthday party

  10. Herein, edge computing plays a pivotal role in bringing bandwidth-intensive data files and latency-sensitive business applications in proximity to the end-user or data source.

  11. The extent of the chipset is critical as it characterizes two matters: how well the camera can find in low-level lights conditions and the best determination of the digital camera. It's miles smarter to spend incredibly greater to Masters Dissertation Writing Help assure these highlights than to pay out some coins and be annoyed afterward.

  12. Questionnaire writing service can provide invaluable professional assistance if you need help with composing questionnaires for the research. Take alook at this one As for me it's the best writing service.

  13. Hello, thanks for sharing this interesting information. The material mentioned here will be useful for a lot of people. IT security is rather important issue which must be paid enough attention to. This info will be perfect for my quality essay writing.

  14. Wow its really you have shared useful information for us. as we provide business identity theft protection at affordable prices. for more info visit our website.

  15. I am thankful to the proprietor of this site which truly shares this superb work. That is really incredible and valuable data. I'm happy with simply imparting this to us. If you don't mind stay up with the latest. Try plagiarism checker online at

  16. I am glad to say that this is a very useful post. superb and of the best post.this inspired a new blog. Thanks for sharing wonderful information . Cyber Security Monitoring Service

  17. It is truly a well-researched content and excellent wording. I got so engaged in this material that I couldn’t wait to read. I am impressed with your work and skill. Thanks.Diy Project Consulting In USA

  18. This post is really awesome. Genuinely i like this blog. It gives me more useful information. I hope you share lots of things with us .
    Cyber Security company in London

  19. The information you have shared here is really informative as it contains some great knowledge which is very helpful for me. Thanks for posting it. Keep it up. Direct Support Professional Jobs

  20. You have a genuine capacity to compose a substance that is useful for us. You have shared an amazing post about jobs. Much obliged to you for your endeavors in sharing such information with us. Jobs in Luton

  21. Nice info, This information will always help everyone for gaining essential and good information. So please always share your valuable information. I am very thankful to you for providing good information. Computer Forensics Investigation service San Diego

  22. I’m going to read this. I’ll be sure to come back. thanks for sharing. and also This article gives the light in which we can observe the reality. this is very nice one and gives indepth information. thanks for this nice article... Cyber Security Awareness Training

  23. Cyber security measures must be taken by individuals, and companies to protect their data, devices, networks, systems etc. from potential security threats and cyber attacks. Glad to come across this. Thank you for sharing this review. Great blog. Cyber security companies in Mumbai

  24. I am very thankful to you for sharing this best knowledge with us. This information is helpful for everyone. So please always share this kind of knowledge with everyone. Thanks. Read more info about business pbx phone systems

  25. I am grateful that I was able to learn something useful from this article. After reading it, I believe you possess excellent expertise. Thank you for sharing about promotional products industry recruiters. Keep up the good work.

  26. You have provided a richly informative article. It is a beneficial article for me.Thanks for sharing this information here. trusted cyber security consulting firm

  27. You are doing excellent work. You have posted such a great article. It is thoroughly informative and knowledgeable.inexpensive cyber security consultancy services. Back message.

  28. This article provided me with a wealth of information about business pbx. The article is both educational and helpful. Thank you for providing this information. Keep up the good work.

  29. Excellent post. I really enjoy reading and also appreciate your work.Civil Engineering This concept is a good way to enhance knowledge. Keep sharing this kind of articles, Thank you.

  30. A very delightful article that you have shared consultant Your blog is a valuable and engaging article for us, and also I will share it with my companions who need this info. Thankful to you for sharing an article like this.

  31. You are sharing a piece of nice information here. The information you have provided is genuinely instructive and significant for us. Thanks for sharing an article like this.soc service USA

  32. I am heartily thankful to you that you have shared this best information with us. I got some different kind of knowledge from your web page, and it is really helpful for everyone. Thanks once again for share it. Indo Farm Tractor

  33. People defending against the cyberattack are using the wrong defence mechanism. The threats are more complicated in nature MIT Cybersecurity Courses List

  34. You have provided a richly informative article about Managed Security Service Provider It is a beneficial article for me and also helpful for those who are confused about it. Thanks for sharing this information here.

  35. I generally check this kind of article and I found your article which is related to my interest. Genuinely it is good and instructive information. Thankful to you for sharing an article like this.Cloud Service Provider in Saudi Arabia

  36. I generally want quality content and this thing I found in your article. It is beneficial and significant for us. Keep sharing these kinds of articles, Thank you.Blue Collar Recruiting Consultant Uae

  37. I am appreciative of this blog's ability to provide information on such an important subject. I discovered other segments here, and I'm excited to put these new instructions to use. Security Guard Companies in Bakersfield CA

  38. Really, this is a wonderful and helpful post for me. Here, I learned the most useful and enlightening facts. Security Services East London Thank you for sharing, and please continue to do so.

  39. Highly appreciable regarding the uniqueness of the content. This perhaps makes the readers feel excited to get stuck to the subject. Certainly, the learners would thank the blogger to come up with innovative content which keeps the readers to be up to date to stand by the competition. Once again nice blog keep it up and keep sharing the content as always. Cyber security company in India

  40. Very well written article. It was an awesome article to read. Complete rich content and fully informative. I totally Loved it.Cyber Security Solution