Information Security Architect (14-19 years exp)

13-15 years
a month ago 1 Applied
Job Description

About Mouser:

Mouser Electronics, a Berkshire Hathaway company, is an award-winning, global authorized semiconductor and electronic component distributor for over 1,100 leading manufacturing brands focused on rapid New Product Introductions from its manufacturing partners for electronic design engineers and buyers.

Mouser was started in the year 1964 and is headquartered at Mansfield, Texas. We are around 2500+ employees and have 27 offices located around the globe. With over $2 billion in annual revenue, Mouser is ranked as the seventh largest electronic component distributor in the world. We conduct business in 21 different languages and 34 currencies.

Our extensive product offering includes semiconductors, interconnects, passives, and electromechanical components. Mouser has a strong commitment to customer service, that's why we've won awards for our legendary worldwide customer service excellence. Selection, speed and accuracy are the core of Mouser's state-of-the-art distribution center, with sophisticated equipment enabling us to process orders 24/7

Website: Electronic Components Distributor - Mouser Electronics India



Title: Information Security Architect

The Information Security Architect provides detailed recommendations for architecture and technology and reports on all matters relevant to information security. The Information Security Architect works with infrastructure teams, support teams, and development teams to develop and implement security standards and training, ensures confidentiality, integrity, and availability of the Mouser systems, reviews, documents, and assesses all items relevant to information security.


  • Evaluate systems, workflows, methodologies, source code, and configurations against appropriate information security standards and provide reports to document.
  • Works to ensure confidentiality, integrity, and availability of Mouser systems.
  • Develops, deploys, and maintains information security-related tools and systems in support of information security operations.
  • Maintains strict confidentiality of all sensitive or confidential information.
  • Must stay up to date on current security, operating systems and web technologies.
  • Mentors and trains both technical and non-technical audiences on security practices and standards.
  • Ability to effectively communicate both verbal and written technical and non-technical communication. Uses good business judgment and communications to keep IS Management informed.
  • A positive attitude, good teamwork, professionalism & interpersonal skills, proactively seeking solutions, and taking initiative where necessary.
  • Other duties as required.


  • OWASP Top 10 and relevant mitigations.
  • Common infrastructure systems and associated security controls.
  • Network security including Firewalls and VPN.
  • PKI and Multifactor Authentication.
  • SAML and/or oAuth, Authentication, Authorization, and Accounting.
  • Web based APIs and automation systems.
  • Encryption and key management.
  • Programming languages and secure application development.
  • Database operations and security controls.
  • Risk based assessment and Risk management methodologies.
  • Compliance frameworks (NIST, PCI, SOX, ISO, GDPR, etc.).
  • Relevant information security certification.
  • Strong analytical and problem-solving skills.
  • Strong team-oriented interpersonal and communication skills.
  • Self-starter and finds issues and opportunities and makes recommendations to management.


  • Bachelor's degree in computer science, Information Technology, or a related field.
  • 13 + years Information Security experience required.
  • Internal candidates: Experience can be a combination of internal and external experience.
  • Experienced using and implementing security standards, languages, tools, and applications listed in the Skills section of this document.

This is a summary of the primary accountabilities and requirements for this position. The company reserves the right to modify or amend accountabilities and requirements at any time at its sole discretion based on business needs. Any part of this job description is subject to possible modification to reasonably accommodate individuals with disabilities.





infrastructure systems
information security certification
Database operations
secure application development
Compliance frameworks
Multifactor Authentication
Risk based assessment
Risk management methodologies
team-oriented interpersonal

People Also Considered

Career Advice to Find Better