We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Architect, IT Security

Concentra, Inc
paid time off, tuition reimbursement, 401(k), retirement plan
United States, Texas, Addison
Oct 23, 2025

Architect, IT Security
Location

US-TX-Addison




Job ID
346496

Pos. Category
Corporate - Information Systems

Pos. Type
Full Time

Recruiter : Full Name: First Last
Demetrius Daniels



Overview

Concentra is recognized as the nation's leading occupational health care company.

With more than 40 years of experience, Concentra is dedicated to our mission to improve the health of America's workforce, one patient at a time. With a wide range of services and proactive approaches to care, Concentra colleagues provide exceptional service to employers and exceptional care to their employees.

The Architect, IT Security is responsible for planning, coordinating, and executing projects related to the strategic direction of the Information Security department. This includes identifying necessary resources across functional and technical teams and coordinating the efforts of team members to deliver projects according to plan. The Security Architect should research technologies and solicit input from others to understand the broader business context of situations before finalizing technical recommendations. Responsibilities of this position include the mentoring of other Information Security staff members.

The Architect, IT Security is challenged with ensuring that projects and new initiatives align with the strategic direction of the Information Security department, while following documented Security and Change Control policies with emphasis on overall data and system integrity. The role is also challenged with evaluating the effectiveness of the state-of-the art security techniques that are employed to maintain the highest level of security for all platforms and applications maintained by the company.



Responsibilities

    Oversee, act and report on any security violations related to the unwarranted access to corporate data.
  • Ensure that all issues are resolved in a timely and efficient manner.
  • Build team spirit by assisting other staff members and promoting a positive workplace.
  • Stay abreast and aware of the rapidly changing environment and recommend cost efficient techniques.
  • Recognize potential areas where policies and procedures require change, or where new ones need to be developed, especially regarding future business expansion. Submit recommendations as appropriate.
  • Design, implement, and maintain Identity Governance and Administration (IGA) solutions using IBM Security Verify Governance (ISVG).
  • Develop and deploy custom integrations with target systems for automated provisioning and deprovisioning of user access.
  • Create and manage automation workflows for identity lifecycle management processes to improve operational efficiency and reduce manual efforts.
  • Lead and execute ISVG upgrades, including application of fix packs, patches, and configuration updates.
  • Administer and optimize the ISVG environment on a Linux-based platform hosted in AWS (Amazon Web Services).
  • Ensure high availability, performance tuning, and disaster recovery readiness of the ISVG infrastructure.
  • Collaborate with cross-functional teams to assess security requirements and develop secure identity solutions aligned with enterprise standards.
  • Develop and maintain detailed technical documentation, including architecture diagrams, configuration settings, and operational procedures.
  • Conduct regular system health checks, audit logs review, and security assessments to maintain compliance with organizational policies and industry regulations.
  • Provide technical leadership and mentoring to junior team members and contribute to the overall security architecture strategy.
  • Advance Information Services strategies by researching, recommending, and implementing strategic technical solutions.
  • Ensure projects and new initiatives align with the strategic direction of the Information Security department.
  • Responsible for ensuring successful integration and/or implementation of applications, systems, and technology.
  • Recommends information security and technology strategies, policies, and procedures by evaluating organizational outcomes, identifying problems, evaluating trends, and anticipating requirements.
  • Completes projects by coordinating resources and timetables across functional and technical teams.
  • Maintains professional and technical knowledge by attending educational workshops, reviewing professional publications, establishing personal networks, benchmarking state-of-the-art practices, and participating in professional societies.
  • Ensure platform-level compliance to information security policies, standards and best practices through a security monitoring and compliance review program.
  • Report status and provide documentation on tasks and issues.
  • Keep abreast of the "state of the art" security techniques and technologies to advise systems designers and users on practices that best implement stated policy and standards.
  • Participates in the creation and ongoing monitoring of back-up, recovery and business continuity procedures. This is an ongoing process.
  • Address and resolve change and problem management activities to ensure that information security concerns are incorporated into information technology development efforts.
  • Conduct investigations and forensic work into any alleged computer or network security compromises, incidents, or problems.
  • Point of contact in defining requirements to configure standardized system functionality for systems and applications.
  • Create and maintain training documentation for internal staff and/or users. Conduct training sessions.
  • Act as contact for support questions from co-workers.
  • Handle the interaction with users and their problems in a courteous, patient, informative and timely manner.
  • Follow proper procedures for problem resolution and escalation, including vendor interaction.
  • Log and review outstanding issues in a timely manner.
  • Be available to provide on call support, as required.
  • Conduct status meetings with Information Services staff and provide documentation on tasks, issues, and projects on a regular basis to the reporting manager.
  • Develop reports upon request, utilizing various report-writing tools in all applications.
  • Monitor vendor progress on incidents and enhancements to all related systems and facilitate regular vendor roadmap discussions.
  • Ensure that all application, system, and security related problems are resolved in a timely and efficient manner.
  • Be compliant in ensuring awareness of the rapidly changing Select Medical environment and recommend cost effective techniques when planning projects and supporting corporate and field systems.
  • Recognize any problem, hardware or software that may have ramifications Enterprise-wide; strategize and define remediation plan with the IS management team.


Qualifications

  • Education Level: Bachelor's Degree Major: Computer Science, Cybersecurity
  • Experience in lieu of required education is acceptable
  • Minimum of 15 years of Information Technology / Security of which a minimum of 5+ years of experience in IBM SVG (Security Verify Governance).
  • 5 years project management experience.
  • Proven experience with IBM Security Verify Governance (ISVG) including configuration, customization, and integration.
  • Strong scripting skills (e.g., Perl, Shell, Python, or JavaScript) for automation and customization.
  • Hands-on experience managing ISVG in AWS environments and proficiency with Linux-based systems.
  • In-depth knowledge of identity management concepts such as RBAC, policy-based access control, and compliance reporting.
  • Experience with web services (REST/SOAP) for system integrations.
  • Strong understanding of IAM best practices, security policies, and regulatory compliance frameworks (e.g., SOX, HIPAA).
  • Minimum of 3 years leadership experience
  • Large scale multi-site IS data center experience.
  • Knowledge of Microsoft productivity applications.
  • Understanding of change management processes required.

Job-Related Skills/Competencies

  • Proficient analytical, problem-solving, and communication skills.
  • Requires superior teamwork skills.
  • Strong interpersonal and communication skills a must; ability to read, write, and speak in a professional manner.
  • Ability to effectively multi-task and adapt to changing business priorities.
  • Excellent attention to detail.
  • Understanding of operating systems such as Windows, Cisco iOS, Linux, AIX, UNIX and OS X/iOS.
  • Healthcare systems experience preferred.
  • Strong dedication to quality customer service.
  • Understanding of HIPAA, SOX, and PCI Security Regulations a plus.
  • Excellent time management, organizational, and documentation skills are required.
  • Superior report writing skills a plus.


Additional Data

Employee Benefits

  • 401(k) Retirement Plan with Employer Match
  • Medical, Vision, Prescription, Telehealth, & Dental Plans
  • Life & Disability Insurance
  • Paid Time Off
  • Colleague Referral Bonus Program
  • Tuition Reimbursement
  • Commuter Benefits
  • Dependent Care Spending Account
  • Employee Discounts

We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation, if required.

*This job requires access to confidential and sensitive information, requiring ongoing discretion and secure information management*

Concentra is an Equal Opportunity Employer, including disability/veterans

Applied = 0

(web-675dddd98f-kfkhf)