Principal Architect - Industrial Networks, Isolation and Network Governance

GE Vernova
1 week ago
Create job alert

Job Description Summary

The Principal Architect will use their experience and advanced knowledge of principles, theories, and concepts of security, networks, cloud, and software defined technologies to create secure network solutions that solve immediate and future challenges of GE VERNOVA's infrastructure initiatives related to the spin, implementing appropriate segmentation to protect the Vernova business, ensuring a clean transition while the network conveys to Vernova, enabling the TSA commitments while transforming the future of secure work across VERNOVA leveraging innovative technologies and industry best practices.

In this position you will work on highly complex projects that requires in-depth knowledge within Network Architecture, Infrastructure Security and Operations technical domain in addition to understanding of how network security impacts/depends on other technical products in infrastructure - e.g. Identity, network, digital workplace, cloud and hosting. Principal Architect Industrial Networks and Isolation will own product architecture for OT isolation and OT LAN/wireless architecture as well as global segmentation architecture for all network products. In addition, this role will own global network governance for access management, service management, audits, SOX and any regulated use cases.

Job Description

In this role you will:

  1. Define and own the network solution architecture building blocks across multiple use cases for segmentation technologies (Next-Gen Firewalls, Threat management, SASE, OT, Labs, M&D) in partnership with the subject matter experts from the Network architecture and product organizations.
  2. Own architecture and overall governance of network isolation and segmentation for industrial domain (OT Segmentation, Inspection, Isolation, internet egress security, DMZ use, 3rd Party Rail use, Cloud Networking, and other Edge network security components that may be relevant to industrial use cases).
  3. Own critical network governance processes - audit schedule, execution and coordination of remediation, network access governance and standards, ITSM processes related to network architecture and any regulatory driven processes applied to network (e.g. SOX remediation).
  4. Partner with SMO and CTO organizations to identify & prioritize network projects and features release across the Network product portfolio reporting to the Network Architecture leader.
  5. Together with network security architecture and Edge product, build the foundations for a Zero Trust Network Access application to OT environments.
  6. Work closely with peers from the Network and Cyber security organization and other internal Teams to develop requirements, map dependencies and define timelines for new projects and initiatives.
  7. Provide guidance to internal teams working on projects with strong dependencies on the Network products and services.
  8. Participate in the development of automation solutions to improve the Network products and services (simplify operations, reduce time to market, increase availability...).
  9. Ensure for all new solutions that the development of software, data and/or technology platforms are service-oriented with reusable components across teams (multiple teams) that can be orchestrated together into different methods for different businesses.
  10. Together with business technology teams, lead the research and evaluation of emerging technology, industry and market trends to assist in project development and/or operational support activities to for multiple teams or complex scenarios.
  11. There is no direct financial responsibility, however financial mindset and rigor are expected as part of the solution design process.

Qualifications & Requirements

  1. Bachelor's Degree in Computer Science or in "STEM" Majors (Science, Technology, Engineering and Math) and/or minimum of 12 years of professional experience in a technical area (Security Architecture, or Information Technology) or (a high school diploma / GED with at least 8 years of experience in Information Technology or Software).
  2. Relevant certifications in the network and cloud space are a big plus.

Desired CharacteristicsTechnical Expertise:

  1. A minimum of 10 years of proven experience in the network and network security, design, and implementation, with a strong focus on large-scale, complex enterprise environments and modern security solutions (NGFWs, SASE/SSE, Cloud Security, virtualization, and automation).
  2. Track record of delivering large scale OT solutions in multiple businesses using Next-Gen Firewalls.
  3. Strong understanding of cybersecurity standards and frameworks e.g. ISO27001, NIST, CIS, OWASP, SOC2.
  4. Understands technical and business discussions relative to future architecture direction aligning with business goals.
  5. Understanding of TCP/IP network architectures to meet business application system qualities.
  6. Knowledge of Cloud computing (AWS or Azure) and Cloud providers network connectivity and concepts (Direct Connect, Express Route, route 53, TGW, V-WAN Hub...).
  7. Working knowledge of Identity Services and how they relate to network security solutions.
  8. Experience with one or more network virtualization platforms.
  9. Understands concepts of setting and driving architecture direction.
  10. Familiar with elements of gathering architecture requirements.
  11. Understands architecture standards concepts to apply to project work.

Business Acumen:

  1. Understand key cross-functional concepts that impact the organization; is aware of business priorities and organizational dynamics.
  2. Familiar with concepts of costing hardware and software components. Works to assure work is on-time and within budget.
  3. Recommends expenditures based on the size, scope, and cost of hardware and software components. Assists in developing business cases.
  4. Delivers tasks on-time with alignment to architectural goals. Can identify and raise issues, risks, and benefits. Participates in change initiatives by implementing new directions and providing appropriate information and feedback.

Personal Attributes:

  1. Applies values, policies, procedures, and precedent to make timely, routine decisions of limited, clear choice.
  2. Reacts open-mindedly to new perspectives or ideas. Considers different or unusual solutions when appropriate.
  3. Resolves day-to-day issues related to strategy implementation. Escalates issues that impact the client and/or strategic initiatives.

Leadership:

  1. Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one.
  2. Strong interpersonal skills, with an emphasis on the ability to effectively influence others.
  3. A team-focused mentality with the proven ability to work effectively with diverse stakeholders.
  4. An ability to communicate complex and technical issues to diverse audiences, orally and in writing, in an easily understood, authoritative, and actionable manner.
  5. Takes a systems perspective that inter-relates internal and external factors for planning.
  6. Envisions, compares, and contrasts multiple potential medium range operational futures.
  7. Challenges conventional thinking and traditional ways of operating and invites stakeholders to identify issues and opportunities.

Additional Information

Relocation Assistance Provided:No

#LI-Remote - This is a remote position

#J-18808-Ljbffr

Related Jobs

View all jobs

Principal Architect - Industrial Networks, Isolation and Network Governance

Cyber Security Architect

Principal Security Architect

Principal Systems Engineer (EV)

Principal Security Consultant

Solutions Architect - Technology

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Global vs. Local: Comparing the UK Cybersecurity Job Market to International Landscapes

Understanding opportunities, salaries, and work culture in cybersecurity across the UK, the US, Europe, and Asia Cybersecurity has rapidly ascended from a back-office concern to a strategic priority for every industry. As data breaches, ransomware, and nation-state attacks increase in frequency and sophistication, organisations worldwide are racing to fortify their digital defences. This ongoing surge in cyber threats fuels an unprecedented demand for skilled security professionals—ranging from penetration testers and threat intelligence analysts to cloud security architects and CISOs. In this article, we’ll explore how the UK cybersecurity job market compares to major international hubs in the United States, Europe, and Asia. We’ll discuss job opportunities, salary bands, work culture, and provide guidance for those who might be contemplating remote or overseas positions. By understanding the nuances of each region’s cybersecurity ecosystem, you can make a more informed decision about where and how to advance your career in this high-impact, fast-evolving sector. Whether you’re a seasoned expert with years of experience or a career-changer eager to break into cybersecurity, this overview will help you navigate the global landscape. By the end, you’ll have a clearer perspective on each region’s advantages and challenges—along with practical insights for seizing the best opportunities in a field that has become mission-critical for every modern organisation.

Cybersecurity Leadership for Managers: Strategies to Motivate, Mentor, and Set Realistic Goals in Threat-Driven Environments

In an era of rapidly increasing data breaches, ransomware attacks, and corporate espionage, the importance of robust cybersecurity cannot be overstated. Protecting digital assets has become as essential as safeguarding physical resources, and organisations worldwide rely heavily on specialised teams to defend against sophisticated cyber threats. However, even the most advanced tools and techniques are only as effective as the leadership guiding their use. Cybersecurity leadership requires a dynamic blend of technical know-how, strategic thinking, and people-management skills to maintain readiness against ever-evolving threats. This article is designed for professionals aiming to lead cybersecurity teams or transition into managerial roles where understanding how to motivate, mentor, and set realistic goals is paramount. With insights into building high-performing teams, fostering collaboration, and embracing continuous learning, you’ll be equipped to protect your organisation from a broad spectrum of cyber risks.

10 Must-Read Cyber Security Books for UK Professionals: Boost Your Career and Stay Ahead of Threats

With rapid advancements in digital infrastructure, cloud computing, and the Internet of Things (IoT), cyber threats continue to evolve at lightning speed. For organisations across the UK—and globally—robust cyber security is no longer optional: It’s a strategic imperative. From healthcare and finance to government agencies and tech start-ups, every sector needs skilled professionals to safeguard critical data and protect users. If you’re looking to break into or advance within the cyber security industry, staying updated on the latest techniques, threat landscapes, and defence strategies is paramount. One of the best ways to build and sharpen your expertise is by reading authoritative, high-quality books that combine foundational knowledge with cutting-edge insights. In this guide, we’ve compiled a list of ten books that cater to various skill levels, spanning ethical hacking and threat intelligence to secure software development and cryptography. By diving into these resources, you’ll fortify your understanding of cyber security fundamentals, explore hands-on techniques for defending systems, and gain the strategic perspective needed to excel in roles throughout the UK’s thriving cyber security landscape.