Principal Architect - Cybersecurity

<div><div><p><span><span>Final candidate must be available for final interview in-person on site.</span></span><span> </span></p><p></p></div><div><p><span><span>Successful<span> </span></span><span>candidate</span><span><span> </span>must be available for on-site immersion training for first 30 days of hire.</span></span><span> </span></p></div><div><p><span> </span></p></div><div><p><span><span>Imagine yourself… </span></span><span> </span></p></div><div><ul><li><p><span><span>Owning your ambition and fueling your career growth.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Thriving in a supportive team environment that inspires you to strive for excellence.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Collaborating with a vibrant,<span> </span></span></span><span><span>inclusive</span></span><span><span>, global team.</span></span><span> </span></p></li></ul></div><div><p><span> </span></p></div><div><p><span><span>At<span> </span></span><span>Veralto</span><span>,<span> </span></span><span>o</span><span>ur unifying purpose of Safeguarding the World’s Most Vital Resources™ is more than words:<span> </span></span><span>it’s</span><span><span> </span>a proven path towards positive change, improvement for our planet, and development for yourself. </span></span><span> </span></p></div><div><p><span> </span></p></div><div><p><span><span>Whether<span> </span></span><span>we’re</span><span><span> </span>ensuring the continued availability of clean drinking water, protecting our waterways, or enhancing the traceability, color accuracy, and packaging of everyday essentials, the work we do every day contributes to a safer world and a more sustainable future.</span></span><span> </span></p></div><div><p><span> </span></p></div><div><p><span><span>When you join<span> </span></span><span>Veralto’s</span><span><span> </span>vibrant global network of 13 operating companies and 1</span><span>7</span><span>,000 associates, you join a unique culture and work environment<span> </span></span></span><b><span>where purpose meets possibility</span></b><span><span>: where the work you do has an everyday impact on the resources and<span> </span></span><span>essentials</span><span><span> </span>we all rely on, and where you’ll have boundless opportunities to deepen your skillset, pursue your ambitions, and grow your career. </span></span><span> </span></p></div><div><p><span> </span></p></div><div><p><span> </span></p></div><div><p><span><span>We offer: </span></span><span> </span></p></div><div><ul><li><p><span><span>Bonus/incentive pay and equity awards for eligible roles</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>A flexible, remote-friendly work environment</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Paid holidays and a permissive paid time off policy emphasizing flexibility and trust</span></span><span> </span></p></li></ul></div></div><div><div><ul><li><p><span><span>Ongoing investment in your career through dedicated training, on-the-job development, and coaching</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Total rewards that support your success at work and beyond, including comprehensive health benefits, a 401(k) savings plan with employer match, and associate wellbeing programming with rewards</span></span><span> </span></p></li></ul></div><div><p><span> </span></p></div><div><p><span> </span></p></div><div><p><span><span>Reporting to th</span><span>e</span><span><span> </span></span><span>Global Leader, Security Services</span><span>,</span><span><span> </span></span><span>the</span><span><span> </span></span></span><b><span>Principal Architect</span></b><span><span><span> </span>is a senior individual contributor who serves as a technical authority and trusted advisor across the organization's security program. This role<span> </span></span></span><b><span>leads through technical credibility,<span> </span></span><span>expertise</span><span>, and influence by shaping security strategy, elevating standards, and driving outcomes across teams, business units, and executive stakeholders</span></b><span><span>. The Principal Analyst partners</span><span><span> </span></span><span>closely with engineering, operations, and senior leadership to translate complex security risks into clear, business-relevant guidance and recommendations. This position does not include direct people management or budget ownership. This is a remote position,<span> </span></span><span>part of the<span> </span></span><span>V</span><span>eralto</span><span><span> </span></span><span>Global Security team, with occasional travel<span> </span></span><span>r</span><span>equired</span><span>.</span></span><span> </span></p></div><div><p><span><span>Time zone: Primarily US Eastern<span> </span></span></span><b><span>Minimum 5</span></b><span>‑</span><b><span>hour overlap with Eastern Time required</span></b><span> </span></p></div><div><p><span> </span></p></div><div><p><span> </span></p></div><div><p><b><span>In this role, a typical day will look like:</span></b><span> </span></p></div><div><p><span><span>Technical Leadership & Advisory</span></span><span> </span></p></div><div><ul><li><p><span><span>Serve as the authoritative owner of enterprise-wide security architecture, reference architectures, and standards and ensuring they<span> </span></span><span>remain</span><span><span> </span>current with evolving threats, and emerging technologies as well as ensuring they are embedded into process across engineering and product teams.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Provides</span><span><span> </span>authoritative security guidance across multiple operating companies and domains, influencing senior leaders to align security strategy with business<span> </span></span><span>objectives</span><span><span> </span>and adopt consistent standards</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Serve as a subject matter authority across a broad portfolio of<span> </span></span><span>cyb</span><span>ersecurity domains,<span> </span></span><span>providing</span><span><span> </span>expert guidance on identity and access management, monitoring and detection, cloud security architecture, endpoint security, data protection, and network security.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Lead complex security architecture reviews, evaluating proposed designs, systems, and technologies to<span> </span></span><span>identify</span><span><span> </span>risk exposures and provide actionable, risk-mitigating recommendations to engineering and product teams.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Establish and<span> </span></span><span>maintain</span><span><span> </span>security architecture principles, patterns, and standards aligned to frameworks such as NIST CSF, ISO 27001, and Zero Trust Architecture.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Evaluate and advise on the selection of security technologies and tools, assessing fit against organizational needs, risk posture, and strategic direction.</span></span><span> </span></p></li></ul></div><div><p><span><span>Business Influence & Executive Communication</span></span><span> </span></p></div><div><ul><li><p><span><span>Communicate complex<span> </span></span><span>cyb</span><span>ersecurity risks, findings, and recommendations clearly and concisely to directors and executives, translating technical concepts into business impact and strategic context.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Build and sustain trusted relationships across operating companies, technology teams, and leadership to drive security priorities and foster a security-conscious culture.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Influence security decisions and adoption of security standards across the organization without direct authority,<span> </span></span><span>leveraging</span><span><span> </span></span><span>expertise</span><span>, data, and persuasive communication.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Develop and present executive level briefings, risk summaries, architecture decisions, and strategic recommendations.</span></span><span> </span></p></li></ul></div><div><p><span><span>Project & Initiative Ownership</span></span><span> </span></p></div></div><div><div><ul><li><p><span><span>Own and drive complex, cross operating company security<span> </span></span><span>projects</span><span><span> </span>and initiatives from initiation through delivery with minimal supervision, proactively<span> </span></span><span>identifying</span><span><span> </span>risks, managing stakeholder expectations, and removing obstacles.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Develop project plans, success criteria, and milestone tracking for security initiatives, ensuring accountability and<span> </span></span><span>timely</span><span><span> </span>completion.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Collaborate with program and project management teams to integrate security requirements into enterprise transformation initiatives, technology deployments, and business change programs.</span></span><span> </span></p></li></ul></div><div><p><span><span>Risk Assessment & Governance</span></span><span> </span></p></div><div><ul><li><p><span><span>Conduct and lead<span> </span></span><span>architectural based</span><span><span> </span>security risk assessments of new and existing technologies, third-party integrations, and business processes, producing clear risk findings with prioritized mitigation options.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Contribute to the development and maintenance of<span> </span></span><span>cyb</span><span>ersecurity architectural policies, standards, and guidelines, ensuring they<span> </span></span><span>remain</span><span><span> </span>current with evolving threats and regulatory requirements.</span></span><span> </span></p></li></ul></div><div><p><span><span>Mentorship & Knowledge Sharing</span></span><span> </span></p></div><div><ul><li><p><span><span>Act as a mentor and technical resource for junior and mid-level security analysts and engineers, sharing<span> </span></span><span>expertise</span><span><span> </span>and elevating the overall capability of the security organization.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Contribute to communities of practice, internal knowledge bases, and security training initiatives to build security technical depth across the organization.</span></span><span> </span></p></li></ul></div><div><p><span> </span></p></div><div><p><b><span>The essential requirements of the job include</span><span>:</span></b><span><span> </span></span><span> </span></p></div><div><ul><li><p><span><span>Bachelor's degree in Computer Science</span><span>, Information Security, Management Information Systems, or equivalent combination of education and work experience.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Typically</span><span><span> </span></span></span><b><span>10+ years</span></b><span><span><span> </span>of progressive experience in information security, with<span> </span></span><span>demonstrated</span><span><span> </span>depth across multiple security domains.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Proven<span> </span></span><span>track record</span><span><span> </span>of independently leading and delivering complex, cross-functional security projects and programs with minimal direction.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Deep technical<span> </span></span><span>expertise</span><span><span> </span>in<span> </span></span></span><b><span>Identity and Access Management / Identity Governance</span></b><span><span>, including PAM, IGA, IAM SSO, MFA, and directory services (e.g., Active Directory, Entra ID).</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Strong hands-on knowledge of<span> </span></span></span><b><span>monitoring and detection technologies</span></b><span><span>, including SIEM platforms (e.g., Microsoft Sentinel), EDR/XDR, SOAR, and threat intelligence platforms.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Demonstrated<span> </span></span><span>expertise</span><span><span> </span>in<span> </span></span></span><b><span>cloud security architecture</span></b><span><span><span> </span>across one or more major cloud providers (e.g., AWS, Azure, GCP), including cloud-native security controls,<span> </span></span><span>IaC</span><span><span> </span>security, and multi-cloud environments.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Candidates must be able to travel to the US</span></span><span> </span></p></li></ul></div><div><p><span> </span></p></div><div><p><span> </span></p></div><div><p><span><span>With annual sales of $5 billion,<span> </span></span><span>Veralto</span><span><span> </span>is a global leader in essential technology solutions with a proven<span> </span></span><span>track record</span><span><span> </span>of solving some of the most complex challenges we face as a society. Our industry-leading companies with globally recognized brands are building on a long-established legacy of innovation and customer trust to create a safer, cleaner, more vibrant future. </span></span><span> </span></p></div></div><div><p><span> </span></p></div><div><p><span><span>Veralto’s</span><span><span> </span>Water Quality companies—Aquatic Informatics, ChemTreat, Hach,<span> </span></span><span>McCrometer</span><span>, OTT<span> </span></span><span>HydroMet</span><span>, Sea-Bird Scientific, Trojan Technologies, and XOS—manage, treat, purify, and protect the global water supply, from municipal and wastewater treatment facilities to lakes, rivers, watersheds, and oceans. And our Product Quality & Innovation companies—Esko, Linx, Pantone, Videojet, and X-Rite—protect the world’s food, medicine, and essentials by tracking and authenticating the billions of goods that travel the global supply chain every day.<span> </span></span><span>Veralto</span><span><span> </span>is headquartered in Waltham, Massachusetts, with 300+ locations worldwide. </span></span><span> </span></p></div><p style="text-align:inherit"></p><p style="text-align:left"><span><span><span><b><u>US ONLY</u>:</b></span><span> </span></span></span></p><p style="text-align:inherit"></p><p style="text-align:left"><span><span>The below range reflects the range of possible compensation for this role at the time of this posting. We may ultimately pay more or less than the posted range. This range may be modified in the future. An associate’s position within the salary range will be based on several factors, including, but not limited to, relevant education, qualifications, certifications, experience, skills, seniority, geographic location, performance, shift, travel requirements, sales or revenue-based metrics, any collective bargaining agreements, and business or organizational needs. </span></span></p><p style="text-align:inherit"></p>The compensation range for this role is $175,000 - $195,000 USD per year. <p style="text-align:inherit"></p><p style="text-align:left"><span><span>We offer a comprehensive package of benefits including paid time off, <span><span><span><span><span><span><span><span><span class="WIH1">medical/dental/vision</span></span></span></span></span></span></span></span></span> insurance and 401(k) to eligible employees.</span></span><span><span> </span></span></p><p style="text-align:inherit"><span> </span></p><p style="text-align:left"><span><span>Note: No amount of pay is considered to be wages or compensation until such amount is earned, vested, and determinable. The amount and availability of any bonus, commission, benefits, or any other form of compensation and benefits that are allocable to a particular employee remains in the Company's sole discretion unless and until paid and may be modified at the Company’s sole discretion, consistent with the law.</span></span><span><span> </span></span></p><p></p><p><span>US residents: In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.</span></p><p style="text-align:inherit"></p><p style="text-align:left">Veralto Corporation and all Veralto Companies are committed to equal opportunity regardless of race, color, national origin, religion, sex, age, marital status, disability, veteran status, sexual orientation, gender identity, or other characteristics protected by law. We value diversity and the existence of similarities and differences, both visible and not, found in our workforce, workplace and throughout the markets we serve.<span>  </span>Our associates, customers and shareholders contribute unique and different perspectives as a result of these diverse attributes.<br><br>The EEO posters are available <b><a target="_blank" href="https://www.dol.gov/agencies/ofccp/posters"><span class="emphasis-3">here</span></a></b>.<br><br>We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform crucial job functions, and to receive other benefits and privileges of employment. <span>Please contact us at </span><a target="_blank" href="mailto:applyassistance@veralto.com"><span><span><span><span><span><span><span><span><span><span><span><span><span><span><span><span><span><span><span><span><span><span><span><span><span class="WIH1">applyassistance@veralto.com</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></a><span> to request accommodation.</span><br> </p><p style="text-align:left"><b>Unsolicited Assistance</b></p><p style="text-align:left"><span>We do not accept unsolicited assistance from any headhunters or recruitment firms for any of our job openings. All resumes or profiles submitted by search firms to any employee at any of the </span><a target="_blank" href="https://www.veralto.com/our-companies/">Veralto companies</a><span>, in any form without a valid, signed search agreement in place for the specific position, approved by Talent Acquisition, will be deemed the sole property of Veralto and its companies. No fee will be paid in the event the candidate is hired by Veralto and its companies because of the unsolicited referral.</span></p>

Back to blog

Common Interview Questions And Answers

1. HOW DO YOU PLAN YOUR DAY?

This is what this question poses: When do you focus and start working seriously? What are the hours you work optimally? Are you a night owl? A morning bird? Remote teams can be made up of people working on different shifts and around the world, so you won't necessarily be stuck in the 9-5 schedule if it's not for you...

2. HOW DO YOU USE THE DIFFERENT COMMUNICATION TOOLS IN DIFFERENT SITUATIONS?

When you're working on a remote team, there's no way to chat in the hallway between meetings or catch up on the latest project during an office carpool. Therefore, virtual communication will be absolutely essential to get your work done...

3. WHAT IS "WORKING REMOTE" REALLY FOR YOU?

Many people want to work remotely because of the flexibility it allows. You can work anywhere and at any time of the day...

4. WHAT DO YOU NEED IN YOUR PHYSICAL WORKSPACE TO SUCCEED IN YOUR WORK?

With this question, companies are looking to see what equipment they may need to provide you with and to verify how aware you are of what remote working could mean for you physically and logistically...

5. HOW DO YOU PROCESS INFORMATION?

Several years ago, I was working in a team to plan a big event. My supervisor made us all work as a team before the big day. One of our activities has been to find out how each of us processes information...

6. HOW DO YOU MANAGE THE CALENDAR AND THE PROGRAM? WHICH APPLICATIONS / SYSTEM DO YOU USE?

Or you may receive even more specific questions, such as: What's on your calendar? Do you plan blocks of time to do certain types of work? Do you have an open calendar that everyone can see?...

7. HOW DO YOU ORGANIZE FILES, LINKS, AND TABS ON YOUR COMPUTER?

Just like your schedule, how you track files and other information is very important. After all, everything is digital!...

8. HOW TO PRIORITIZE WORK?

The day I watched Marie Forleo's film separating the important from the urgent, my life changed. Not all remote jobs start fast, but most of them are...

9. HOW DO YOU PREPARE FOR A MEETING AND PREPARE A MEETING? WHAT DO YOU SEE HAPPENING DURING THE MEETING?

Just as communication is essential when working remotely, so is organization. Because you won't have those opportunities in the elevator or a casual conversation in the lunchroom, you should take advantage of the little time you have in a video or phone conference...

10. HOW DO YOU USE TECHNOLOGY ON A DAILY BASIS, IN YOUR WORK AND FOR YOUR PLEASURE?

This is a great question because it shows your comfort level with technology, which is very important for a remote worker because you will be working with technology over time...