Sr. Director of Enterprise Architecture and Security

Summary: The Senior Director of Enterprise Architecture and Security is responsible for the technical vision and leading the core technology development, implementation supporting our technology operations. The Senior Director will play an integral role in establishing the strategic technology direction the organization decides to take. The Senior Director provides formal supervision and coaching for the Architectural, Security, Infrastructure and Operations functions. Sets vision and direction to inspire and drive continuous improvement of the organization's Information Technology System policies, standards, and procedures. The Senior Director of Enterprise Architecture is expected to demonstrate significant depth and breadth of leadership and vast technology expertise to establish strategic direction and develop strategic relationships. The Senior Director is expected to achieve technological improvements for the organization and in the management practices that result in lower costs and superior service delivery.

Essential Duties and Responsibilities:

Strategy & Planning

  • Integral role in forming and executing the technological strategy, driving the architectural vision, integration, and problem solving on an enterprise level to cultivate and drive innovation across the IT, CRM, and ERP to support the business objectives.
  • Lead strategic technological planning to achieve business goals by prioritizing technology initiatives and coordinating the evaluation, deployment, and management of current and future technologies.
  • Collaborate with the appropriate departments to develop and maintain a technology plan that supports organizational needs.
  • Develop and communicate enterprise technology alignment plans to executive team, staff, partners, customers, and stakeholders.
  • Maintain the current Information Architecture and implement the accompanying infrastructure to support the digital strategy.
  • Assessment of the enterprise-wide disaster recovery and business continuity plan.

Acquisition & Deployment

  • Assess and communicate risks associated with technology-related investments and purchases.
  • Develop business case justifications and cost/benefit analyses for technology spending and initiatives.
  • Outline roadmap for new technology implementations and communicate to key business stakeholders.
  • Review hardware and software acquisition and maintenance contracts.
  • Define and communicate corporate procedures, policies, and standards for the organization for acquiring, implementing, and operating network systems, equipment, software, cloud services and other technologies.
  • Approve, prioritize, and control projects and the project portfolio as they relate to the selection, acquisition, development, and installation of major information systems.

Operational Management

  • Remain up-to-date and knowledgeable in respects to industry trends and emerging technologies in anticipation of new business developments and system adaptations.
  • Analyze and improve upon technology standards across the organization to maintain a technological and competitive edge within the market.
  • Creatively and independently provide resolution to technical problems in a cost-effective manner.
  • Develop, track, and control the technical services annual operating and capital budgets for purchasing, staffing, and operations.
  • Ensure best cyber Security practices and SLAs.Ensure monthly IS summary report is created for leadership review.
  • Supervise recruitment, development, retention, and organization of all technical staff in accordance with budgetary objectives, talent objectives and personnel policies.
  • Oversee the planning, development and maintenance of policies, standards and processes for IT Operations, including network, enterprise computing, information security, end user computing, platforms, and mainframe operations to ensure compliance with state, federal, and internal laws and regulations.
  • Oversee the establishment and implementation of the information security program. Develops and directs risk assessment activities regarding information security.

People Management

  • Provide direct oversight of IT Staff that oversee each of the key technology functions.
  • Develop and communicate organizational objectives; inspire and motivate team members to achieve desired outcomes.
  • Build talent by creating a learning atmosphere that ensures employees recognize their maximum potential.

Relationship Management

  • Work in partnership with IT senior leaders on all IT strategic initiatives and to continuously improve IT policies, standards and procedures by anticipating issues, providing advice and sharing knowledge and best practices.
  • Develop strategic relationships with leadership team members and external business partners to ensure technology direction is always in alignment with organization's strategic direction.

Qualifications: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • Masters' degree in related discipline or equivalent combination of education and 7+ years of work experience required
  • 10+ yrs experience working with current ERP technologies, SaaS, IaaS, PaaS and CRM solutions
  • 10+ yrs designing, re/architecting end-to-end network and applications, including logical and physical modeling
  • 7+ yrs in emerging information security technologies and development methodologies required
  • A solid understanding of security risk management, security log monitoring, MSSPs, SIEM tools required
  • Knowledge and experience with privacy and security law issues, particularly HIPAA required
  • Knowledge of security risk reporting, analytics, metrics, etc.
  • Strong verbal, written and presentation skills with the ability to articulate complex ideas in easy to understand business terms to all levels of management including senior leaders.
  • Strong collaboration skills and business acumen
  • Excellent collaboration skills including ability to lead cross functional teams and build consensus.
  • Demonstrates working knowledge with MS-Office suite of software applications and tools, including: Microsoft Word, Excel, PowerPoint, and MS-Project, MS-Outlook.
  • MBA or Masters in Computer Science required
  • ITIL and CISSP certification required.
  • Additional certifications related to information security are preferred.

Physical Demands: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • While performing the duties of this job, the employee is regularly required to talk and hear.
  • The employee is regularly required to sit, stand and walk.
  • The employee is regularly required to use hands to key, handle, or feel and reach with hands and arms.
  • The employee is occasionally required to stoop, kneel, climb and/or crawl.
  • The employee must occasionally lift and/or move up to 10 pounds.

Specific vision abilities required by this job include close vision, distance vision, color vision, peripheral vision, depth perception and ability to adjust focus.

Work Environment: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • The employee may be required to remain on Organization premises during breaks and/or meal periods and may be required to stay on Organization premises until their replacement arrives.
  • While performing the duties of this job, the employee is occasionally exposed to outside weather conditions.
  • The noise in the work environment is moderate.

Heartland Alliance makes all hiring and employment decisions, and operates all programs, services, and functions without regard to race, receipt of an order of protection, creed, color, age, gender, gender identity, marital or parental status, religion, ancestry, national origin, amnesty, physical or mental disability, protected veterans status, genetic information, sexual orientation, immigrant status, political affiliation or belief, use of FMLA, VESSA, military, and family military rights, ex-offender status (depending on the offense and position to be filled), unfavorable military discharge, membership in an organization whose primary purpose is the protection of civil rights or improvement of living conditions and human relations, height, weight, or HIV infection, in accord with the organization's AIDS Policy Statement of September 1987.

Meet Some of Heartland Alliance's Employees

Megan M.

Dir., Northern Tier Anti-Trafficking Consortium

When Heartland Alliance identifies a survivor of human trafficking, it sends someone right away to help. It’s Megan’s job to maintain that network of trained support staff, ready to go.

Melissa Y.

Assoc. Dir., National Transitional Jobs Network

When people come to Heartland Alliance for help finding a job, Melissa is on point. She manages the largest nationwide coalition that focuses on improving access to employment.

Back to top