Director, Security Solution Architect - PVH Corp.

PVH Corp

Multiple Locations

0 year(s)

Job Description

POSITION SUMMARY: The Security Solution Architect plays an integral role in defining and assessing the organization's security strategy, architecture, and practices. The Security Solution Architect will be required to effectively translate business objectives and risk management strategies into specific security processes enabled by security technologies and services.

The Director, Security Solution Architect will be responsible globally for leading the organizations security architecture specifically focused on the development of visionary technical architecture, design, and implementation pattern standards of solutions that will securely enable our digital transformation & business.

In this role, the candidate sets the security architecture strategy and vision for the organization in partnership with the Information Security Group and other key technology leaders. The candidate will create the vision and be the evangelist of the strategy to assure it is socialized, understood, and instituted within PVH. This is a pivotal role that partners with other security, technology, business, and regional leads across PVH. The candidate defines and evolves the supporting security architecture globally via a collaborative model, while sourcing, leading, and presenting forward-thinking, security capabilities for PVH.

We seek a result driven leader who is passionate about applying program leadership, organizational discipline, and technology to transform the retail apparel industry. The Security Solution Architect must be a leader who will drive the security technology practice, oversee its governance, sponsor technical development and debate, be the trusted partner and advisor to Information Security Group leader, global infrastructure team, and key business partners while driving adoption through cross-functional teams in multiple geographies. The candidate must have a strong understanding of the latest trends and how to incorporate relevant emerging technologies without creating extensive complexity.


  • Serve as a "trusted advisor" on security architecture and related technologies questions to the Information Security & Global Infrastructure & Operations leaders. Partner as needed across the rest of the TPG organization.
  • Develop and maintain a security architecture processes and patterns that enables the enterprise and implement security solutions and capabilities that are clearly aligned with business, technology, and threat drivers.
  • Develop security strategy plans and roadmaps based on enterprise architecture practices.
  • Develop and maintain security architecture artifacts (e.g., models, templates, standards, patterns, and procedures) that can be used to leverage security capabilities in projects and operations.
  • Track developments and changes in the digital business and threat environments to ensure that they're addressed in security strategy plans and architecture artifacts.
  • Participate in application and infrastructure projects to provide security-planning advice.
  • Draft security procedures and standards to be reviewed and approved by the appropriate senior leaders.
  • Partner/facilitate the development of baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation, and identity and access management (IAM).
  • Develop standards and practices for data encryption and tokenization in the organization, based on the organization's data policies.
  • Establish a taxonomy of indicators of compromise (IOCs) and share this detail with other security colleagues, including the security operations center (SOC), information security managers and analysts, as well as counterparts within the global command center (GCC).
  • Coordinate with DevOps teams to advocate secure coding practices, and to escalate concerns related to poor coding practices.
  • Coordinate with the privacy officer or office to document data flows of sensitive information in the organization (e.g., PII or ePHI) and recommend controls to ensure that this data is adequately secured (e.g., encryption and tokenization).
  • Validate IT infrastructure and other reference architectures for security best practices and recommend changes to enhance security and reduce risks, where applicable.
  • Review network segmentation to ensure least privilege for network access.
  • Liaise with the internal audit (IA) team to review and evaluate the design and operational effectiveness of security-related controls.
  • Support the testing and validation of internal security controls, as directed by the CISO or the internal audit team.
  • Review security technologies, tools, and services to make recommendations to the broader security team for their use, based on security, financial and operational metrics.
  • Liaise with other architects and security practitioners to share best practices and insights.


The Security Solution Architect liaises with important security and risk management constituencies. Specifically, the Security Solution Architect may be expected to work collaboratively with individuals or departments, including:

  • Enterprise Architect
  • Information Security Group leadership
  • Global Infrastructure & Operations leadership
  • SOC functional manager and SOC staff
  • Project management office (PMO)
  • Internal audit
  • Application and information owners
  • TPG finance team



  • Ten years or more experience in enterprise level security architecture and engineering.
  • Experience in using architecture methodologies such as SABSA, Zachman and/or TOGAF.
  • Direct, hands-on experience or strong working knowledge of managing security elements such as firewalls, intrusion detection/prevention systems (IDS/IPS), web application firewalls (WAFs), endpoint protection, identity & access management, SIEM, encryption technology, data privacy laws (foreign and domestic), etc.
  • Verifiable experience reviewing application code for security vulnerabilities.
  • Direct, hands-on experience or a strong working knowledge of vulnerability management concepts and tools.
  • Documented experience and a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services.
  • Full-stack knowledge of IT infrastructure:
    • Applications
    • Databases
    • Operating systems Windows, Unix and Linux
    • Hypervisors
    • IP networks WAN and LAN
    • Storage networks Fiber channel, iSCSI and NAS
    • Backup networks and media
  • Direct experience designing IAM technologies and services:
    • Active Directory / Azure Active Directory
    • Lightweight Directory Access Protocol (LDAP)
    • Amazon Web Service (AWS) IAM