Skip to main content

Principal - Enterprise Security Architect

  • Posted
  • Ann Arbor, Michigan, United States

About Us

Domino’s Pizza, which began in 1960 as a single store location in Ypsilanti, MI, has had a lot to celebrate lately: we’re a reshaped, reenergized brand of honesty, transparency and accountability – not to mention, great food! In the rise to becoming a true technology leader, the brand is now consistently one of the top five companies in online transactions and 65% of our sales in the U.S. are taken through digital channels. The brand continues to ‘deliver the dream’ to local business owners, 90% of which started as delivery drivers and pizza makers in our stores. That’s just the tip of the iceberg…or as we might say, one “slice” of the pie! If this sounds like a brand you’d like to be a part of, consider joining our team!

Job Details

Domino’s Information Security group continues to mature our security program. We are currently looking for a strong security professional with creativity and experience in designing, building, testing, and implementing security systems within an IT network. The Principal - Enterprise Security Architect is expected to have a thorough understanding of complex IT systems and stay up to date with the latest security standards, systems, and authentication protocols, as well as best practice security products.


The Principal - Enterprise Security Architect will play a crucial role in setting the strategy and technical direction applied to ensuring that our data and applications throughout Domino’s ecosystem remain secure. The role will be responsible for working with our Information Security team, Ecommerce Architects, Product Owners, Technical Delivery Manager, and business stakeholders to ensure that Domino’s platform conforms to disciplined, industry best practices for information security. This highly visible position will be front and center as we work to continuously modernize our solutions and change the way we apply technology across our systems. A successful candidate for this position must possess both a deep and wide background in information security being applied across a wide breadth of technologies spanning both solutions built on traditional platforms, and more modern deployments on "open" and “cloud” technology stacks.


This role is responsible for analyzing business and system requirements and ensures that security will be effectively integrated with new and current systems. Responsible for process development and analysis. Anticipates future technology and business needs to develop, plan, and execute proactive solutions that allow Domino’s to remain at the forefront of emerging industry best practices without compromising the security and privacy of Domino’s. Provides recommendations as a systematic approach for solving business needs while minimizing risks and threats to the organization through a deep understanding of security concepts in infrastructure, network architecture, cloud, web, database, and application development. Relies on extensive experience and judgment to plan and accomplish goals. May lead and direct the work of others. A wide degree of creativity and latitude is expected.

This role will partner and engage with Information security teams and business partners to design secure solutions and provide enterprise level security design consultation, and business perspective and strategic security. The role will foster a team culture of continuous improvement, mentoring and learning, data driven decisions, and accountability for delivery of key metrics and deliverables. Establish, perform and lead threat assessment modeling, secure design review, and enterprise-wide security posture.



Responsibility #1 (80%) Security Architecture 

  • Plans security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; designs public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards.
  •  Implements security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures; creating, transmitting, and maintaining keys; providing technical support; completing documentation.
  • Verifies security systems by developing and implementing test scripts.
  • Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs.
  • Upgrades security systems by monitoring security environment; identifying security gaps; evaluating and implementing enhancements.
  • Prepares system security reports by collecting, analyzing, and summarizing data and trends.
  • Updates job knowledge by tracking and understanding emerging security practices and standards; participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations.
  • Researching and designing public key infrastructures, and certification authorities (PKI), and digital signatures, role base access ensuring all personnel have IT access limited to their need and role in the organization (RBAC/JIT/MFA/2FA).
  • Gaining an understanding of our Current State and Target State Architecture and then working to define a strategy for our technical direction around security for Domino’s ecosystem.
  • Gather and analyze requirements from product owners.
  • Develop Security Architecture for highly scalable and fault-tolerant applications that adhere to expected standards and discipline from a security posture.
  • Provide technical and architectural oversight for systems and projects that are required to be reliable, massively scalable, highly available (99.999% uptime), and maintainable.
  •  Introduce best practices and principles to enable consistent delivery and enable alignment with long-term direction.
  • Stay up to date on new tools & techniques in the information security space.
  •  Align organizational security strategy and infrastructure with overall business and technology strategy.
  •  Identify and communicate current and emerging security threats.
  • Design security architecture elements to mitigate threats as they emerge.
  • Conduct proof of concept activities with key business users in support of advanced use cases.
  • Plan, research, and design enterprise-class security architectures for any technology project.
  • Determines security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates.
  • Create solutions that balance business requirements with information and cybersecurity requirements.
  • Work with our product organization to develop secure business requirements, develop the security architecture and integrate into our long-term platform strategy.
  • Work directly with project development teams to enable successful project implementation applying the recommended security tools, technologies, and techniques. Provide expertise to project team engineers as needed.
  • Develops and executes strategy and projects to build and mature the company security  architecture function from an ad-hoc level of response to a top-down, proactive function.
  • Develops and improves the process, procedure, and metrics framework for the team to execute security architect functions in a consistent and repeatable fashion.
  •  Manage and increase the effectiveness and efficiency of the architects, through improvements to each function as well as coordination and communication between support and business functions.
  • Create executive and detailed reporting to provide an assessment with recommendations on how to improve security architecture capabilities.

Responsibility #2 (20%) Security Research

  • Researching about emerging threats and emerging technologies to keep the security architect function aligned with threat and risk landscape.
  • Monitor different sources to keep update about Domino’s threat landscape, sources like news, threat feeds, and other sources that provide valuable input to improve our security posture.
  • Stay current with technology and security trends to ensure that technology enablers are not vulnerable to cyber-attacks, in addition to promoting data integrity and data protection throughout the technology enablement teams.


Responsibility #3 (ad hoc) Security Development and Support

  • Support incident response actions to ensure proper assessment, containment, mitigation, and documentation.
  • Support incident response investigations and contribution to large and medium scale security incidents.
  • Review and analyze cyber threats and provide SME support to the team.
  •  Interact and assist other investigative teams within Domino’s on time sensitive, critical investigations.
  • Participate as part of a close incident response team of technical specialists on coordinated responses and subsequent remediation of security incidents.
  •  Maintain detailed tracking plan of all internal/external enrollment outcomes/recommendations and provide support through to implementation



Required Skills

  •  Seven or more years’ experience in:
    • Security architecture, demonstrating solutions delivery, principles, and emerging technologies to secure on-premises, edge, containers, and cloud deployments.
    • Designing and implementing enterprise-class security solutions. This includes continuous monitoring and making improvements to those solutions, working with an information security team.
    • Consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements.
    • Security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss, data privacy, and DDoS attacks.
    • Identity and access management (IAM) – the framework of security policies and technologies that limit and track the access of those in an organization to sensitive technology resources.
    • Offensive security models to think like a malicious hacker to anticipate and defend Domino’s against information security risks.
    • Business acumen to manage security team members and communicate effectively with key stakeholders.
    • Experience and technical expertise to build enterprise-class security infrastructure from scratch or update existing systems in response to ongoing changes in the security landscape, including new risks and adherence to applicable regulations.
    • Outstanding communication skills; strong critical thinking and analytical skills.
  •  Strong leadership, project, and team-building skills, including the ability to lead teams and drive initiatives in multiple departments.
  • Demonstrated ability to identify risks associated with business processes, operations, technology projects and information security programs.
  • Ability to function as an enterprise security subject matter expert who can explain complex topics to those without a technical background.

Required Technical Skills

  • Windows, UNIX, and Linux operating systems.
  • VB.NET, Java/J2EE, ColdFusion, API/web services, scripting languages and a relational database management system (RDBMS) and modern database for enterprise applications (NoSQL).
  • Thorough understanding of relevant industry security standards and protocols including ISO27001 and National Institute of Standards and Technology (NIST).
  • Risk assessment procedures, policy formation, role-based authorization methodologies, authentication technologies and security attack pathologies.
  • Working knowledge of Data Security Best Practices:
    • At Rest / In Transit / In Use.
    • Expert level experience with encryption technologies and techniques.
    • Ability to build Risk Models and analyze security weaknesses in complex technology deployments.
    • Has experience working with product teams on specifying Secure Application Requirements.
    • Experience with Payment Processing and Data Privacy is considered a plus.

Qualification Requirements                                        

  • Bachelor’s degree in Computer Science, Information Technology, Engineering, or a related field with +10 years’ experience of combined IT and security work experience, with a broad exposure to infrastructure/network, multiplatform environments, and cloud deployments.
  • Extensive knowledge of programming and scripting, database systems, cloud and web technologies, communication protocols, system and network security, authentication and security protocols, cryptography, application security and remediation techniques.
  • Excellent written and verbal communication skills. Demonstrated consultative and analytical skills as well as ability to communicate technical information to varying audiences.
  • Self-motivated and multitask-oriented with the ability to perform a wide variety of complicated tasks.
  • Ability to engage business as well as technical subjects. Strong project management skills required.
  •  The ability to maintain confidentiality is critical. On call and/or Incident response responsibilities may be required.
  • The ability to interact with a wide range of people from different backgrounds.
  • Excellent teaching, problem-solving, communication, and interpersonal skills.
  • Professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials, is desired.
  • Candidate should have exceptional troubleshooting and problem-solving skills.


Additional Information

All your information will be kept confidential according to EEO guidelines.