Find The RightJob.
Title: F5 Architect with Akamai
Duration; Full Time
Location: Minneapolis MN / Remote
Description:
Role Overview
Serves as a senior technical contributor supporting application delivery and edge security platforms including F5 A10 WAF Cloudflare and Akamai and provides input into platform design resiliency and capacity planning activities.
Performs hands on engineering tasks including configuration maintenance and operational support of application delivery controllers WAF and CDN platforms and assists with onboarding and migration of applications into these platforms.
Partners with network security and application teams to ensure consistent traffic management security controls and operational processes across on prem cloud and edge environments.
Provides technical leadership and mentoring to peers through knowledge sharing documentation and design discussions and stays current with emerging application delivery and edge security technologies.
Participates in risk based technical decision making related to application delivery and security evaluating impact and severity to protect proprietary personal and privileged electronic data.
Implements and maintains network and application security best practices including change controls configuration standards documentation WAF CDN and load balancer policies and monitoring.
Troubleshoots complex application delivery network and security issues across layers one through seven including DNS TLS HTTP and CDN traffic flows and communicates status and resolution clearly to stakeholders.
Participates in on call rotation responding to high priority incidents within defined SLAs and supports maintenance activities during off hour change windows as required.
Creates and maintains technical documentation runbooks and audit artifacts and communicates findings recommendations and remediation steps when required.
Supports internal and external security assessments audits and questionnaires by providing technical input evidence and documentation and assists with remediation and corrective actions.
Do
1. Design and develop enterprise cyber security strategy and architecture
a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses
b. Identify risks associated with business processes, operations,
information security programs and technology projects
c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge
d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations
f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc.
g. Provide support during technical deployment, configuration, integration and administration of security technologies
h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc.
i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity
j. Provide solution of RFPâÂÂs received from clients and ensure overall design assurance
i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives
ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture
iii. Depending on the clientâÂÂs need with particular standards and technology stacks create complete RFPs
iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology
v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions
vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps
vii. Evaluate and recommend solutions to integrate with overall technology ecosystem
viii. Tracks industry and application trends and relates these to planning current and future IT needs
2. Stakeholder coordination & audit assistance
a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations
b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security
c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements
d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers
e. Provide training to employees on issues such as spam and unwanted or malicious emails
Deliver
© 2026 Qureos. All rights reserved.