From threat modeling to zero-trust design — a framework for hiring Security Architects who design systems that assume breach and limit blast radius, not just systems that check compliance boxes.
Christina Zhukova
EXZEV
Security architecture is the discipline with the widest gap between credential and competence of any technical role in the security field. The CISSP requires knowledge of eight security domains at a conceptual level. A CISSP does not require the ability to design a zero-trust network segmentation strategy for a Kubernetes-based microservices environment, produce a credible threat model using STRIDE for a payment processing API, or explain why your existing IAM architecture creates a privilege escalation path that a compromised service account can exploit.
Most Security Architect hiring processes test for the former and receive the latter.
The failure modes are architectural and therefore expensive. A mediocre security architect designs security controls that satisfy compliance requirements on the day of the audit. The controls are real — they are also implemented at the perimeter, with the implicit assumption that the perimeter holds. When it does not — and it will not — the blast radius is unconstrained because there is no meaningful segmentation inside it. The attacker who gets past the firewall has access to everything.
An elite security architect designs for breach. They segment the internal network on the assumption that an adversary will gain initial access, and they design the controls to limit lateral movement, detect abnormal behavior, and contain the blast radius to a fraction of the total environment. They know which crown jewel assets need the most protection and design concentric rings of control around them — not equal protection for everything, which is a form of no protection for the most critical assets.
The role, disaggregated:
Clarify which variant you need before sourcing. Hiring a cloud security architect for a role that requires application security expertise produces a skilled professional solving the wrong problem.
The rule: A security architecture that was designed to satisfy a compliance framework rather than to resist a specific threat actor is not a security architecture — it is a compliance posture with an architecture diagram attached.
| Question | Why It Matters |
|---|---|
| Cloud-native or hybrid/on-premises? | Cloud security architecture (AWS GuardDuty, Azure Defender, GCP Security Command Center, Terraform security controls) is genuinely different from traditional network security architecture |
| Primary domain? (IAM / Application Security / Network / Cloud / Enterprise) | Deep expertise in one domain rarely transfers directly to others — be explicit about the primary and secondary domains |
| Greenfield design or inheriting existing architecture? | Designing from scratch requires different creativity and authority than refactoring an existing architecture with organizational inertia |
| Does this architect produce designs or implement them? | Architect vs. engineer distinction — some organizations want a designer who hands off to an engineering team; others need someone who both designs and implements |
| Threat modeling ownership? | Threat modeling for new features and products is a specific methodology (STRIDE, PASTA, Attack Trees) that not all security architects practice |
| Does this role span product security and corporate security? | Product/application security and corporate/infrastructure security require different expertise — some architects own both; most should not |
| Regulatory context? | PCI-DSS network segmentation requirements, HIPAA encryption and access control obligations, and FedRAMP cloud security controls all change the architecture design requirements |
| Relationship to the CISO and security engineering team? | Architects who design in isolation from the engineers who implement produce architectures that look good in Visio and fail in production |
Security architect JDs fail by listing frameworks and certifications without describing what the architect will design, what threat model they are designing against, and what "done" looks like.
Instead of: "Experienced Security Architect with CISSP/SABSA certification to design and implement security architecture, perform threat modeling, and ensure compliance with security standards..."
Write: "You will own security architecture across our AWS multi-account environment (140 accounts, Kubernetes workloads on EKS, 300+ microservices). Immediate mandate: design the zero-trust network segmentation model to replace our current VPC-level perimeter approach, produce the threat model for our new payment processing API (PCI-DSS scope), and define the service-to-service authentication architecture (currently using long-lived API keys — target: mTLS with SPIFFE workload identity). You will collaborate with 6 security engineers and present architecture designs to the CTO and CISO for approval. You will work within our existing Terraform-managed infrastructure."
Structure that converts:
Highest signal:
Mid signal:
Low signal:
The EXZEV approach: We maintain a pre-vetted network of security architects assessed across threat modeling methodology, cloud security architecture depth, and production implementation track record. Most clients receive a shortlist within 48 hours.
Security architect screening fails when it tests conceptual security knowledge rather than architectural judgment. The question is not whether they can define defense-in-depth — it is whether they can apply it to a specific environment with a specific threat actor and a specific set of constraints.
Stage 1 — Async Technical Questionnaire (45 minutes)
Five questions evaluated on specificity of threat model and design quality.
Example questions that reveal real depth:
What you're looking for: Threat model specificity (they name the specific attack — SQL injection via the payment endpoint, not just "injection attacks"), architectural completeness (they consider detection alongside prevention), and constraint awareness (they acknowledge which threats their architecture does not fully mitigate and why).
Red flag: "We would implement defense-in-depth" without being able to describe what the layers are, what is between them, and what happens when each layer fails.
One senior security engineer and the CISO or CTO:
Four parts. Security architects typically join mid-to-senior level; the loop reflects this without over-engineering.
Your most senior security engineer and CISO. Deep dive on the candidate's most technically complex architectural design. Ask: "Walk me through the threat model that informed this design. What were the top three threats you designed against, and which one were you unable to fully mitigate within the constraints you were given?" The last question reveals intellectual honesty about residual risk — the quality that separates architects who design with clarity from those who claim completeness.
A realistic security architecture challenge specific to your environment:
Sample prompt: "Our identity architecture currently uses long-lived API keys for service-to-service authentication across 200 microservices. We have had two incidents in 18 months where a compromised API key was used for lateral movement. Design the target-state service identity architecture. Include: the identity issuance and rotation mechanism, the authentication protocol at the service mesh layer, the migration strategy from API keys without a flag-day cutover, and the detection controls that would have caught the two previous incidents under the new architecture."
Evaluate: Do they ask about the existing service mesh (Istio? Linkerd?) before designing? Do they account for the migration complexity, or do they design a greenfield solution without a path from the current state? Do they design detection alongside the prevention controls?
Engineering lead and product manager. The question: can this architect communicate security design decisions to non-security engineers in a way that produces adoption rather than workaround? Ask the engineering lead: "When a security architect tells your team 'you can't do it that way,' how do they usually explain why, and how does your team typically respond?" Ask the candidate: "Walk me through how you would introduce threat modeling into a feature development process where the engineering team currently has no security review step."
CISO or CTO. "Tell me about an architectural recommendation you made that the engineering team pushed back on — not for security reasons but for delivery timeline and complexity reasons. How did you handle the tradeoff, and what was the outcome?" Security architects who have never had their recommendations challenged have not operated in real product engineering environments.
Technical red flags:
Behavioral red flags:
Security architects at the senior level command compensation significantly above security engineers, reflecting the scope of organizational impact of architectural decisions and the genuine scarcity of engineers who can both threat-model and produce implementable designs.
| Level | Remote (Global) | US Market | Western Europe |
|---|---|---|---|
| Security Architect (4–7 yrs) | $130–175k | $195–260k | €120–165k |
| Senior Security Architect (7–12 yrs) | $175–230k | $260–350k | €165–220k |
| Principal / Distinguished Security Architect | $230–310k | $350–480k | €220–300k |
Cloud security specialization premium: Security architects with deep AWS, Azure, or GCP security architecture experience (not just familiarity — production multi-account environment design) command 15–20% above equivalents with primarily on-premises backgrounds.
IAM specialization premium: Identity architects with PAM implementation experience (CyberArk, BeyondTrust) and zero-trust IAM design experience are among the scarcest profiles in the security market — compensation reflects this.
Week 1–2: Architecture inventory and threat model review Before designing anything new, map the existing architecture: network segmentation, identity model, secret management, data flow for the highest-sensitivity data, and any existing threat models or architecture review records. Ask: "Which systems, if compromised, would cause the company to cease operations?" The answer to this question — and the quality of the current controls around those systems — is the starting point for the architecture program.
Week 3–4: First threat model Produce a formal threat model for one system or feature currently in development — not a post-hoc review of existing infrastructure, but a proactive threat model that informs a decision before the code is written. This establishes the architecture review process as a design-time activity, not a deployment-time checkbox.
Month 2: Architecture design for the highest-priority gap Based on the inventory, design the target-state architecture for the highest-priority security gap — the one with the highest residual risk given the current controls. Present the design to the CISO and engineering leads: the threat model that drives the design, the control choices and their tradeoffs, the implementation complexity, and the expected risk reduction.
Month 3: Security design review process implementation Establish the architectural security review process for new features and systems: the trigger criteria (which changes require a security architecture review), the review format, the documentation standard, and the relationship between the security architect and the engineering teams. Architects who build this process in month three create a leverage point for security across the entire organization — not just the systems they personally review.
The security architecture market is full of professionals who can map NIST controls to a system diagram and produce a compliance architecture document. The ones who design for the specific threat actor, model the blast radius of a compromise of each system, and produce architectures that detection teams can actually monitor — they require a search process that tests adversarial thinking, not framework familiarity.
Every security architect in the EXZEV database has been assessed on threat modeling methodology, cloud security architecture depth, and production implementation track record. We do not introduce candidates who score below 8.5. Most clients make an offer within 10 days of their first shortlist.
April 15, 2026
From RAG architecture to LLM evaluation pipelines — a framework for hiring AI Engineers who build production GenAI systems that work at scale, not just in demos.
April 15, 2026
From evaluation metrics to ethical AI tradeoffs — a framework for hiring AI Product Managers who make sound product decisions in the gap between what AI can do and what it should do.
April 15, 2026
From separating framework operators from platform thinkers to building a technical screen that reveals performance intuition under real production conditions — a rigorous framework for hiring the backend engineer who will build systems that scale, not systems that work until they don't.