![[Featured Image] In a bright office setting, a woman working for an enterprise architect salary looks at a tablet while she leans against the desk behind her.](https://images.ctfassets.net/wp1lcwdav1p1/661tZW5Js0TD6XdoZw85AJ/5597d0fae958333956848379284b59cd/GettyImages-1389927343.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
What Is the Average Enterprise Architect Salary in the US?
Becoming an enterprise architect can be lucrative. Discover more about this role and the factors that affect enterprise architect salary, such as experience, the industry you work in, and your geographical location.
January 28, 2025
Article

![[Featured Image] A businesswoman working for a network analyst salary sits at a coworking table beside two colleagues and types on her laptop.](https://images.ctfassets.net/wp1lcwdav1p1/4vZueTEQkPlNU8XibclF7m/563a30b32367f283d17e928611d51c2f/GettyImages-1252701959.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A man working for a network operations engineer salary in an industry setting bends over his laptop.](https://images.ctfassets.net/wp1lcwdav1p1/10ZngQnv0H5B7KU4qxW1Sj/60d4b6cce72fbab9ecfe1a737c1caf64/GettyImages-1187226707.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)



![[Featured Image] A man who receives a technical consultant salary shows his client IT business analytics.](https://images.ctfassets.net/wp1lcwdav1p1/2et8bECEghekKSjO9GxdhN/773d0694e04a14d6d0052f3f99c947ec/GettyImages-1200930315.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A technical support engineer stands in a server room and looks at a laptop in an attempt to fix a problem.](https://images.ctfassets.net/wp1lcwdav1p1/18vqzO1Zq9pIWHf3ErWoIy/cba1ef8b07184e9bbbcda0259c37ee3d/GettyImages-1347879841.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] Two white hat hackers eat lunch in a cafe while using a laptop to try to stop a grey hat hacker's illegal activity.](https://images.ctfassets.net/wp1lcwdav1p1/2Fka8HJlmmkwOSqNMBElLN/b22a1e8b3eeddb7fa507b4501b0ab0bb/GettyImages-1153953973.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A man sitting in his office with his laptop researching "What is cloud native?".](https://images.ctfassets.net/wp1lcwdav1p1/30qJS2b3h6f9OhYMmVx8Aq/c4dd2a7fec4f3141b04c9c3d595e7927/GettyImages-589090447.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A man at home on his computer is excited because he just finished creating his IT project manager resume and submitted it to several companies.](https://images.ctfassets.net/wp1lcwdav1p1/7wi9vNpRH1gzb64dMsuTRD/d2244e171eddf811ec8ba62877d07010/GettyImages-1496369597.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A woman working for a CISSP salary sits at a large desk with multiple desktops and types on a keyboard.](https://images.ctfassets.net/wp1lcwdav1p1/5xgtPxpnqdAuh265enzaXs/a40edaa98b91e14f0d69bd9dd98842f4/GettyImages-1442979224.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A cybersecurity professional sits at his office shared space with others, working on his computer using MITRE ATT&CK to help prevent security breaches.](https://images.ctfassets.net/wp1lcwdav1p1/H7FYOkgWNRVufTGKTfTwe/b13726de8b6fe851ba30631b53f48dbc/GettyImages-1605481172.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A group of cybersecurity professionals meet in a conference room to discuss creating a new penetration testing plan.](https://images.ctfassets.net/wp1lcwdav1p1/4W5OJp7Jg42SbCw2FAIfwi/1022d7667d3a69af16a24e0756f4b348/GettyImages-1626156976.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
![[Featured Image] A college student uses different types of encryption on a laptop in a library.](https://images.ctfassets.net/wp1lcwdav1p1/7yzUitmzQUVJomZT3zEwOG/0917564dd191deeb25ff6167174302f7/GettyImages-143071328.jpg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
