Cyber Security Architect

  • Sales And Marketing
  • Bristol
  • 2025-04-23
  • Full Time

As a Security Architect you will:

 

  • Have the opportunity to join a growing and exciting team of security architects within a global multinational organization, specializing highly sensitive and rewarding technology centric transformation programs
  • On a day to day basis you will integrates and collaborate with technical and solutions architects to define the security architecture for high-profile solutions within traditional and groundbreaking enterprise IT as well as custom operational technology systems.
  • You will have a Cyber Security background, will perform as a client-facing role, and will be willing to contribute to our internal Digital Transformation strategy and expertise.
  • In addition to working closely with Information assurance and pen test teams to validate effectiveness of security controls or define new security solutions in an agile, innovative and team centric manner.
  • Flexibility and mobility are required to deliver this role as there will be requirements to spend time onsite with our clients and partners to enable delivery of the first-class services we are known for.
  • Previous employment as a Security architect is desirable but not essential, technical specialists with a strong lean towards security often make good security architects.

 

Job Qualifications

 

 

  • Strong technical experience of security in at least one of the following areas:
  • IP networking & OT
  • On-premises architecture and Virtualization
  • cloud platforms and Containerization
  • Databases and LLMs
  • Mobile Technologies & Application security
  • Threat modeling techniques to identify security threats to systems, leading to the definition of Security requirements.
  • Managing security requirements through the delivery and operational life cycle of a system
  • Provision of authoritative specialist security advice in
  • Risk and threat-based mitigation to system designs
  • Control frameworks such as NIST, ISO, CIS
  • Protective monitoring, Authentication and authorization best practices.
  • Develop excellent working relationships with key stakeholders, peers and subordinates.
  • Communicating effectively verbally and in writing, demonstrated through:
  • Effectively explain complex technical solutions to a non-technical audience
  • Writing meaningfully to deliver clear information, and guidance
  • Giving impactful presentations, articulating clearly key points
  • Critical thinking and problem solving within information technology.