Security Architect
Reports to: Head of IT / ITSO
Location: Warrington / Cumbria, 2-3 days per week on site, with occasional travel to the opposite site.
Qualifications, Experience, and Skills
Qualifications:
* Bachelor’s Degree in Computer Science or equivalent with proven expertise in the area
* MS Azure certifications and professional qualifications
* Cisco accreditations
* Membership of a professional body in Information Security
* Experience with Cyber Security Standards
Experience and Skills:
* Experience in securing hybrid cloud environments using MS Azure and Wintel platforms
* Security assurance for SIEM, SOC, and IDAM services in regulated, secure environments
* Strong communication and leadership skills
* Expertise in security measures such as firewalls, intrusion detection/prevention, network access controls, and segmentation
* Proficiency with Windows operating systems
* Understanding of security architecture development, wireless security, DNS security, and VPN/proxy services
* Knowledge of ISO 27001/27002, COBIT, and ITIL frameworks
* Experience in integrating hybrid cloud platforms with SIEM, SOC, and IDAM services, including MS Sentinel
* Skills in third-party auditing and cloud risk assessments
* Knowledge of MS SQL Server, Oracle RDBMS, and VDI/Thin client services
* Understanding of BYOD, data classification, PKI, and secure third-party system access
* Experience with integrating SaaS with MS Azure IaaS/PaaS and overarching security architecture
Core Responsibilities and Duties
The Security Architect supports the design of security solutions for hybrid cloud tools and systems, planning, implementing, and reviewing security assurance activities to enable deployment and operation.
Key tasks include:
* Identifying vulnerabilities that could jeopardize the organization
* Supporting the planning and construction of reliable security architectures for IT initiatives
* Performing or overseeing penetration tests, vulnerability assessments, and security risk analyses
* Investigating the latest security standards and authentication protocols
* Ensuring solutions align with security policies, standards, and compliance requirements
* Ensuring integration with SIEM, SOC, and IDAM systems, supporting system integrators and vendors
* Developing response plans for security incidents and conducting post-incident reviews
#J-18808-Ljbffr