Salary:Salary Negotiable+ 25 days hols + 8 bank holidays + employer pension contributions up to 10% of salary (BAND3B)
Wider benefits include discretionary bonus, private health care, life assurance, enhanced maternity and adoption packages(note: some are non-contractual).
Location: Bradford or Leeds and hybrid work arrangements
Water is the lifeblood of Yorkshire. 5 million customers use it every day, to make a round of brews, clean a mucky pup or get the washing on. 140,000 businesses rely on it to make steel, style hair or brew pints. And behind every river, reservoir and coastline looked after, every brew made, and every business supplied is Yorkshire Water.
At Yorkshire Water we believe technology holds the key to making the most of this precious resource, and taking care of it, now and in the future. We have a five-year plan that will see us investing heavily in our Technology. Enabling us as a department to focus on our capabilities, increase our delivery and responsiveness for our customers and develop skilled technical and data experts.
Security Architect - Infrastructure, Role specific requirements:
* Proven experience with delivering security as part of IT infrastructure, solutions and services from requirements gathering through to low level design. Assuring that solutions meet the businesses risk appetite, standards, and regulatory requirements.
* You will also support the lead security architect, standing in where necessary and supporting the delivery of the IT security strategy and services.
Advice and guidance – support colleagues and business to deliver secure solutions in accordance with YW technical governance process, policies, and standards.
Experience applying security standards, assessing risk and compliance to solutions of scale, i.e. 5000+ endpoints.
Experience implementing security infrastructure solutions, examples preferably to include SIEM, Access governance, SASE or Endpoint protection.
Understanding of information security standards, i.e. ISO 27001, ISF, NIST, etc
A solid understanding of OWASP & CIS industry security guidance and the application to the enterprise.
Experience of working with risk assessment frameworks and the Cyber Assessment Frameworks to ensure systems/services meet acceptable security requirements.
Identify and assess business and technical security requirements along with any associated risks and potential weaknesses these may introduce.
Applying confidentiality, integrity and availability triad controls at all levels to conform to regulatory requirements
Reviewing solution vulnerability and penetration test reports and providing advise with regards the remedial actions required
CISSP (Certified Information Systems Security Professional), or equivalent preferred.
What skills are we looking for:
* Proven track record of large-scale solution delivery, preferably in the utilities sector, undertaking a senior architectural role.
* Strong people management skills with the ability to mentor and inspire.
* Strong ability to articulate business master data requirements in relation to solution design.
* Understanding of architectural roles, domains, methodologies and design strategies.
* Experience of formal structured methodologies for solution design.
* Experience of undertaking technical leadership for a team of senior technical roles, providing direction and influence to ensure completion of activities.
* Experience of developing and maintaining effective internal and external relationships at senior levels within an organisation (e.g. Directors, Tier 2s).
* Ability to demonstrate relentless drive, energy and determination to deliver sustainable outperformance for YW that rigorously achieves against demanding competitive industry benchmarks and metrics from other organisations.
* Ability to prioritise and execute tasks in a dynamic, changing environment and make sound decisions in emergency situations.
* Excellent interpersonal, written and oral communication skills.
* Ability to absorb complex technical information and communicate effectively to all levels, both technical and non-technical audiences.
* Ability to develop and work in a team-oriented, collaborative environment.
* Ability to pick up and own issues or projects on behalf of the management team.
* Strong organisation and personal management skills.
* Possess a strong sense of purpose and proactively seek responsibility and ownership.
* Highly motivated and self-reliant with a personal drive for continuous development and demonstrates a strong customer service ethos.
* Proven analytical and problem-solving abilities.
* Extensive knowledge of the system development lifecycle.
* Ability to understand enterprise solutions.
* High standards of integrity & ethics.
* BCS, TOGAF or equivalent certification in Enterprise and Solutions Architecture
How we go about doing our job really matters to us. We all care about what we do, so whatever we’re working on we own it and make sure it gets done. We don’t just do this on our own as we know that we’re better together – whether that’s with our colleagues, customers, communities or stakeholders we use the power of people to make amazing things happen. And we’re not afraid to try new things, challenge ourselves and others – we’re always learning as that’s how we’ll improve.
We’re straight talking, respectful and we get things done with care and compassion, we value, understand and embrace difference. We have heart.
Although you will have a permanent friendly office to inspire collaborative thinking, and there may be occasions when there is a business need to attend the office we do offer flexible hybrid working arrangements. We appreciate that we all live busy lives and crave now more than ever a good work/life balance, so together we can discuss what this might look like for you as an individual. After all we know we are all good on our own but together there’s no stopping us!
If you feel this opportunity is suitable and you match the skills required, then please apply online by uploading your latest CV and completing the application process.
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
#J-18808-Ljbffr