Higher Education Benefits Package About the Role We are partnering with a leading Higher Education organisation on a major digital transformation programme. Reporting to the Director of Strategy and Architecture, you will play a pivotal role in shaping and delivering the organisation's business and IT strategy. As Enterprise Architect, you will lead the creation of a strategic enterprise … architecture approach and take responsibility for developing specific elements of the organisation's enterprise, business, and technology architecture. This includes supporting critical domains such as research, education, student experience, and corporate services. You will influence senior stakeholders, chair governance boards, and ensure architectural coherence across high-profile, strategically critical projects. This is a leadership role with significant impact on … the organisation's future direction. Key Responsibilities Define and maintain enterprise architecture roadmaps, including "As-Is" and "To-Be" states. Develop architecture blueprints that support organisational strategy and transformation goals. Act as a technical authority for service, platform, and design decisions. Provide architectural leadership across major programmes, ensuring integration, security, and compliance. Chair Technical, Data, and Enterprise More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid/Remote Options
Context Recruitment Limited
Security Solution Architect Location: Remote Salary: Paying up to 80k basic + commission (120-130k OTE) A top tier Azure Expert MSP is seeking a Security-Focused Solution Architect to join their high-performing Presales team. This is a strategic opportunity to shape enterprise security solutions using the Microsoft Security Stack, supporting clients across sectors … trusted advisor, guiding stakeholders through best practices in identity, access, threat protection, and compliance within the Microsoft ecosystem. Key Responsibilities Design and present secure cloud solutions leveraging the Microsoft Security Stack, including Defender, Sentinel, Entra ID, Purview, and Intune. Collaborate with sales and technical teams to translate business needs into scalable, secure architectures. Lead client engagements, workshops, and technical … assessments to shape solution strategy. Stay abreast of evolving security threats and Microsoft innovations to ensure cutting-edge recommendations. Contribute to proposals, RFP responses, and technical documentation with clarity and precision. Candidate Profile Proven experience in cloud securityarchitecture, ideally within a Microsoft-focused environment. Deep understanding of Microsoft 365 and Azure security capabilities. Strong communication More ❯
within Middlesbrough Council s ICT Services. The primary focus of this assignment is to work closely with the current postholder to extract and document the council s existing enterprise architecture setup, including infrastructure, security frameworks, and strategic roadmaps. Key responsibilities include: Liaising directly with the current Enterprise Architect to understand and document: The council s ICT Strategy and … technical architecture. Existing securityarchitecture, including compliance with PSN, PCI-DSS, LGA Cyber Security, and penetration testing protocols. Key platforms and technologies in use, including Microsoft Azure, M365, Active Directory, Intune, endpoint management, and any bespoke systems. Governance structures, design principles, and procurement processes. Producing clear documentation and handover materials to support ongoing strategic planning and operational … ICT Services team with technical advice and short-term input into strategic initiatives. Ensuring that all work aligns with council priorities and ICT policies, with a focus on sustainability, security, and integration. This is hands-on role requiring excellent communication skills, technical expertise, and the ability to quickly assimilate complex information. The successful candidate will play a key role More ❯
TS1, Middlesbrough, North Yorkshire, United Kingdom
Deekay Technical Recruitment
within Middlesbrough Council’s ICT Services. The primary focus of this assignment is to work closely with the current postholder to extract and document the council’s existing enterprise architecture setup, including infrastructure, security frameworks, and strategic roadmaps. Key responsibilities include: Liaising directly with the current Enterprise Architect to understand and document: The council’s ICT Strategy and … technical architecture. Existing securityarchitecture, including compliance with PSN, PCI-DSS, LGA Cyber Security, and penetration testing protocols. Key platforms and technologies in use, including Microsoft Azure, M365, Active Directory, Intune, endpoint management, and any bespoke systems. Governance structures, design principles, and procurement processes. Producing clear documentation and handover materials to support ongoing strategic planning and operational … ICT Services team with technical advice and short-term input into strategic initiatives. Ensuring that all work aligns with council priorities and ICT policies, with a focus on sustainability, security, and integration. This is hands-on role requiring excellent communication skills, technical expertise, and the ability to quickly assimilate complex information. The successful candidate will play a key role More ❯
Platform (IKP) components for the OpenShift infrastructure migration project. This role focuses on delivering secure identity and cryptographic key management solutions that integrate seamlessly with the bank's enterprise securityarchitecture and OpenShift clusters. Key Responsibilities: Build & Implementation: Develop and deploy IKP components to support OpenShift workloads. Configure key management systems for encryption, signing, and secure storage. Integrate … operations (generation, rotation, revocation). Enable API-based integration between IKP and OpenShift clusters. Collaborate with DevOps and Automation Engineers to embed IKP processes in CI/CD pipelines. Security & Compliance: Ensure IKP configurations meet the bank's security standards and regulatory requirements. Implement robust authentication and authorization mechanisms. Support audits and compliance checks related to cryptographic controls. … on experience in building and configuring identity and key management systems. Strong knowledge of cryptographic principles, PKI, TLS/SSL, and encryption standards. Familiarity with OpenShift, Kubernetes, and container security best practices. Proficiency in automation tools (eg, Ansible, Terraform) for IKP deployment. Experience with enterprise IAM solutions and API integration. Relevant certifications (eg, CISSP, CISM, or cloud securityMore ❯
Sheffield, South Yorkshire, United Kingdom Hybrid/Remote Options
Experis
Platform (IKP) components for the OpenShift infrastructure migration project. This role focuses on delivering secure identity and cryptographic key management solutions that integrate seamlessly with the bank's enterprise securityarchitecture and OpenShift clusters. Key Skills/requirements Build & Implementation: Develop and deploy IKP components to support OpenShift workloads. Configure key management systems for encryption, signing, and secure … operations (generation, rotation, revocation). Enable API-based integration between IKP and OpenShift clusters. Collaborate with DevOps and Automation Engineers to embed IKP processes in CI/CD pipelines. Security & Compliance: Ensure IKP configurations meet the bank's security standards and regulatory requirements. Implement robust authentication and authorization mechanisms. Support audits and compliance checks related to cryptographic controls. … on experience in building and configuring identity and key management systems. Strong knowledge of cryptographic principles, PKI, TLS/SSL, and encryption standards. Familiarity with OpenShift, Kubernetes, and container security best practices. Proficiency in automation tools (e.g., Ansible, Terraform) for IKP deployment. Experience with enterprise IAM solutions and API integration. Relevant certifications (e.g., CISSP, CISM, or cloud securityMore ❯