bradford, yorkshire and the humber, united kingdom Hybrid / WFH Options
Fruition Group
benefits Why Apply? This is a fantastic opportunity for an experienced Software Architect, or a Solution Architect with a strong applications background to play a pivotal role in shaping enterprise-level solutions for a forward-thinking organisation. You'll design and implement scalable, secure, and modern application architectures that directly support business goals. This is a permanent role offering … the chance to influence strategy, guide development teams, and work with the latest technologies in a supportive and innovative environment. Software Architect Responsibilities Design, develop, and maintain high-level architecture for new and existing applications. Define architecture standards, guidelines, and best practices to ensure scalability, maintainability, and performance. Collaborate with stakeholders, business analysts, and development teams to translate … requirements into robust technical solutions. Lead architecture reviews, offering guidance and mentoring to technical teams. Evaluate, recommend, and implement tools, frameworks, and technologies that align with business needs. Ensure alignment with enterprisearchitecture and security policies. Document architecture designs, workflows, and technical specifications. Troubleshoot and resolve complex architectural challenges. Support modernisation, migration, and integration initiatives across More ❯
and embedding robust cyber practices across digital and IT estates. This is a senior strategic and technical leadership role, ideal for a seasoned security professional with a background in enterprise-scale or local government IT environments. £700pd gross umbrella. Key Responsibilities Strategic Planning and Governance Develop, review, and maintain the IT Security Strategy aligned to organisational objectives and statutory … duties. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprisearchitecture and digital transformation strategy. Advise senior management and boards on cyber risk posture, incidents, and mitigations. Identify and manage strategic risks — technical, legal, reputational, and financial. Evaluate emerging technologies (AI, RPA, cloud, hybrid infrastructure) from a security perspective. Policy, Procedure, and Guidance … trends. Champion automation and innovation in security operations (e.g. SOAR, XDR). Drive security maturity assessments and roadmap development. Essential Experience Proven leadership in IT or cyber security at enterprise or local authority level. Strong understanding of security governance, risk management, and compliance. Hands-on experience with cloud, network, and identity security. Familiarity with UK public sector standards (e.g. More ❯
Develop, review, and maintain the IT Security Strategy in line with organisational goals and regulatory obligations. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprisearchitecture and digital strategy. Participate in board-level or senior management discussions around cyber risk. Identify and manage strategic security risks (technical, legal, reputational, financial). Evaluate and … with policy harmonisation and compliance efforts. Technical Review and Oversight Undertake technical reviews of: New and existing systems, applications, and infrastructure. Cloud service configurations (IaaS, SaaS, PaaS). Network architecture, including firewalls, VPNs, and segmentation. Identity and Access Management (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments More ❯
Develop, review, and maintain the IT Security Strategy in line with organisational goals and regulatory obligations. Lead the creation and enforcement of cybersecurity governance frameworks. Align security objectives with enterprisearchitecture and digital strategy. Participate in board-level or senior management discussions around cyber risk. Identify and manage strategic security risks (technical, legal, reputational, financial). Evaluate and … with policy harmonisation and compliance efforts. Technical Review and Oversight Undertake technical reviews of: New and existing systems, applications, and infrastructure. Cloud service configurations (IaaS, SaaS, PaaS). Network architecture, including firewalls, VPNs, and segmentation. Identity and Access Management (IAM) implementations, including PIM/PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments More ❯