FDM is a global business and technology consultancy seeking a Security Architect to work for our client within the public sector. This is initially a 6-month contract with the potential to extend and will be a hybrid role based in Solihull . Our client is seeking an experienced Security Architect to join one of our key public … sector client engagements. This is an exciting opportunity to contribute to the strategic design of secure, cloud-based platforms supporting critical national infrastructure. As a Security Architect, you will play a central role in capability mapping, architectural design, and implementation of cloud-native security solutions. You will work closely with stakeholders to ensure that security controls and … evolving threat landscapes. This role is especially suited for professionals with a blend of hands-on expertise in Mist (Juniper Networks) and a strong technical foundation in Microsoft Azure security services. Responsibilities Perform detailed capability mapping into Mist (Juniper Networks), ensuring alignment between enterprise security needs and platform capabilities Design and implement scalable, secure security architectures for More ❯
Role title: Information Security Manager Reports to: Head of Operational Resilience Location: Hub Location Hours of work: Full time, with 3 days per week in the office SMCR Function: Conduct Purpose of role Information Security Manager you will define and drive the information security strategy across our financial services business. You will lead a growing team of … security professionals to safeguard customer data, ensure compliance with regulatory frameworks, and build a culture of security awareness throughout the organisation. Your strategic vision and hands-on expertise will protect critical systems and support business growth. Key Responsibilities Develop and maintain the enterprise information security strategy aligned with business goals Lead the implementation and oversight of a … 3rd party managed Security Operations Centre (SOC) ensuring effective integration. Baseline and conduct regular reviews with an incoming 3rd party managed SOC and the security tools in the Cloud environment (Defender and Sentinel) Oversee securityarchitecture, vulnerability management, incident response, and threat intelligence Lead security risk assessments and manage remediation plans for identified gaps Ensure More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Robert Walters
offer collaborative solutions to their clients, across strategy, delivery of complex programmes and risk management. Due to continued growth and acquisition, they are now keen to expand their cyber security offering and will be appointing an experienced Principal Cyber Security Engineer, to join their UK cyber team. This role will pay a range up to £90,000 plus … benefits with a home-based working model. As an experienced Principal Cyber Security Engineer, you will design, implement and manage security measures to protect the Azure & M365 estates. Principal Cyber Security Engineer: Duties Implement/Manage security measures to protect Azure, M365, Cloud Infrastructure & Data Deep knowledge of Azure & M365 security services Ensure security of cloud infrastructure Identify & implement automation opportunities Coordinate/Manage engineering projects Design/Develop/Maintain securityarchitecture Mentor the engineering function, provide technical leadership Principal Cyber Security Engineer: Duties Proven experience with Azure & M365 security tools and technologies Deep knowledge of security frameworks and standards (NIST, CIS, ISO27001) Knowledge of scripting & automation More ❯
Coventry, West Midlands, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
Up to 10, Avoid repetition) More general skills/experience: 1.Core Responsibilities Design and document enterprise network architectures (LAN, WAN, WLAN, cloud networking). Ensure scalability, reliability, performance, and security of network infrastructure. Develop and maintain network roadmaps and standards aligned with business and IT strategy. Lead network design for data centres, cloud integrations, and hybrid environments. Evaluate and … VPNs and secure remote access solutions. Strong understanding of wireless networking design and optimisation. Proficiency in load balancing, firewalls, and proxy solutions.(e.g., F5, Palo Alto, Forcepoint, Cisco ASA) Security & Compliance Integration of security principles (Zero Trust, segmentation, NAC). Familiarity with frameworks such as ISO 27001, NIST, PCI-DSS, and data protection standards (GDPR). Cloud & Virtualisation … Monitoring & Management Knowledge of network management systems (SolarWinds, Cisco DNA Center, etc.). Performance monitoring, logging, and incident response design. 3. Experience Requirements Typically710+ yearsin network engineering, with35 yearsin architecture or design roles. Proven experience in large-scale or complex enterprise environments. Experience producing architectural artefacts (HLDs, LLDs, diagrams, standards). Track record of leading technical design workshops and More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Experis
Outside IR35, Senior DevSecOps Architect/Consultant, hybrid, ISO 27001 My client is looking for a Senior DevSecOps Architect/Consultant to lead governance, architecture guidance, and assurance for cloud and infrastructure security across Microsoft Azure, AWS, and key SaaS platforms. This is a hybrid role, so you need to be flexible to attend meetings and workshops. This … role is pivotal in defining technical blueprints, setting security standards, and ensuring regulatory compliance with Cyber Essentials Plus, ISO 27001, and Zero Trust principles. You will work closely with IT and platform teams to embed best practices, validate implementations, and support audit readiness across IaaS, PaaS, and SaaS environments. Responsibilities Define and maintain multi-cloud security standards and … reference blueprints (e.g. Azure Policy/Initiatives, AWS Control Tower/SCPs) Own securityarchitecture patterns and contribute to HLD/LLD, threat models, and risk assessments Set assurance criteria and control evidence requirements for internal teams and third-party vendors Establish policy-as-code requirements and maintain an exceptions register with expiry and risk ownership Define identity More ❯