Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Inspire People
of the global economy! The Department for Business and Trade (DBT) and Inspire People are partnering to bring an exciting opportunity for a Lead SecurityArchitect to deliver secure designs and drive secure innovation at scale, blending architecture, cyber security policy and risk strategy to unlock the … to grow the economy. Their role is to help businesses invest, grow and export to create jobs and opportunities right across the country. Lead Security Architects play a key role in designing and delivering secure digital solutions across DBT, ensuring alignment with the department's security standards and … risk appetite. You will work closely with Principal Security Architects and stakeholders to embed security throughout project lifecycles, supporting the safe use of emerging technologies and balancing business needs with cyber risk. This role combines hands-on architecture, risk management and policy oversight, while also guiding and mentoring More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
Are you a Microsoft Security Advisor? Are you a Microsoft SecurityArchitect? Are you a Microsoft Security technologist? Are you a Microsoft Security evangelist? If you are any of the above, we should be talking about an opportunity to join a new practice within a … phenomenal £multi million organisation looking to grow the Microsoft Security offering this business has to its Professional and Managed Services Clients. This SecurityArchitect will be responsible for driving high technical standards, operational excellence, and innovation across the business. This role involves designing, implementing, and governing security solutions that align with industry best practices and regulatory requirements, ensuring the security and compliance of our cloud environments. You will be the face of this area within the business, completing webinars, speaking with clients, helping to train the Sales & presales guys to position these new products in More ❯
strong commitment to sustainability and good corporate citizenship, we have over 250,000 dedicated employees serving clients across 66 countries. Job Title: CyberArk PAM SecurityArchitect (Guardian Certified) Job Summary: We are seeking a highly skilled and Guardian Certified CyberArk PAM SecurityArchitect to join our … of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's suite of tools. The candidate will be responsible for ensuring the security of privileged accounts, credentials, and sessions across the organization. Key Responsibilities: 1. Solution Design and Architecture: Design and architect CyberArk PAM solutions to … meet business and security requirements. Develop and implement PAM strategies, policies, and procedures. Collaborate with stakeholders to define privileged access management requirements. Create detailed technical documentation, including architecture diagrams, workflows, and implementation plans. 2. Implementation and Deployment: Lead the deployment and configuration of CyberArk components, including: Core PAS (Privileged More ❯
customer). The role is with a fast-growing Fraud Prevention Services Business Unit of a 150 million USD revenue global solutions provider. The Security Solution Architect works within the cybersecurity consultancy, risk and advisory unit which is part of the Global Solutions team. The role involves providing … designing and tailoring these services for inclusion in the clients product/services portfolio. Ideally, you will be in presales or a technical solutions architect able to advise on the gap analysis of differing threat levels. Responsibilities Key responsibilities and accountabilities: Design and recommend security architectures, solutions, and … to protect client critical assets and data. Develop and help customers implement incident response plans, which outline steps to take in case of a security breach. Perform security assessments for customers, including penetration testing, to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend More ❯