Job Title: Network Security Architect Summary: We are seeking an experienced and strategic Network Security Architect to design secure, scalable, and resilient network architectures across the enterprise. The ideal candidate will possess deep knowledge of : - Traditional network infrastructure – LAN; WAN; WIFI etc - Cybersecurity including Zero Trust … Cloud Security Architecture - Be capable of aligning security controls with business objectives and compliance requirements. Key Responsibilities: Lead the design and implementation of secure network architectures for on-premises, cloud, and hybrid environments. Define network security standards, frameworks, and policies aligned with industry best practices (e.g., NIST, ISO … CIS). Develop and maintain secure designs for firewalls, VPNs, intrusion prevention systems (IPS/IDS), networksegmentation, and zero trust network access (ZTNA). Collaborate with IT, cloud, and cybersecurity teams to ensure secure integration across systems and applications. Lead architectural reviews and assurance of designs More ❯
Bradford, south west england, united kingdom Hybrid / WFH Options
Morrisons
technology, and threat drivers. • Develop security strategy plans, roadmaps, and architecture artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, networksegmentation, and identity and access management. • Contribute to standards for data encryption and tokenization based on data classification criteria. • Draft security procedures and … DevOps to ensure secure coding practices and escalate risks as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review networksegmentation and ensure least privilege for network access (Zero Trust). • Support testing and validation of internal security controls and assess emerging More ❯
your experience and knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, networksegmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management More ❯