and Employees. So, what are you waiting for? Join a community that cares about you! More about your role As part of the second line of defence, the Enterprise Information Security Architect provides expert oversight and strategic challenge to ensure the organisation's systems, services, and technology programmes are secure by design. This role acts as a trusted … assurance that technology solutions align with organisational policies, risk appetite, and regulatory obligations, helping to reduce exposure and build long-term security maturity. Playing a key role in shaping information security architecture, governance, supporting secure design patterns, and guiding the organisation towards consistent, risk-informed decision-making. The Essential Criteria for this role is listed below. Proven experience in … programmes. Strong understanding of secure-by-design and privacy-by-design principles, with the ability to challenge and guide design decisions against risk appetite. Demonstrable knowledge of cyber and information security risks, including data protection, cloud security, and control assurance in complex environments. Excellent stakeholder management and communication skills, with confidence to engage and influence architects, IT leadership, and More ❯
and Employees. So, what are you waiting for? Join a community that cares about you! More about your role As part of the second line of defence, the Enterprise Information Security Architect provides expert oversight and strategic challenge to ensure the organisation's systems, services, and technology programmes are secure by design. This role acts as a trusted … assurance that technology solutions align with organisational policies, risk appetite, and regulatory obligations, helping to reduce exposure and build long-term security maturity. Playing a key role in shaping information security architecture, governance, supporting secure design patterns, and guiding the organisation towards consistent, risk-informed decision-making. The Essential Criteria for this role is listed below. Proven experience in … programmes. Strong understanding of secure-by-design and privacy-by-design principles, with the ability to challenge and guide design decisions against risk appetite. Demonstrable knowledge of cyber and information security risks, including data protection, cloud security, and control assurance in complex environments. Excellent stakeholder management and communication skills, with confidence to engage and influence architects, IT leadership, and More ❯
and Employees. So, what are you waiting for? Join a community that cares about you! More about your role As part of the second line of defence, the Enterprise Information Security Architect provides expert oversight and strategic challenge to ensure the organisation's systems, services, and technology programmes are secure by design. This role acts as a trusted … assurance that technology solutions align with organisational policies, risk appetite, and regulatory obligations, helping to reduce exposure and build long-term security maturity. Playing a key role in shaping information security architecture, governance, supporting secure design patterns, and guiding the organisation towards consistent, risk-informed decision-making. The Essential Criteria for this role is listed below. Proven experience in … programmes. Strong understanding of secure-by-design and privacy-by-design principles, with the ability to challenge and guide design decisions against risk appetite. Demonstrable knowledge of cyber and information security risks, including data protection, cloud security, and control assurance in complex environments. Excellent stakeholder management and communication skills, with confidence to engage and influence architects, IT leadership, and More ❯
and Employees. So, what are you waiting for? Join a community that cares about you! More about your role As part of the second line of defence, the Enterprise Information Security Architect provides expert oversight and strategic challenge to ensure the organisation's systems, services, and technology programmes are secure by design. This role acts as a trusted … assurance that technology solutions align with organisational policies, risk appetite, and regulatory obligations, helping to reduce exposure and build long-term security maturity. Playing a key role in shaping information security architecture, governance, supporting secure design patterns, and guiding the organisation towards consistent, risk-informed decision-making. The Essential Criteria for this role is listed below. Proven experience in … programmes. Strong understanding of secure-by-design and privacy-by-design principles, with the ability to challenge and guide design decisions against risk appetite. Demonstrable knowledge of cyber and information security risks, including data protection, cloud security, and control assurance in complex environments. Excellent stakeholder management and communication skills, with confidence to engage and influence architects, IT leadership, and More ❯
and Employees. So, what are you waiting for? Join a community that cares about you! More about your role As part of the second line of defence, the Enterprise Information Security Architect provides expert oversight and strategic challenge to ensure the organisation's systems, services, and technology programmes are secure by design. This role acts as a trusted … assurance that technology solutions align with organisational policies, risk appetite, and regulatory obligations, helping to reduce exposure and build long-term security maturity. Playing a key role in shaping information security architecture, governance, supporting secure design patterns, and guiding the organisation towards consistent, risk-informed decision-making. The Essential Criteria for this role is listed below. Proven experience in … programmes. Strong understanding of secure-by-design and privacy-by-design principles, with the ability to challenge and guide design decisions against risk appetite. Demonstrable knowledge of cyber and information security risks, including data protection, cloud security, and control assurance in complex environments. Excellent stakeholder management and communication skills, with confidence to engage and influence architects, IT leadership, and More ❯
and Employees. So, what are you waiting for? Join a community that cares about you! More about your role As part of the second line of defence, the Enterprise Information Security Architect provides expert oversight and strategic challenge to ensure the organisation's systems, services, and technology programmes are secure by design. This role acts as a trusted … assurance that technology solutions align with organisational policies, risk appetite, and regulatory obligations, helping to reduce exposure and build long-term security maturity. Playing a key role in shaping information security architecture, governance, supporting secure design patterns, and guiding the organisation towards consistent, risk-informed decision-making. The Essential Criteria for this role is listed below. Proven experience in … programmes. Strong understanding of secure-by-design and privacy-by-design principles, with the ability to challenge and guide design decisions against risk appetite. Demonstrable knowledge of cyber and information security risks, including data protection, cloud security, and control assurance in complex environments. Excellent stakeholder management and communication skills, with confidence to engage and influence architects, IT leadership, and More ❯
and Employees. So, what are you waiting for? Join a community that cares about you! More about your role As part of the second line of defence, the Enterprise Information Security Architect provides expert oversight and strategic challenge to ensure the organisation's systems, services, and technology programmes are secure by design. This role acts as a trusted … assurance that technology solutions align with organisational policies, risk appetite, and regulatory obligations, helping to reduce exposure and build long-term security maturity. Playing a key role in shaping information security architecture, governance, supporting secure design patterns, and guiding the organisation towards consistent, risk-informed decision-making. The Essential Criteria for this role is listed below. Proven experience in … programmes. Strong understanding of secure-by-design and privacy-by-design principles, with the ability to challenge and guide design decisions against risk appetite. Demonstrable knowledge of cyber and information security risks, including data protection, cloud security, and control assurance in complex environments. Excellent stakeholder management and communication skills, with confidence to engage and influence architects, IT leadership, and More ❯
and Employees. So, what are you waiting for? Join a community that cares about you! More about your role As part of the second line of defence, the Enterprise Information Security Architect provides expert oversight and strategic challenge to ensure the organisation's systems, services, and technology programmes are secure by design. This role acts as a trusted … assurance that technology solutions align with organisational policies, risk appetite, and regulatory obligations, helping to reduce exposure and build long-term security maturity. Playing a key role in shaping information security architecture, governance, supporting secure design patterns, and guiding the organisation towards consistent, risk-informed decision-making. The Essential Criteria for this role is listed below. Proven experience in … programmes. Strong understanding of secure-by-design and privacy-by-design principles, with the ability to challenge and guide design decisions against risk appetite. Demonstrable knowledge of cyber and information security risks, including data protection, cloud security, and control assurance in complex environments. Excellent stakeholder management and communication skills, with confidence to engage and influence architects, IT leadership, and More ❯
and Employees. So, what are you waiting for? Join a community that cares about you! More about your role As part of the second line of defence, the Enterprise Information Security Architect provides expert oversight and strategic challenge to ensure the organisation's systems, services, and technology programmes are secure by design. This role acts as a trusted … assurance that technology solutions align with organisational policies, risk appetite, and regulatory obligations, helping to reduce exposure and build long-term security maturity. Playing a key role in shaping information security architecture, governance, supporting secure design patterns, and guiding the organisation towards consistent, risk-informed decision-making. The Essential Criteria for this role is listed below. Proven experience in … programmes. Strong understanding of secure-by-design and privacy-by-design principles, with the ability to challenge and guide design decisions against risk appetite. Demonstrable knowledge of cyber and information security risks, including data protection, cloud security, and control assurance in complex environments. Excellent stakeholder management and communication skills, with confidence to engage and influence architects, IT leadership, and More ❯
and Employees. So, what are you waiting for? Join a community that cares about you! More about your role As part of the second line of defence, the Enterprise Information Security Architect provides expert oversight and strategic challenge to ensure the organisation's systems, services, and technology programmes are secure by design. This role acts as a trusted … assurance that technology solutions align with organisational policies, risk appetite, and regulatory obligations, helping to reduce exposure and build long-term security maturity. Playing a key role in shaping information security architecture, governance, supporting secure design patterns, and guiding the organisation towards consistent, risk-informed decision-making. The Essential Criteria for this role is listed below. Proven experience in … programmes. Strong understanding of secure-by-design and privacy-by-design principles, with the ability to challenge and guide design decisions against risk appetite. Demonstrable knowledge of cyber and information security risks, including data protection, cloud security, and control assurance in complex environments. Excellent stakeholder management and communication skills, with confidence to engage and influence architects, IT leadership, and More ❯
and Employees. So, what are you waiting for? Join a community that cares about you! More about your role As part of the second line of defence, the Enterprise Information Security Architect provides expert oversight and strategic challenge to ensure the organisation's systems, services, and technology programmes are secure by design. This role acts as a trusted … assurance that technology solutions align with organisational policies, risk appetite, and regulatory obligations, helping to reduce exposure and build long-term security maturity. Playing a key role in shaping information security architecture, governance, supporting secure design patterns, and guiding the organisation towards consistent, risk-informed decision-making. The Essential Criteria for this role is listed below. Proven experience in … programmes. Strong understanding of secure-by-design and privacy-by-design principles, with the ability to challenge and guide design decisions against risk appetite. Demonstrable knowledge of cyber and information security risks, including data protection, cloud security, and control assurance in complex environments. Excellent stakeholder management and communication skills, with confidence to engage and influence architects, IT leadership, and More ❯
and Employees. So, what are you waiting for? Join a community that cares about you! More about your role As part of the second line of defence, the Enterprise Information Security Architect provides expert oversight and strategic challenge to ensure the organisation's systems, services, and technology programmes are secure by design. This role acts as a trusted … assurance that technology solutions align with organisational policies, risk appetite, and regulatory obligations, helping to reduce exposure and build long-term security maturity. Playing a key role in shaping information security architecture, governance, supporting secure design patterns, and guiding the organisation towards consistent, risk-informed decision-making. The Essential Criteria for this role is listed below. Proven experience in … programmes. Strong understanding of secure-by-design and privacy-by-design principles, with the ability to challenge and guide design decisions against risk appetite. Demonstrable knowledge of cyber and information security risks, including data protection, cloud security, and control assurance in complex environments. Excellent stakeholder management and communication skills, with confidence to engage and influence architects, IT leadership, and More ❯
and Employees. So, what are you waiting for? Join a community that cares about you! More about your role As part of the second line of defence, the Enterprise Information Security Architect provides expert oversight and strategic challenge to ensure the organisation's systems, services, and technology programmes are secure by design. This role acts as a trusted … assurance that technology solutions align with organisational policies, risk appetite, and regulatory obligations, helping to reduce exposure and build long-term security maturity. Playing a key role in shaping information security architecture, governance, supporting secure design patterns, and guiding the organisation towards consistent, risk-informed decision-making. The Essential Criteria for this role is listed below. Proven experience in … programmes. Strong understanding of secure-by-design and privacy-by-design principles, with the ability to challenge and guide design decisions against risk appetite. Demonstrable knowledge of cyber and information security risks, including data protection, cloud security, and control assurance in complex environments. Excellent stakeholder management and communication skills, with confidence to engage and influence architects, IT leadership, and More ❯
and Employees. So, what are you waiting for? Join a community that cares about you! More about your role As part of the second line of defence, the Enterprise Information Security Architect provides expert oversight and strategic challenge to ensure the organisation's systems, services, and technology programmes are secure by design. This role acts as a trusted … assurance that technology solutions align with organisational policies, risk appetite, and regulatory obligations, helping to reduce exposure and build long-term security maturity. Playing a key role in shaping information security architecture, governance, supporting secure design patterns, and guiding the organisation towards consistent, risk-informed decision-making. The Essential Criteria for this role is listed below. Proven experience in … programmes. Strong understanding of secure-by-design and privacy-by-design principles, with the ability to challenge and guide design decisions against risk appetite. Demonstrable knowledge of cyber and information security risks, including data protection, cloud security, and control assurance in complex environments. Excellent stakeholder management and communication skills, with confidence to engage and influence architects, IT leadership, and More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
AJ BELL BUSINESS SOLUTIONS LIMITED
To support the Chief Information Security Officer in managing and reporting the Information Security Risks faced by Technology Services (TS) in delivering AJ Bells systems and services. This role is responsible for facilitating the secure delivery of AJ Bells technology and business change. The Information Security Architect will play a lead role in designing and implementing … security posture Carrying out internal security reviews both on solutions we develop in house and third-party solutions. Supporting audit and due diligence activities within Technology Services Working with Information Security, Infrastructure and Architecture to define security standards. Acts as an integration point between the CISO and AJ Bell business and technology teams to ensure security is embedded across … following areas: End Point Protection, Cloud Security, Network Security, DevOps, Security Monitoring & Remediation is advantageous. Knowledge of Secure Software Development Life Cycle best practices Strong understanding and knowledge of Information Security risk management tools and techniques Experience of security governance and compliance, ideally gained in financial services organisations Demonstrable understanding of Information Security control standards and frameworks e.g. More ❯
M5, Salford, Greater Manchester, United Kingdom Hybrid / WFH Options
AJ Bell Business Solutions Limited
To support the Chief Information Security Officer in managing and reporting the Information Security Risks faced by Technology Services (TS) in delivering AJ Bell’s systems and services. This role is responsible for facilitating the secure delivery of AJ Bell’s technology and business change. The Information Security Architect will play a lead role in designing … security posture Carrying out internal security reviews both on solutions we develop in house and third-party solutions. Supporting audit and due diligence activities within Technology Services Working with Information Security, Infrastructure and Architecture to define security standards. Acts as an integration point between the CISO and AJ Bell business and technology teams to ensure security is embedded across … the organisation Competence, knowledge, and skills Competence Experience working within recognised Information Security frameworks and best practices such as ISO27001, NIST etc. 5 years’ experience in an Information Security role gained in a financial services or e-commerce environment is preferred Knowledge & Technical Skills: Demonstrable experience of implementing enterprise security platforms Previous experience of delivering and maintaining of More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
AJ Bell
To support the Chief Information Security Officer in managing and reporting the Information Security Risks faced by Technology Services (TS) in delivering AJ Bell’s systems and services. This role is responsible for facilitating the secure delivery of AJ Bell’s technology and business change. The Information Security Architect will play a lead role in designing … security posture Carrying out internal security reviews both on solutions we develop in house and third-party solutions. Supporting audit and due diligence activities within Technology Services Working with Information Security, Infrastructure and Architecture to define security standards. Acts as an integration point between the CISO and AJ Bell business and technology teams to ensure security is embedded across … following areas: End Point Protection, Cloud Security, Network Security, DevOps, Security Monitoring & Remediation is advantageous. Knowledge of Secure Software Development Life Cycle best practices Strong understanding and knowledge of Information Security risk management tools and techniques Experience of security governance and compliance, ideally gained in financial services organisations Demonstrable understanding of Information Security control standards and frameworks e.g. More ❯
West Midlands, United Kingdom Hybrid / WFH Options
Halfords Group PLC
ll love it here too. So put yourself at the heart of a dynamic, fast-paced working environment where expertise and focus take people far. The role As an InformationArchitect, you're passionate about the accuracy and integrity of our architectural data and repositories, recognising that a solid data foundation is crucial for successful IT services and … ensure data consistency, strategic alignment, and that change is delivered effectively. You'll also champion the importance of high-quality data, educating the wider business on why maintaining accurate information is vital. This is a unique opportunity to join a successful and established team that has experienced significant growth. It's a role that offers the chance to evolve … making it easy for teams to find and use critical information. Maintain high standards for architectural artifact creation, ensuring quality and compliance across the board. Champion best practices in information architecture, implementing smart metadata standards and leading continuous improvements in how we manage knowledge. About you A strong understanding of IT systems and their crucial role within a large More ❯
Adecco are pleased to be recruiting for a permanent Enterprise InformationArchitect on behalf of the Civil Nuclear Constabulary. Location: Civil Nuclear Constabulary HQ, Culham Job Shift: Monday - Friday Salary: Ranges £35,854 - £39,929 (plus a £2,000 South East allowance per annum for individuals based at Culham) and generous benefits package Hybrid working As the Enterprise … InformationArchitect, you will play a pivotal role in shaping and delivering the CNC Data Strategy. Reporting to the Senior EIA and Chief Information and Protective Security Officer, you will: Advise Strategically : Provide guidance and planning to senior leaders to ensure data compliance. Collaborate Closely : Work with professionals across the Information Risk Group to identify, assess … and Shape the Future of Data at CNC Are you passionate about transforming data strategy into tangible improvements? Do you thrive in a collaborative environment, working alongside experts in information governance, data protection, cybersecurity, and risk management? If so, the CNC is looking for an Enterprise InformationArchitect who can combine strategic vision with practical expertise to More ❯
project and programme managers, and policy secretariat staff. There are many different functions and professions delivering key outputs for the Army. Step into the future of warfare with the Information Directorate, where data drives decisions and digital dominance defines victory. We lead in strategic data management, intelligence, and cutting-edge technology, delivering the tools that give the Army a … decisive edge on the modern battlefield. As part of our civil servant team, you'll be at the forefront of information warfare, countering disinformation, safeguarding critical data, and ensuring information integrity in a rapidly evolving digital battlespace. You'll work with state-of-the-art tools, including AI, advanced analytics, and next-gen tech, helping the Army outthink … outmanoeuvre, and outpace its adversaries. In the Information Directorate, you'll turn that vision into reality. From strengthening cyber resilience to driving digital transformation on the front lines, your expertise will shape the Army's future. You'll collaborate with a diverse network of experts, deploying innovative strategies to maintain the Army's dominance in an increasingly contested informationMore ❯