Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
CACI Limited
You will play a pivotal role in designing, implementing, and overseeing advanced cloud infrastructure solutions for mission-critical systems. In this role, you will use your deep knowledge of securityarchitecture on cloud platforms to provide technical leadership and strategic direction in building scalable, secure, and resilient cloud-native systems based on AWS, Kubernetes, Kafka, microservices, Java, and … event-driven design. Key Responsibilities: • Cloud Architecture Design: Lead the design of cloud-based systems and solutions, utilising AWS and modern architectural patterns such as microservices, event-driven architectures, and serverless computing to meet both current and future business needs. • Cloud Security: Develop and implement robust security architectures for cloud solutions, ensuring data protection, regulatory compliance, and … alignment with industry best practices (e.g., AWS IAM, encryption, VPC, security monitoring, and auditing). • Containerisation & Orchestration: Architect and oversee containerised environments using Kubernetes, ensuring high availability, scalability, and fault tolerance for critical applications. • Event-Driven Systems: Lead a team to architect event-driven systems using Kafka, designing and managing messaging frameworks to handle real-time data processing across More ❯
The role will also support pre-sales engagements, bid management and business growth, making it ideal for professionals with both technical expertise and strategic leadership skills. Key responsibilities: Solution & Architecture Design Define end-to-end cloud architectures aligning with business and technology objectives. Develop strategies for cloud adoption, migration, and modernization, ensuring seamless transitioning from legacy systems. Design and … implement multi-cloud, hybrid cloud, or cloud-native architectures for scalability and resilience. Provide architectural guidance on security, compliance, and governance in cloud solutions. Collaborate with stakeholders to create digital roadmaps for long-term cloud transformation. Data Architecture & Management Design conceptual, logical, and physical data architectures that support business and analytics needs. Implement data cataloging and data governance … frameworks to enhance data discovery, lineage tracking, and compliance. Define data modeling standards, ensuring alignment with business intelligence, AI/ML, and analytics strategies. Develop data security frameworks, including encryption, access control, and data masking. Support data migration and transitioning strategies, ensuring minimal disruption to business operations. Optimize data storage and retrieval mechanisms across cloud-based databases, preferably Azure More ❯
The role will also support pre-sales engagements, bid management and business growth, making it ideal for professionals with both technical expertise and strategic leadership skills. Key responsibilities: Solution & Architecture Design Define end-to-end cloud architectures aligning with business and technology objectives. Develop strategies for cloud adoption, migration, and modernization, ensuring seamless transitioning from legacy systems. Design and … implement multi-cloud, hybrid cloud, or cloud-native architectures for scalability and resilience. Provide architectural guidance on security, compliance, and governance in cloud solutions. Collaborate with stakeholders to create digital roadmaps for long-term cloud transformation. Data Architecture & Management Design conceptual, logical, and physical data architectures that support business and analytics needs. Implement data cataloging and data governance … frameworks to enhance data discovery, lineage tracking, and compliance. Define data modeling standards, ensuring alignment with business intelligence, AI/ML, and analytics strategies. Develop data security frameworks, including encryption, access control, and data masking. Support data migration and transitioning strategies, ensuring minimal disruption to business operations. Optimize data storage and retrieval mechanisms across cloud-based databases, preferably Azure More ❯
implement end-to-end solution/technical design. Provide solution and technical SME mentorship. Provide a customer concern point for design related issues within projects. Align standards, frameworks and security with overall business and technology strategy. Identify, communicate, and address Information Assurance risks. Design securityarchitecture elements to mitigate risks in liaison with Solution Leads. Create solutions … that balance business requirements with information and cyber security requirements. Identify security design gaps in existing and proposed architectures and recommend changes or improvements. What you’ll bring:. Experience of core Cisco Networking technologies covering switching, routing, firewall, wireless(ASA,ACI,NX-OS,IOS etc.). Good knowledge of network orchestration and automation. Concrete understanding of fundamental … to a high standard. Experience with Windows server, AD, exchange SharePoint, group policy. It would be great if you had: Familiarity with industry standard frameworks in project management and architecture (Prince2, TOGAF etc). Cisco Unified Communications, and ideally also Asterisk PABX. Familiar with concepts involved in SEIM and other network security technologies. Knowledge of Endpoint Management. Familiarity More ❯
Portsmouth, Hampshire, South East, United Kingdom Hybrid / WFH Options
Sopra Steria Limited
implement end-to-end solution/technical design. Provide solution and technical SME mentorship. Provide a customer concern point for design related issues within projects. Align standards, frameworks and security with overall business and technology strategy. Identify, communicate, and address Information Assurance risks. Design securityarchitecture elements to mitigate risks in liaison with Solution Leads. Create solutions … that balance business requirements with information and cyber security requirements. Identify security design gaps in existing and proposed architectures and recommend changes or improvements. What youll bring:. Experience of core Cisco Networking technologies covering switching, routing, firewall, wireless(ASA,ACI,NX-OS,IOS etc.). Good knowledge of network orchestration and automation. Concrete understanding of fundamental vendor … to a high standard. Experience with Windows server, AD, exchange SharePoint, group policy. It would be great if you had: Familiarity with industry standard frameworks in project management and architecture (Prince2, TOGAF etc). Cisco Unified Communications, and ideally also Asterisk PABX. Familiar with concepts involved in SEIM and other network security technologies. Knowledge of Endpoint Management. Familiarity More ❯
implement end-to-end solution/technical design. Provide solution and technical SME mentorship. Provide a customer concern point for design related issues within projects. Align standards, frameworks and security with overall business and technology strategy. Identify, communicate, and address Information Assurance risks. Design securityarchitecture elements to mitigate risks in liaison with Solution Leads. Create solutions … that balance business requirements with information and cyber security requirements. Identify security design gaps in existing and proposed architectures and recommend changes or improvements. What youll bring:. Experience of core Cisco Networking technologies covering switching, routing, firewall, wireless(ASA,ACI,NX-OS,IOS etc.). Good knowledge of network orchestration and automation. Concrete understanding of fundamental vendor … to a high standard. Experience with Windows server, AD, exchange SharePoint, group policy. It would be great if you had: Familiarity with industry standard frameworks in project management and architecture (Prince2, TOGAF etc). Cisco Unified Communications, and ideally also Asterisk PABX. Familiar with concepts involved in SEIM and other network security technologies. Knowledge of Endpoint Management. Familiarity More ❯
works to develop high-quality cybersecurity solutions for various software applications on modern cloud-based technologies. As a core technical contributor, you are responsible for carrying out critical cybersecurity architecture solutions by identifying, creating, and communicating risk, mitigation options, and solutions across multiple technical areas within various business functions in support of project goals. Job responsibilities Develop tooling to … current and emerging technologies to recommend the best solutions for the future state architecture. Experience effectively communicating with senior business leaders. Preferred qualifications, capabilities, and skills Knowledge of network securityarchitecture concepts, including topology, protocols, components, and principles would be advantageous. Prior experience in cybersecurity design/engineering would be advantageous. Prior experience in disaster and/or More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Marathon TS Inc
Information Systems Security Officer Fully Remote (Washington DC Metro Area preferred) Cyber Security Information Systems Security Officer role maintains responsibility for maintaining the appropriate operational security posture for an information system or program. As part of those duties, the ISSO conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements … employed within or inherited by an information technology (IT) system(s) across multiple program offices to determine the overall effectiveness of the security controls (as defined in the latest revision of NIST SP 800-37). This role analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results. This role … to monitor and measure risk, compliance, and assurance efforts for IT systems across multiple program offices and vendors Develop specifications to ensure risk, compliance, and assurance efforts conform with security, resilience, and dependability requirements at the software application, system, and network environment level Draft statements of preliminary or residual security risks for system operation. Develop relevant "plan of More ❯
Overview: CDT is currently seeking a skilled Information System Security Engineer to execute the implementation of security standards to a diverse set of systems for Tampa, FL. An advanced understanding of engineering principles, as well as vulnerability, compliance, and patch management is required. A working understanding of the Radio Frequency spectrum is desired. Clearance Requirements: An active Secret … clearance is required, TS/SCI preferred. All candidates must be U.S. Citizens. Applicants who do not meet these requirements will not be considered. Responsibilities: • Lead the security design, configuration, hardening, testing and monitoring of a wide variety of moderately complex Information System technologies independently or as part of a larger design team. • Performs secure engineering and vulnerability testing … Virtual Operating Systems, Web Applications, Databases, and Networking Devices. Applies knowledge of current compliance standards and associated technical controls across these technologies. • Engages customer technical POCs as necessary throughout securityarchitecture design and implementation activities. • Applies knowledge and understanding of Information Assurance (IA) concepts, practices, and procedures using established DoD security policies and standards to mitigate securityMore ❯
of Professional Military Education, Joint Professional Military Education, help the Chief of Naval Operations (CNO) define the future Navy, its missions and roles, support combat readiness, and strengthen maritime security cooperation. Title: Systems Security Analyst/Cyber Defense Analyst Location: Newport, RI Full Time (Y/N): Y Status (Exempt/Non-Exempt): Exempt Clearance: Top Secret/… analyze, and report events from the enterprise network to protect information systems from threats. • Coordinates threat and mitigation strategies across enterprise. Required Job Experience: • Coordinating, installing, and maintaining information security devices and services on EDU, SIPRNET, DMZ, and commercial ISP networks. • Ensure compliance of information security devices, services, and capabilities within DOD Security and Information Assurance protection … requirements. • Provide information security services to implement, maintain and sustain all unclassified and classified information security support services. • Setup, configure, modify, test, maintain, operate, and support information security tools. • Operate ACAS for Information Assurance Vulnerability Alert (IAVA) management and scanning, McAfee HBSS, Corelight, and Cortex. • IOT discovery, monitoring, SOAR orchestration, and SIEM event correlation and analysis. • Cloud More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non … compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non … compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data More ❯
A great client of mine is hiring a Security-Focused Technical Consultant/Security Architect to join a highly regulated healthcare tech environment. You’ll work cross-functionally with engineering, architecture, and business teams to design secure solutions, manage risks, and ensure compliance across a portfolio of applications. Length: Initial 7 months with chance to extend or … go perm. IR35: Inside Work structure: Remote Key Responsibilities: Partner with engineering and architecture to define secure technical solutions Manage end-to-end project security across multiple applications Perform vulnerability testing, threat modelling, and risk assessments Maintain up-to-date security policies, standards, and best practices Communicate risks and mitigation strategies to senior stakeholders Translate business needs … into effective security controls Key Skills & Experience: 5+ years in securityarchitecture or consulting in regulated environments Deep knowledge of secure SDLC, DevSecOps, cloud (Azure/AWS), and frameworks (OWASP, MITRE) Hands-on experience with vulnerability tools, threat modelling, and compliance (GDPR, HIPAA, PCI) Strong communication and stakeholder engagement skills Technical knowledge across .NET, Java, scripting (Python More ❯
A great client of mine is hiring a Security-Focused Technical Consultant/Security Architect to join a highly regulated healthcare tech environment. You’ll work cross-functionally with engineering, architecture, and business teams to design secure solutions, manage risks, and ensure compliance across a portfolio of applications. Length: Initial 7 months with chance to extend or … go perm. IR35: Inside Work structure: Remote Key Responsibilities: Partner with engineering and architecture to define secure technical solutions Manage end-to-end project security across multiple applications Perform vulnerability testing, threat modelling, and risk assessments Maintain up-to-date security policies, standards, and best practices Communicate risks and mitigation strategies to senior stakeholders Translate business needs … into effective security controls Key Skills & Experience: 5+ years in securityarchitecture or consulting in regulated environments Deep knowledge of secure SDLC, DevSecOps, cloud (Azure/AWS), and frameworks (OWASP, MITRE) Hands-on experience with vulnerability tools, threat modelling, and compliance (GDPR, HIPAA, PCI) Strong communication and stakeholder engagement skills Technical knowledge across .NET, Java, scripting (Python More ❯
Lead Security Architect The Opportunity Albany Beck is partnering with a global Investment Bank to deliver a critical Protocol Analysis & Remediation programme. We’re looking for a Lead Security Architect with deep technical expertise and a strategic mindset to drive the design and implementation of security controls focused on reducing the risk of attackers moving undetected between … systems within the organisation’s network This is a hands-on architecture role where you'll lead discovery, design, and implementation efforts, playing a vital role in reducing risk and progressing toward a Zero Trust framework. Key Responsibilities Lead the development of robust security architectures to detect, prevent and contain lateral movement between endpoints and workloads. Drive the … discovery phase by analysing logs (via Azure Log Analytics) and auditing configurations to identify vulnerabilities and insecure protocols. Define and present securityarchitecture designs and risk reduction recommendations to Cyber SecurityArchitecture and Engineering teams for sign-off. Collaborate with Linux and Windows SMEs to implement secure configurations and protocol controls. Architect and enforce network segmentation More ❯
Lead Security Architect The Opportunity Albany Beck is partnering with a global Investment Bank to deliver a critical Protocol Analysis & Remediation programme. We’re looking for a Lead Security Architect with deep technical expertise and a strategic mindset to drive the design and implementation of security controls focused on reducing the risk of attackers moving undetected between … systems within the organisation’s network This is a hands-on architecture role where you'll lead discovery, design, and implementation efforts, playing a vital role in reducing risk and progressing toward a Zero Trust framework. Key Responsibilities Lead the development of robust security architectures to detect, prevent and contain lateral movement between endpoints and workloads. Drive the … discovery phase by analysing logs (via Azure Log Analytics) and auditing configurations to identify vulnerabilities and insecure protocols. Define and present securityarchitecture designs and risk reduction recommendations to Cyber SecurityArchitecture and Engineering teams for sign-off. Collaborate with Linux and Windows SMEs to implement secure configurations and protocol controls. Architect and enforce network segmentation More ❯
IT Security Lead/Specialist Hybrid working: 2 days per week in the office. DGH Recruitment are currently recruiting on behalf of a global professional services firm who are looking for an IT Security Lead to join the team on a permanent basis in their London office. The IT Security Lead will help maintain security in … of this role will include protecting system boundaries, securing highly sensitive data, and keeping internal systems and networked devices hardened against attacks. The ideal candidate will have strong BAU security incident prevention, monitoring and response skills combined with securityarchitecture and project experience, and be able to engage with external vendors and senior management. Responsibilities: - Monitor and … analyse network traffic, systems, and logs for signs of unusual or malicious activity. - Conduct regular security assessments and audits to identify vulnerabilities, risks, and potential areas for improvement. - Implement and maintain security tools and protocols, including firewalls, intrusion detection systems, and endpoint protection. - Investigate security incidents, respond to potential breaches, and document all relevant findings and actions. More ❯
City of London, Greater London, UK Hybrid / WFH Options
DGH Recruitment
IT Security Lead/Specialist Hybrid working: 2 days per week in the office. DGH Recruitment are currently recruiting on behalf of a global professional services firm who are looking for an IT Security Lead to join the team on a permanent basis in their London office. The IT Security Lead will help maintain security in … of this role will include protecting system boundaries, securing highly sensitive data, and keeping internal systems and networked devices hardened against attacks. The ideal candidate will have strong BAU security incident prevention, monitoring and response skills combined with securityarchitecture and project experience, and be able to engage with external vendors and senior management. Responsibilities: - Monitor and … analyse network traffic, systems, and logs for signs of unusual or malicious activity. - Conduct regular security assessments and audits to identify vulnerabilities, risks, and potential areas for improvement. - Implement and maintain security tools and protocols, including firewalls, intrusion detection systems, and endpoint protection. - Investigate security incidents, respond to potential breaches, and document all relevant findings and actions. More ❯
Award Join Synertex LLC and bring your expertise to a mission that matters. We're looking for a System Architect Subject Matter Expert (SME) with a background in cloud architecture, enterprise IT design, and data-centric infrastructure to support critical government and intelligence initiatives. If you're passionate about building scalable, secure, and future-ready architectures and thrive in … mission requirements Develop architectural roadmaps and ensure alignment with organizational strategy Lead cloud adoption initiatives and advise on platform selection, migration, and optimization Document system components, data flows, and security boundaries in compliance with federal standards Collaborate with cross-functional teams including cybersecurity, data services, and software development Evaluate emerging technologies to drive IT modernization and innovation REQUIREMENTS TS …/SCI clearance required, including additional security screenings Full Performance: High school diploma/GED with 8 years, associate's with 6 years, bachelor's with 4 years, or master's with 2 years of relevant experience Senior Level: High school diploma/GED with 10 years, associate's with 8 years, bachelor's with 6 years, master's More ❯
City of London, London, United Kingdom Hybrid / WFH Options
DGH Recruitment
IT Security Lead Hybrid working: 2 days per week in the office. DGH Recruitment are currently recruiting on behalf of a global professional services firm who are looking for an IT Security Lead to join the team on a permanent basis in their London office. The IT Security Lead will help maintain security in my clients … of this role will include protecting system boundaries, securing highly sensitive data, and keeping internal systems and networked devices hardened against attacks. The ideal candidate will have strong BAU security incident prevention, monitoring and response skills combined with securityarchitecture and project experience, and be able to engage with external vendors and senior management. Responsibilities: - Monitor and … analyse network traffic, systems, and logs for signs of unusual or malicious activity. - Conduct regular security assessments and audits to identify vulnerabilities, risks, and potential areas for improvement. - Implement and maintain security tools and protocols, including firewalls, intrusion detection systems, and endpoint protection. - Investigate security incidents, respond to potential breaches, and document all relevant findings and actions. More ❯
With significant executive support and sponsorship, our financial services client has launched a multi-year project to redevelop and modernise the full technology and security stack. To support this and maintain risk exposure, they are making a significant investment in the Information Security team, processes, and technology. This is a chance to join a small tight-knit Security … on designs for high scale, leading-edge, and operating in a truly cloud-native fashion, then we want to hear from you! Responsibilities: You will be part of the Security Engineering team - helping design, implement and support key services. We’re a hands-on engineering team. We partner with the broader engineering organisation and also build and support our … own capabilities across IT Security, IAM, SDLC, and SecurityArchitecture practices. Strong hands-on experience working with major cloud solutions (IaaS, PaaS, Event-driven/Serverless, SaaS) AWS and/or Azure. Capable of designing, implementing, and maintaining robust solutions and re-usable patterns that reduce risk across the organisation. Develop policy as code, templates, and modules More ❯
With significant executive support and sponsorship, our financial services client has launched a multi-year project to redevelop and modernise the full technology and security stack. To support this and maintain risk exposure, they are making a significant investment in the Information Security team, processes, and technology. This is a chance to join a small tight-knit Security … on designs for high scale, leading-edge, and operating in a truly cloud-native fashion, then we want to hear from you! Responsibilities: You will be part of the Security Engineering team - helping design, implement and support key services. We’re a hands-on engineering team. We partner with the broader engineering organisation and also build and support our … own capabilities across IT Security, IAM, SDLC, and SecurityArchitecture practices. Strong hands-on experience working with major cloud solutions (IaaS, PaaS, Event-driven/Serverless, SaaS) AWS and/or Azure. Capable of designing, implementing, and maintaining robust solutions and re-usable patterns that reduce risk across the organisation. Develop policy as code, templates, and modules More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Techfellow Limited
225k Comp Package | Hybrid Working - 3 Days in Office] We’re partnering with a market-defining pensions investment firm undertaking a major multi-year transformation of its technology and security stack. Backed by full executive sponsorship, they’re modernising cloud-native architecture, overhauling their identity platforms, and embedding security engineering into every layer of infrastructure delivery. With … governance processes via policy-as-code frameworks, IaC pipelines and audit/attestation tooling Integrate IAM controls into CI/CD pipelines, infrastructure delivery, and developer workflows, ensuring consistent security guardrails from build to production Partner with security architects, developers, and DevOps engineers to embed identity controls into broader securityarchitecture design Support secure federation and … SSO integrations across SAML, OIDC, SCIM and modern authentication protocols Translate regulatory and compliance needs into technical identity controls that balance security, usability and engineering agility Continuously refine IAM capabilities in response to emerging threats, platform evolution, and business growth Collaborate closely with leadership to provide governance oversight, reporting and risk visibility for identity-related access controls What You More ❯
225k Comp Package | Hybrid Working - 3 Days in Office] We’re partnering with a market-defining pensions investment firm undertaking a major multi-year transformation of its technology and security stack. Backed by full executive sponsorship, they’re modernising cloud-native architecture, overhauling their identity platforms, and embedding security engineering into every layer of infrastructure delivery. With … governance processes via policy-as-code frameworks, IaC pipelines and audit/attestation tooling Integrate IAM controls into CI/CD pipelines, infrastructure delivery, and developer workflows, ensuring consistent security guardrails from build to production Partner with security architects, developers, and DevOps engineers to embed identity controls into broader securityarchitecture design Support secure federation and … SSO integrations across SAML, OIDC, SCIM and modern authentication protocols Translate regulatory and compliance needs into technical identity controls that balance security, usability and engineering agility Continuously refine IAM capabilities in response to emerging threats, platform evolution, and business growth Collaborate closely with leadership to provide governance oversight, reporting and risk visibility for identity-related access controls What You More ❯
We are seeking an experienced and hands-on Security Architect with an emphasis on application security. You will work closely with application, infrastructure and compliance teams to embed security in the deployment of new solutions. Key Responsibilities: Define the application securityarchitecture strategy across cloud-native and on-prem applications. Perform security architectural reviews for … new solutions. Integrate security best practices (DevSecOps, SAST/DAST, etc.) into CI/CD pipelines. Establish and maintain secure coding standards and code review processes. Provide guidance and support the integration with IAM, authentication, cryptography, logging, etc. Help select and deploy security tools and embed them into technology solutions. Support technological compliance with frameworks such as ISO … or GDPR. Qualifications: Bachelor's or Master's degree in Computer Science or a related field. 5+ years of experience in information security, with at least 2 years focused on application security or security architecture. Understanding of secure SDLC, OWASP and cloud security patterns. Familiarity with code scanning tools, common cloud platforms and containerized environments. Ability More ❯