operational excellence whilst identifying new areas of growth as part of our day to day objectives. Role Purpose: We are looking for an experienced Data Security Architect to join our growing Information Security team. Reporting to the Global Head of Security Strategy, Architecture & Engineering and working closely with IT … solutions to ensure information security and compliance requirements of the organisation as we go through our Digital Transformation and modernisation and beyond. As a Data Security Architect, you will possess in-depth knowledge of a broad range of information security controls to protect various data stores, both on … premises and in the cloud. The Data Security Architect is responsible for developing and executing a global data security strategy, ensuring the protection of sensitive information across the JD Group. Key Responsibilities: Implement and lead the Data Security Architecture capability across JD Sports, formalising principles through reference More ❯
Bradford, England, United Kingdom Hybrid / WFH Options
Morrisons
artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and identity and access management. • Contribute to standards for dataencryption and tokenization based on data classification criteria. • Draft security procedures and standards for executive review and approval. • Establish a taxonomy of … inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support … qualification Industry and Regulatory Experience The security architect is expected to have documented experience with the following: Regulations, Standards and Frameworks Payment Card Industry Data Security Standard (PCI-DSS) General Data Protection Regulation (GDPR) and Privacy Practices ISO 27001/2 Knowledge of OWASP 10 NIST Cybersecurity Framework More ❯
Bradford, south west england, united kingdom Hybrid / WFH Options
Morrisons
artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and identity and access management. • Contribute to standards for dataencryption and tokenization based on data classification criteria. • Draft security procedures and standards for executive review and approval. • Establish a taxonomy of … inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support … qualification Industry and Regulatory Experience The security architect is expected to have documented experience with the following: Regulations, Standards and Frameworks Payment Card Industry Data Security Standard (PCI-DSS) General Data Protection Regulation (GDPR) and Privacy Practices ISO 27001/2 Knowledge of OWASP 10 NIST Cybersecurity Framework More ❯
Deliver AWS Services & Security: Build and maintain AWS infrastructure (VPC, EC2, RDS, S3, Lambda, etc.), implementing security best practices (WAF, Network Firewall, IAM, VPC, dataencryption) to ensure compliance and resilience. Design, Deliver and Implement High Availability & Resilience: Develop disaster recovery solutions, resilient architectures, and governance controls, including … Security Hub, Audit Manager, and proactive threat detection. Implement, Maintain & Optimise AWS Best Practices & Governance: Enforce compliance through IAM, encryption, Control Tower, Security Hub, and cost-optimisation tools like AWS Cost Explorer and Trusted Advisor to drive efficiency. Develop and Maintain Infrastructure as Code (IaC): Automate provisioning, alerting, and … best practices. Infrastructure as Code (IaC): Strong proficiency in CloudFormation (preferred) or AWS CDK for automated, scalable deployments. AWS Cloud Security & Compliance: Expertise in encryption, IAM policies, network security, and transit security, ensuring adherence to financial services regulations (PCI DSS, FCA, GDPR). Database & Data Services: Expertise in More ❯
Kingston upon Hull, England Metropolitan Area, United Kingdom
Ventula Consulting
Information Security Lead where required, including within the technical response to security incidents. Maintain, review, test and implement security operations technologies, such as, antivirus, dataencryption, identity, cloud and other security measures in place. Maintain and improve procedures, documentation and relationships with other internal operations teams, ensuring effective More ❯
and the ISO 27001 as new and ongoing projects. Supporting with assessing any cyber security trends and look at preventative measures that could include dataencryption and anti-virus protection. Rolling out new software upgrades such as Windows 11. Skills required Experience with technical IT infrastructure and 3rd More ❯
Bridlington, North Humberside, North East, United Kingdom Hybrid / WFH Options
KD Recruitment Limited
and the ISO 27001 as new and ongoing projects. Supporting with assessing any cyber security trends and look at preventative measures that could include dataencryption and anti-virus protection. Rolling out new software upgrades such as Windows 11. Skills required Experience with technical IT infrastructure and More ❯
Bridlington, Carnaby, East Riding of Yorkshire, United Kingdom Hybrid / WFH Options
KD Recruitment
and the ISO 27001 as new and ongoing projects. Supporting with assessing any cyber security trends and look at preventative measures that could include dataencryption and anti-virus protection. Rolling out new software upgrades such as Windows 11. Skills required Experience with technical IT infrastructure and 3rd More ❯
pipeline with IaC scanner, SAST, DAST tool in the SDLC. Hands-on experience in one of the following is mandatory: Identity and Access Management DataEncryption Network Security Incident Response Security Automation About the team Diverse Experiences: Amazon values diverse experiences. Even if you do not meet all More ❯
infrastructure components. Diagnosing and resolving hardware, software, and network issues to minimise downtime. Implementing and managing security measures, including firewalls, intrusion detection systems, and dataencryption to protect against cyber threats. Optimising the performance of IT infrastructure to improve speed, efficiency, and reliability. Planning for future growth by More ❯