Security Architecture Jobs

172 Security Architecture Jobs

Systems Software Engineer

Cambridge, England, United Kingdom
Hybrid / WFH Options
Oho Group Ltd
Exciting Opportunity for Systems Software Engineer Up to £100,000 Oho has partnered with a Cyber Security subsidiary who is on a mission to design and build the security architecture of the future. They provide their customers with the most comprehensive defence against cybersecurity threats; for every … Key Responsibilities: As a Systems Software Engineer you will be involved in developing and maintaining the components of the enterprise product, ensuring top-notch security, reliability, and performance. Swiftly respond to security vulnerabilities, keep open-source components updated, and write thorough tests for quality assurance. Thrive in our more »
Posted:

Senior Cybersecurity Analyst

Maryland, United States
Leidos
in support of the DoD and COCOMs. The selected candidate shall, in accordance with mission requirements, provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary … process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/egress to the … DODIN; Document and maintain boundary architectures, understand employed defensive capabilities and available sensor data. Endpoint Security: Perform analysis, to include planning, assessing, and/or providing enterprise strategies for compliance and integration strategies with mid-tier, and boundary capabilities. Cloud Security: Develop strategies to monitor, detect, and prevent more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cybersecurity Analyst

Laurel, Maryland, United States
Leidos
in support of the DoD and COCOMs. The selected candidate shall, in accordance with mission requirements, provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary … process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/egress to the … DODIN; Document and maintain boundary architectures, understand employed defensive capabilities and available sensor data. Endpoint Security: Perform analysis, to include planning, assessing, and/or providing enterprise strategies for compliance and integration strategies with mid-tier, and boundary capabilities. Cloud Security: Develop strategies to monitor, detect, and prevent more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cybersecurity Analyst

Catonsville, Maryland, United States
Leidos
in support of the DoD and COCOMs. The selected candidate shall, in accordance with mission requirements, provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary … process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/egress to the … DODIN; Document and maintain boundary architectures, understand employed defensive capabilities and available sensor data. Endpoint Security: Perform analysis, to include planning, assessing, and/or providing enterprise strategies for compliance and integration strategies with mid-tier, and boundary capabilities. Cloud Security: Develop strategies to monitor, detect, and prevent more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cybersecurity Analyst

Hanover, Maryland, United States
Leidos
in support of the DoD and COCOMs. The selected candidate shall, in accordance with mission requirements, provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary … process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/egress to the … DODIN; Document and maintain boundary architectures, understand employed defensive capabilities and available sensor data. Endpoint Security: Perform analysis, to include planning, assessing, and/or providing enterprise strategies for compliance and integration strategies with mid-tier, and boundary capabilities. Cloud Security: Develop strategies to monitor, detect, and prevent more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cybersecurity Analyst

Severn, Maryland, United States
Leidos
in support of the DoD and COCOMs. The selected candidate shall, in accordance with mission requirements, provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary … process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/egress to the … DODIN; Document and maintain boundary architectures, understand employed defensive capabilities and available sensor data. Endpoint Security: Perform analysis, to include planning, assessing, and/or providing enterprise strategies for compliance and integration strategies with mid-tier, and boundary capabilities. Cloud Security: Develop strategies to monitor, detect, and prevent more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cybersecurity Analyst

Odenton, Maryland, United States
Leidos
in support of the DoD and COCOMs. The selected candidate shall, in accordance with mission requirements, provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary … process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/egress to the … DODIN; Document and maintain boundary architectures, understand employed defensive capabilities and available sensor data. Endpoint Security: Perform analysis, to include planning, assessing, and/or providing enterprise strategies for compliance and integration strategies with mid-tier, and boundary capabilities. Cloud Security: Develop strategies to monitor, detect, and prevent more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cybersecurity Analyst

Riverdale, Maryland, United States
Leidos
in support of the DoD and COCOMs. The selected candidate shall, in accordance with mission requirements, provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary … process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/egress to the … DODIN; Document and maintain boundary architectures, understand employed defensive capabilities and available sensor data. Endpoint Security: Perform analysis, to include planning, assessing, and/or providing enterprise strategies for compliance and integration strategies with mid-tier, and boundary capabilities. Cloud Security: Develop strategies to monitor, detect, and prevent more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cybersecurity Analyst

Burtonsville, Maryland, United States
Leidos
in support of the DoD and COCOMs. The selected candidate shall, in accordance with mission requirements, provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary … process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/egress to the … DODIN; Document and maintain boundary architectures, understand employed defensive capabilities and available sensor data. Endpoint Security: Perform analysis, to include planning, assessing, and/or providing enterprise strategies for compliance and integration strategies with mid-tier, and boundary capabilities. Cloud Security: Develop strategies to monitor, detect, and prevent more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cybersecurity Analyst

Fulton, Maryland, United States
Leidos
in support of the DoD and COCOMs. The selected candidate shall, in accordance with mission requirements, provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary … process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/egress to the … DODIN; Document and maintain boundary architectures, understand employed defensive capabilities and available sensor data. Endpoint Security: Perform analysis, to include planning, assessing, and/or providing enterprise strategies for compliance and integration strategies with mid-tier, and boundary capabilities. Cloud Security: Develop strategies to monitor, detect, and prevent more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cybersecurity Analyst

Columbia, Maryland, United States
Leidos
in support of the DoD and COCOMs. The selected candidate shall, in accordance with mission requirements, provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary … process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/egress to the … DODIN; Document and maintain boundary architectures, understand employed defensive capabilities and available sensor data. Endpoint Security: Perform analysis, to include planning, assessing, and/or providing enterprise strategies for compliance and integration strategies with mid-tier, and boundary capabilities. Cloud Security: Develop strategies to monitor, detect, and prevent more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cybersecurity Analyst

Ellicott City, Maryland, United States
Leidos
in support of the DoD and COCOMs. The selected candidate shall, in accordance with mission requirements, provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. Primary … process improvements and operational efficiencies across the DODIN. Expert understanding of various technologies and cybersecurity areas of interest including but not limited to: Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/egress to the … DODIN; Document and maintain boundary architectures, understand employed defensive capabilities and available sensor data. Endpoint Security: Perform analysis, to include planning, assessing, and/or providing enterprise strategies for compliance and integration strategies with mid-tier, and boundary capabilities. Cloud Security: Develop strategies to monitor, detect, and prevent more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Incident Response Manager

Buckinghamshire, England, United Kingdom
Proprius Recruitment
Cyber Incident Response Manager Cyber Incident Respond Principal/Manager will own all cyber security events throughout the incident life-cycle, ensuring all reporting and escalation flows are performed in adherence to agreed documentation and SLA’s. You will work side by side with the Cyber Detect Team. Cyber … Detect manage all security alerts undertaking triage analysis and technical incident response. Incident readiness is the first step of the incident life-cycle, preparing for the next incident if of the upmost importance. As Respond Manager you will be expected to deliver a strong incident readiness program. This is … reviews to identify and implement continuous improvement initiatives. Partner with Legal, 2LoD, Major Incident Management, Threat Management, Vulnerability Management, Attack Surface Reduction, Software Engineering, Security Architecture, Platform Support both locally and globally. You will have experience in: Leading the response to complex incidents in a large-scale environments. more »
Posted:

Director of Infrastructure

London Area, United Kingdom
Burns Sheehan
Director of Infrastructure - Real Estate - Network Architecture - £130,000 - £150,000 + bonus A rapidly growing Real Estate organization who are a leading innovator in workspace design are searching for a Director of Infrastructure, to drive the strategy and create a technology roadmap to support the organisation through their … of locations across the UK and the EU. You will be heavily involved from an architectural and design point of view, with network and security architecture at the forefront of everything this organisation does, so it is imperative you have experience with large multi-site technology estates, complex … infrastructure, suggesting bespoke improvements, so stakeholder/vendor management skills is highly sought after. The ideal Director of Infrastructure will have experience with: Network Architecture Technology strategy development Large multi-site technology estates Managing and building technology teams Technology installations Cloud (Azure ideal) Cyber Security B2B Technology sales more »
Posted:

C++ Software Engineer

Cambridgeshire, England, United Kingdom
Hybrid / WFH Options
Oho Group Ltd
Exciting Opportunity for Software Engineer C++ Up to £100,000 Oho has partnered with a Cyber Security subsidiary who is on a mission to design and build the security architecture of the future. They provide their customers with the most comprehensive defence against cybersecurity threats; for every more »
Posted:

Technical Architect

Cardiff, Wales, United Kingdom
Hybrid / WFH Options
Yolk Recruitment Ltd
solutions such as Microsoft 365, Azure, and various cloud services. Creating designs for new cloud services and ensuring continuous availability of infrastructure services. Implementing security architecture and contributing to business cases for changes. Staying updated on cloud platform developments and developing platform roadmaps. What the Technical Architect will … bring to the team Strong expertise in infrastructure, architecture, and cloud services. Minimum 3 years of experience in technical teams covering relevant technologies. Exceptional relationship management and customer service skills. What the Technical Architect will deliver Architectural designs supporting cloud projects. Technology roadmaps and other architectural documentation. Business cases more »
Posted:

VP - Information Security

London Area, United Kingdom
Gresham Hunt
VP - Information Security London - Hybrid Salary: £110,000-120,000 Gresham Hunt are currently partnered with a leading international bank who are seeking a well-rounded Cyber professional, to work alongside the CISO as a senior member of the team and trusted advisor on a range of cyber challenges … and issues. The successful candidate will have: Strong Security governance, risk and compliance (GRC) with knowledge of information security standards such as Cyber Essentials, ISO 27001, NIST. Experience developing and implementing operational policies and standards. Demonstrable experience in a variety of areas such as cloud security, IAM … 3rd party risk, threat assessments and vulnerability management. Strong knowledge of cyber security architecture. Relevant certifications would be beneficial (e.g. TOGAF, SABSA). Ability to interact with and challenge technical teams and the methodologies they are implementing. Experience working with the Financial Services industry. Strong interpersonal skills and experience more »
Posted:

Salesforce Technical Architect

Chessington, England, United Kingdom
Aspect
practices • Outstanding problem-solving abilities, able to develop creative solutions to meet business needs • Excellent discovery and requirements-gathering skills • Familiarity with developing technical architecture for complex Salesforce implementations • Practical experience implementing full-lifecycle enterprise software projects • Strong understanding of cloud concepts, strategy, systems design, implementation and management • Track … designs to stakeholders, defending points of view to a variety of audiences where necessary • Strong application design skills combined with strong data, integration, and security architecture skills • Detail-oriented with the ability to rapidly learn and take advantage of new concepts, business models, and technologies A bit about more »
Posted:

Penetration Tester

Belfast, Northern Ireland, United Kingdom
Harrington Starr
global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. Responsibilities: Thoroughly evaluate proposed and current solutions to ensure compliance with established standards for secure system design. This … of the difference between a vulnerability assessment and a penetration test in the context of assessment scope, objectives, and deliverables. Working knowledge of information security frameworks such as ISO27001, NIST, and CIS. If this sounds like a good opportunity, apply today or get in contact with Andrew.Nitek@harringtonstarr.com more »
Posted:

Information Security Solution Designer

Manchester Area, United Kingdom
Hybrid / WFH Options
Rullion
Job Title: Information Security Solution Designer Contract Type: Contract (Outside IR35 - pending determination) Location: Hybrid role with site in Central Manchester Duration: Until the end of the year Start Date: Immediate Role Overview: As an Information Security Solution Designer, you will be responsible for designing and documenting Information … Security solutions to meet the needs of our client's projects. This role requires strong technical expertise, excellent communication skills, and the ability to work independently as well as part of a team. Key Responsibilities: Engage with Architecture, Project, and Technical teams to gather project requirements. Develop detailed … design documents for technical teams. Lead Information Security design engagements and contribute to Information Security strategy. Ensure coherence and consistency in designs. Support project implementation and address technical queries or issues. Collaborate with business units to deliver technology solutions. Ensure the safety and security of our client more »
Posted:

Principal Cyber Consultant - Comms/Avionics

England, United Kingdom
Evolution
As a Principal Cyber Consultant, you'll be at the forefront of Security delivery, taking charge of one or more work packages from planning to execution. You will ideally come from an engineering background with knowledge of Cyber in Hardware and Systems Engineering. Responsibilities: Take a risk-based approach … systems, completing risk assessments and implementing governance structures. Solve problems by offering potential solutions with limited information, drawing on experience and technical knowledge. Define security solutions across people, processes, and technology, aligning with identified risks through security architecture. Ensure security meets regulatory requirements. You'll define, implement … Help develop viable offerings for customers and contribute to technical product development. Required skills Develop, evaluate, and analyse design constraints, and detailed system and security design as they pertain to the cyber domain. Knowledge of cyber at a hardware level (ideally in comms/radar systems) Experience in breakdown more »
Posted:

Network Architect

England, United Kingdom
Veralto
strategy to implement designs meeting those objectives. Develop and support comprehensive network solutions that meet requirements and integrate into the overall enterprise network and security architecture. Lead global project teams across multiple Veralto Operating Companies (OpCo) to complete projects and execute strategies to meet business needs. Lead and develop … of routing protocols/topologies (BGP preferred). Experience with VPN technologies (IPSec, GRE, DMVPN, DTLS). Well versed in multi-cloud (AWS, Azure) architecture, software defined networking, infrastructure automation, and securing virtual environments. Have a solid understanding of the Linux operating system and of virtualization technology (e.g. KVM more »
Posted:
Security Architecture
10th Percentile
£51,200
25th Percentile
£68,718
Median
£78,273
75th Percentile
£95,000
90th Percentile
£107,500