Contract Security Architect focused on infrastructure security architecture for a financial services organization. Establishing governance and providing strategic guidance on security standards and policies.
Responsibilities
Establish security architecture governance at the infrastructure level
Define and document infrastructure security architecture standards and principles aligned to industry frameworks
Review and provide security sign-off on network and infrastructure designs as part of the transformation programme
Identify security gaps across the current environment (network, server, voice, hosting) and produce a prioritised remediation roadmap
Work with the CISO function to establish technical security policies where none currently exist
Evaluate and rationalise the existing security tooling estate (firewalls, network security tools, monitoring)
Provide guidance on firewall architecture (Palo Alto migration from ASA, segmentation strategy)
Advise on secure cloud architecture and landing zone design for hybrid/multi-cloud environments
Support procurement and vendor selection with security assessment criteria
Requirements
8-10 years of experience in security architecture and infrastructure
Understanding of regulatory requirements applicable to financial services (FCA, PRA, JFSA reporting obligations)
Knowledge of security frameworks: NIST, ISO 27001, CIS Controls
Cloud security: Azure, AWS security architecture, secure landing zones
Vulnerability management, threat modelling, and security risk assessment
Experience defining and implementing security policies for hybrid environments
Advantageous CISSP, CISM, or equivalent professional qualification
Experience with network automation and security orchestration
Familiarity with SIEM, NDR, or network observability tooling
Understanding of trading floor and financial services technology risk.
Benefits
We are committed to building an inclusive workplace and encourage applications from women and other under-represented groups in tech. All qualified candidates are welcome.
Staff Software Engineer on Vulnerability Management team at Salesforce, driving security tooling strategy and automation for detecting and remediating vulnerabilities. Collaborate with cross - functional teams while providing mentorship and delivering high - quality engineering solutions.
Data Center Security Officer responsible for conducting patrols and controlling access. Ensuring security and safety in data center facilities while monitoring surveillance and reporting issues.
Senior Security Auditor managing audit program operations for global security audits at NTT DATA. Focusing on coordinating, executing audits, producing reports and tracking remediation.
Security Architect in Transactions domain ensuring cybersecurity for Payments and Financial markets. Collaborating with teams to enhance compliance and security practices.
Modern Infrastructure and Security Architect at MUFG responsible for directing cyber security initiatives. Collaborating with engineers to enhance security features and tools across the organization.
Senior Federal Technical Program Manager driving execution of federal cloud operations. Facilitating engagements between HPE's CSP and MSP teams while ensuring compliance and operational efficiency.
Cloud Cybersecurity Engineer supporting multi - cloud environments for critical missions in alignment with the U.S. Air Force. Roles include overseeing security authorizations and collaborating with government teams.
Program Security Manager overseeing security and compliance for mission applications in the US. Managing security programs and leading facility operations at Aurora and Philadelphia locations.
Information System Security Manager providing cybersecurity and RMF support for DoD systems and applications. Collaborating with military, government, and contractor personnel to ensure national security and systems compliance.
AI Security Engineer focusing on identifying and mitigating AI vulnerabilities. Involves research, development, and implementation of adversarial machine learning algorithms.