Cyber Security Architect (9 month FTC)

TN United Kingdom
Cambridge
3 weeks ago
Applications closed

Related Jobs

View all jobs

Principal Security Architect

Senior Security Architect

Director – Security Architecture

Director – Security Architecture

Director – Security Architecture

Director – Security Architecture

Social network you want to login/join with:

Cyber Security Architect (9 month FTC), Cambridge

Client:Abcam

Location:Cambridge, United Kingdom

Job Category:Other

EU work permit required:Yes

Job Reference:073769155a37

Job Views:28

Posted:30.03.2025

Expiry Date:14.05.2025

Job Description:

Company Description

For over 20 years, Abcam has been providing tools the scientific community needs to enable faster breakthroughs in critical areas like cancer, neurological disorders, infectious diseases, and metabolic disorders.

We believe that to continue making progress, we need to work together in new ways. We need your own unique perspective as well as this of our people to make an always greater impact on the world. This community needs people like you: dedicated, agile and above all audacious so we can truly bring progress forward.

Job Description

As aCyber Security Architect, you would join the Abcam Digital Cyber Security team. The Global Cyber Security function has overall responsibility for security operations, risk and assurance as well as strategic oversight and management of the Abcam information security management system.

The security architect's role will work in close relationship with Abcam Architecture Team but also inter-departmentally and internationally to provide timely, secure, resilient and cost-efficient solutions that meet the business need and elevate Abcam’s security posture.

The security architect is expected to possess advanced analytical skills, along with knowledge to define and support architecture, engineering and design principles. You would be highly technical and proficient in cybersecurity workings of cloud systems (IaaS, PaaS and IaaS) as well as traditional technology stacks. Demonstrated experience with AWS and Microsoft Azure is a requirement.

A successful candidate in this role will be demonstrating strong critical thinking skills needed to manage complex systems and applications, be adept at working with business units and have good listening and communication skills.

What you are to be responsible for:

  1. Own the cyber security architecture stream of work
  2. Architect, design and implement scalable, resilient solutions in public, private and hybrid clouds
  3. Support enterprise and solutions architects by clearly defining and documenting security controls requirements
  4. Work with Danaher corporate security function to define, document, socialize and continuously improve Abcam’s security patterns and standards
  5. Recommend and advise on strategies and best practices for cybersecurity and a flexible architecture
  6. Integrate and automate secure continuous integration/continuous delivery build configurations for development pipelines
  7. Assist with strategy, implementation and recovery point/time objective for business continuity and disaster recovery
  8. Work in tandem with team leads and subject matter experts to validate configurations are aligned, adopted and implemented
  9. Own the cyber security element of the Architecture review board (ARB) process, attend ARB meetings as well as Change Approval board meetings
  10. Work closely with the business and attend project and implementation meetings and advise on secure application and infrastructure configurations in a structured and documented manner

Skills

  1. In-depth and practical understanding of cyber security best practices, standards
  2. Ability to influence technical team and business units and collaborate to reduce attack surface
  3. Capacity to comprehend complex technical infrastructure, managed services and third-party dependencies
  4. Applicable knowledge about GDPR, PCI, SOX, CCPA, ISO 27001, NIST 800-53
  5. Proven use with zero trust network access, encryption, perimeter security controls, OS security controls, data protection, vulnerability management, API security, Identity, SIEM, EDR, SBoM security, Cloud native security controls
  6. Functional use with cloud posture management, cloud-native and traditional security controls
  7. Working knowledge of common threats including but not limited to malware, phishing, ransomware, DDOS, web & mobile application security risks
  8. Working knowledge with patching and vulnerability management practices
  9. Excellent written and oral communication skills across varying levels of the organization

Qualifications

Experience and Qualifications

  1. Experience in a similar role is highly desirable
  2. Bachelor’s degree in cyber security, computer science, engineering or related field
  3. Experience with TOGAF or SABSA
  4. Preferably one or more certifications such as GCSA, CCSP, CCSK or CISSP, or one offered by AWS or Microsoft.

Additional Information

We know that when it comes to benefits, no one size fits all. Flexibility and choice matter which is why in addition to market competitive salaries, we offer you a flexible benefits package which is tailored to your unique needs and support your financial, physical and emotional wellbeing. This includes 18 weeks fully paid maternity leave, 6 weeks fully paid paternity leave as well as highly flexible working and much more. Besides, your development will be integral to your experience here. You will grow alongside other talented minds, in ways you may often find unexpected.

When people come together, incredible things happen. Here you’ll work in a safe environment where you can be who you truly are. We’ll champion and celebrate your uniqueness throughout your journey with us. This is how we excel at partnering with the scientific community no matter the challenge, ultimately helping solve the world’s most critical diseases. Find out more about Diversity & Inclusion at Abcam.

#J-18808-Ljbffr

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.