National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Cyber Security Architect

Tata Consultancy Services
Bristol
2 days ago
Create job alert

If you need support in completing the application or if you require a different format of this document, please get in touch withator callTCS London Office numberwith the subject line: “Application Support Request”.


Role:Cyber Security Architect

Job Type:Permanent

Location:Crawley, UK


Are you looking to utilize your skills inCyber Security?


Make a meaningful impact as aCyber Security Architect.


Careers at TCS: It means more

TCS is a purpose-led transformation company, built on belief. We do not just help businesses to transform through technology. We support them in making a meaningful difference to the people and communities they serve - our clients include some of the biggest brands in the UK and worldwide. For you, it means more to make an impact that matters, through challenging projects which demand ambitious innovation and thought leadership.


  • Gain exposure to innovative technology.
  • Work with customers and identify opportunities to support their strategy and improve various processes across functions.
  • Gain access to endless learning opportunities.


The Role

As aCyber Security Architect, you will be responsible to lead the development of the security requirements and controls within the product(s), supporting systems and processes to deliver security capability for product launch and continual operation. This role blends technically focused work with controls and threat mapping to objectives. Working with development teams and other architects to advise on building applications with privacy and security by design, you will lead the security architectural review of all systems that make up applications as they are built and integrated.


Key responsibilities:

  • Leading projects involving end-to-end cyber security solutions, including architecture and design, and process creation to vendor and best practice.
  • Provide advice and guidance around cyber security detection.
  • Provide response solutions across architecture, and organisational and governance teams.
  • Monitor adherence to policy and raise exceptions through an agreed policy with the correct sign off.
  • Identify, assess, and provide remediation plans for Information Security Risks.
  • Ensure Information Risks are raised and treated according to the risk management process, including raising these to senior management for acceptance, where applicable.
  • Collaborate with other members of the organisation to identify appropriate and effective information security controls.
  • Engage in projects to ensure that Information Security controls are built into an implementation or change.
  • Engage in risk assessments and gap analysis exercises, while working collaboratively with various business units to implement the required remediation.
  • Perform information control reviews to include system development standards, operating procedures, system security, programming controls, communication controls, backup and disaster recovery, and system maintenance.
  • Perform Due Diligence reviews (Vendor Assessment) on new and existing third parties, highlighting any risks to business areas.
  • Define security testing (pen-test scoping) requirements in projects and BAU services.
  • Interpret the results and put them into context while feeding back to key stakeholders and the business.
  • Help define and manage key risk indicators.
  • Provide commentary to key stakeholders to ensure risk levels are fully understood.
  • Focus on building relationships and growing business with the customer, identifying new opportunities for the business.


Your Profile

Essential skills/knowledge/experience:

  • Skilled in architecture design for systems and the underlying security infrastructure (i.e. firewalls).
  • Holder a recognised, current security certificate (e.g., CISSP/CISM).
  • Experienced in managing operational security activities.
  • Solid understanding of regulatory and compliance requirements, including security frameworks such as NISTCSF, ISO 27001 and GDPR.
  • Demonstrable experience with security technologies and architectures.
  • Previous experience advising software development teams and agile delivery methods.
  • Working experience with MS Azure cloud security for complex environments.
  • Good understanding of data architecture(s), web security, zero trust models and low latency applications.
  • Good communication and negotiation skills.
  • A team player.
  • Result oriented.
  • Possess good problem-solving skills, planning and organizing skills.



Desirable skills/knowledge/experience:

  • Experience of designing security architecture within the retail sector.


Rewards & Benefits

TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care, life assurance, laptop, phone, access to extensive training resources and discounts within the larger Tata network.

We offer health & wellness initiatives and sports events; we are the proud sponsor of the London Marathon.


Diversity, Inclusion and Wellbeing

Tata Consultancy Services UK&I is committed to meeting the accessibility needs of all individuals in accordance with the UK Equality Act 2010 and the UK Human Rights Act 1998.

We welcome and embrace diversity in race, nationality, ethnicity, disability, neurodiversity, gender identity, age, physical ability, gender reassignment, sexual orientation. We are a disability inclusive employer and encourage disabled people to apply for this role.

As a Disability Confident Employer, we offer an interview to applicants with disabilities or long-term conditions who meet the minimum criteria for the role. Please email us at if you would like to opt in.

If you are an applicant who needs any adjustments to the application process or interview, please contact usatwith the subject line: “Adjustment Request” or callTCS London Office /to request an adjustment. We welcome requests prior to you completing the application and at any stage of the recruitment process.


Beware of Fraudulent offers

This is to notify you that TCS does not ask for any sort of payment or security deposit from candidates at any stage of the recruitment process. The firm never sends out job offers from free internet email services like Gmail, Yahoo Mail, and so on. TCS has not authorised any third-party company to collect money on their behalf. As a vigilant job seeker, beware of fraudulent recruitment activity and protect your interests! You can write to to report any fraudulent activity.


Due to the high volume of applications, we will be unable to contact each applicant individually on the status of their application. If you have not received a direct response within 30 days, then it should be deemed unsuccessful on this occasion.


Join us and do more of what matters. Apply online now.

Related Jobs

View all jobs

Cyber Security Architect

Enterprise Security Architect

Enterprise Security Architect

Enterprise Security Architect

Enterprise Security Architect

Cyber Security Architect

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.

Cyber Security Jobs Employer Hotlist 2025: 50 UK Companies Actively Hiring Right Now

Bookmark this guide—refreshed every quarter—so you always know who’s really expanding their cyber security teams. Ransomware payouts broke records in 2024, the UK’s new Cyber Security Bill imposed mandatory breach disclosure, and the National Cyber Force’s move to Samlesbury has super‑charged the northern skills market. Result? Demand for security architects, SOC analysts, penetration testers, cloud‑security engineers, threat hunters & GRC specialists is at an all‑time high in 2025. Below you’ll find 50 organisations that have posted UK‑based cyber security vacancies or announced head‑count growth during the past eight weeks. They’re organised into five quick‑scan categories. For every employer you’ll see: Main UK hub Example live or recent vacancy Why it’s worth a look (tech stack, culture, mission) Search any company on CyberSecurityJobs.tech to view current ads, or set a free alert so fresh openings land straight in your inbox.

Return-to-Work Pathways: Relaunch Your Cyber Security Career with Returnships, Flexible & Hybrid Roles

Re-entering the workforce after a career break can feel especially challenging in a fast-moving field like cyber security. Whether you stepped away for parenting, caregiving or another life chapter, the UK’s cyber security sector now offers a range of return-to-work pathways—from structured returnships to flexible and hybrid roles. These programmes value the transferable skills and resilience you’ve developed during your break, pairing you with mentorship, upskilling opportunities and supportive networks to ease your transition back into cyber security. In this article, tailored for parents and carers, you’ll discover how to: Understand the growing demand for cyber security talent in the UK Translate your organisational, communication and problem-solving skills into cyber security roles Tackle common re-entry challenges with practical solutions Refresh your technical knowledge through targeted learning Access returnship and re-entry programmes specific to cyber security Find roles that accommodate family commitments—whether hybrid, flexible or full-time Balance your career relaunch with caring responsibilities Master applications, interviews and networking in cyber security Draw inspiration from real returner success stories Whether you aim to return as an analyst, penetration tester, security engineer or compliance specialist, this guide will equip you with the steps and resources to reignite your cyber security career.