National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Cyber Security Architect

Tata Consultancy Services
Crawley
1 week ago
Applications closed

Related Jobs

View all jobs

Cyber Security Architect

Security Architect

Cyber Security Architect

Cyber Security Architect

Cloud Security Architect

Cyber Security Architect (9 month FTC)

If you need support in completing the application or if you require a different format of this document, please get in touch withator callTCS London Office numberwith the subject line: “Application Support Request”.


Role:Cyber Security Architect

Job Type:Permanent

Location:Crawley, UK


Are you looking to utilize your skills inCyber Security?


Make a meaningful impact as aCyber Security Architect.


Careers at TCS: It means more

TCS is a purpose-led transformation company, built on belief. We do not just help businesses to transform through technology. We support them in making a meaningful difference to the people and communities they serve - our clients include some of the biggest brands in the UK and worldwide. For you, it means more to make an impact that matters, through challenging projects which demand ambitious innovation and thought leadership.


  • Gain exposure to innovative technology.
  • Work with customers and identify opportunities to support their strategy and improve various processes across functions.
  • Gain access to endless learning opportunities.


The Role

As aCyber Security Architect, you will be responsible to lead the development of the security requirements and controls within the product(s), supporting systems and processes to deliver security capability for product launch and continual operation. This role blends technically focused work with controls and threat mapping to objectives. Working with development teams and other architects to advise on building applications with privacy and security by design, you will lead the security architectural review of all systems that make up applications as they are built and integrated.


Key responsibilities:

  • Leading projects involving end-to-end cyber security solutions, including architecture and design, and process creation to vendor and best practice.
  • Provide advice and guidance around cyber security detection.
  • Provide response solutions across architecture, and organisational and governance teams.
  • Monitor adherence to policy and raise exceptions through an agreed policy with the correct sign off.
  • Identify, assess, and provide remediation plans for Information Security Risks.
  • Ensure Information Risks are raised and treated according to the risk management process, including raising these to senior management for acceptance, where applicable.
  • Collaborate with other members of the organisation to identify appropriate and effective information security controls.
  • Engage in projects to ensure that Information Security controls are built into an implementation or change.
  • Engage in risk assessments and gap analysis exercises, while working collaboratively with various business units to implement the required remediation.
  • Perform information control reviews to include system development standards, operating procedures, system security, programming controls, communication controls, backup and disaster recovery, and system maintenance.
  • Perform Due Diligence reviews (Vendor Assessment) on new and existing third parties, highlighting any risks to business areas.
  • Define security testing (pen-test scoping) requirements in projects and BAU services.
  • Interpret the results and put them into context while feeding back to key stakeholders and the business.
  • Help define and manage key risk indicators.
  • Provide commentary to key stakeholders to ensure risk levels are fully understood.
  • Focus on building relationships and growing business with the customer, identifying new opportunities for the business.


Your Profile

Essential skills/knowledge/experience:

  • Skilled in architecture design for systems and the underlying security infrastructure (i.e. firewalls).
  • Holder a recognised, current security certificate (e.g., CISSP/CISM).
  • Experienced in managing operational security activities.
  • Solid understanding of regulatory and compliance requirements, including security frameworks such as NISTCSF, ISO 27001 and GDPR.
  • Demonstrable experience with security technologies and architectures.
  • Previous experience advising software development teams and agile delivery methods.
  • Working experience with MS Azure cloud security for complex environments.
  • Good understanding of data architecture(s), web security, zero trust models and low latency applications.
  • Good communication and negotiation skills.
  • A team player.
  • Result oriented.
  • Possess good problem-solving skills, planning and organizing skills.



Desirable skills/knowledge/experience:

  • Experience of designing security architecture within the retail sector.


Rewards & Benefits

TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care, life assurance, laptop, phone, access to extensive training resources and discounts within the larger Tata network.

We offer health & wellness initiatives and sports events; we are the proud sponsor of the London Marathon.


Diversity, Inclusion and Wellbeing

Tata Consultancy Services UK&I is committed to meeting the accessibility needs of all individuals in accordance with the UK Equality Act 2010 and the UK Human Rights Act 1998.

We welcome and embrace diversity in race, nationality, ethnicity, disability, neurodiversity, gender identity, age, physical ability, gender reassignment, sexual orientation. We are a disability inclusive employer and encourage disabled people to apply for this role.

As a Disability Confident Employer, we offer an interview to applicants with disabilities or long-term conditions who meet the minimum criteria for the role. Please email us at if you would like to opt in.

If you are an applicant who needs any adjustments to the application process or interview, please contact usatwith the subject line: “Adjustment Request” or callTCS London Office /to request an adjustment. We welcome requests prior to you completing the application and at any stage of the recruitment process.


Beware of Fraudulent offers

This is to notify you that TCS does not ask for any sort of payment or security deposit from candidates at any stage of the recruitment process. The firm never sends out job offers from free internet email services like Gmail, Yahoo Mail, and so on. TCS has not authorised any third-party company to collect money on their behalf. As a vigilant job seeker, beware of fraudulent recruitment activity and protect your interests! You can write to to report any fraudulent activity.


Due to the high volume of applications, we will be unable to contact each applicant individually on the status of their application. If you have not received a direct response within 30 days, then it should be deemed unsuccessful on this occasion.


Join us and do more of what matters. Apply online now.

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.