Cyber Security Architect

Tata Consultancy Services
Crawley
8 months ago
Applications closed

Related Jobs

View all jobs

Cyber Security Architect

Senior Cyber Security Architect

Penetration Tester - Nato Cleared

Cyber Security Resilience Manager

Cyber Security Operations Consultant

Cyber Security Consultant | Security Assurance SME

If you need support in completing the application or if you require a different format of this document, please get in touch withator callTCS London Office numberwith the subject line: “Application Support Request”.


Role:Cyber Security Architect

Job Type:Permanent

Location:Crawley, UK


Are you looking to utilize your skills inCyber Security?


Make a meaningful impact as aCyber Security Architect.


Careers at TCS: It means more

TCS is a purpose-led transformation company, built on belief. We do not just help businesses to transform through technology. We support them in making a meaningful difference to the people and communities they serve - our clients include some of the biggest brands in the UK and worldwide. For you, it means more to make an impact that matters, through challenging projects which demand ambitious innovation and thought leadership.


  • Gain exposure to innovative technology.
  • Work with customers and identify opportunities to support their strategy and improve various processes across functions.
  • Gain access to endless learning opportunities.


The Role

As aCyber Security Architect, you will be responsible to lead the development of the security requirements and controls within the product(s), supporting systems and processes to deliver security capability for product launch and continual operation. This role blends technically focused work with controls and threat mapping to objectives. Working with development teams and other architects to advise on building applications with privacy and security by design, you will lead the security architectural review of all systems that make up applications as they are built and integrated.


Key responsibilities:

  • Leading projects involving end-to-end cyber security solutions, including architecture and design, and process creation to vendor and best practice.
  • Provide advice and guidance around cyber security detection.
  • Provide response solutions across architecture, and organisational and governance teams.
  • Monitor adherence to policy and raise exceptions through an agreed policy with the correct sign off.
  • Identify, assess, and provide remediation plans for Information Security Risks.
  • Ensure Information Risks are raised and treated according to the risk management process, including raising these to senior management for acceptance, where applicable.
  • Collaborate with other members of the organisation to identify appropriate and effective information security controls.
  • Engage in projects to ensure that Information Security controls are built into an implementation or change.
  • Engage in risk assessments and gap analysis exercises, while working collaboratively with various business units to implement the required remediation.
  • Perform information control reviews to include system development standards, operating procedures, system security, programming controls, communication controls, backup and disaster recovery, and system maintenance.
  • Perform Due Diligence reviews (Vendor Assessment) on new and existing third parties, highlighting any risks to business areas.
  • Define security testing (pen-test scoping) requirements in projects and BAU services.
  • Interpret the results and put them into context while feeding back to key stakeholders and the business.
  • Help define and manage key risk indicators.
  • Provide commentary to key stakeholders to ensure risk levels are fully understood.
  • Focus on building relationships and growing business with the customer, identifying new opportunities for the business.


Your Profile

Essential skills/knowledge/experience:

  • Skilled in architecture design for systems and the underlying security infrastructure (i.e. firewalls).
  • Holder a recognised, current security certificate (e.g., CISSP/CISM).
  • Experienced in managing operational security activities.
  • Solid understanding of regulatory and compliance requirements, including security frameworks such as NISTCSF, ISO 27001 and GDPR.
  • Demonstrable experience with security technologies and architectures.
  • Previous experience advising software development teams and agile delivery methods.
  • Working experience with MS Azure cloud security for complex environments.
  • Good understanding of data architecture(s), web security, zero trust models and low latency applications.
  • Good communication and negotiation skills.
  • A team player.
  • Result oriented.
  • Possess good problem-solving skills, planning and organizing skills.



Desirable skills/knowledge/experience:

  • Experience of designing security architecture within the retail sector.


Rewards & Benefits

TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care, life assurance, laptop, phone, access to extensive training resources and discounts within the larger Tata network.

We offer health & wellness initiatives and sports events; we are the proud sponsor of the London Marathon.


Diversity, Inclusion and Wellbeing

Tata Consultancy Services UK&I is committed to meeting the accessibility needs of all individuals in accordance with the UK Equality Act 2010 and the UK Human Rights Act 1998.

We welcome and embrace diversity in race, nationality, ethnicity, disability, neurodiversity, gender identity, age, physical ability, gender reassignment, sexual orientation. We are a disability inclusive employer and encourage disabled people to apply for this role.

As a Disability Confident Employer, we offer an interview to applicants with disabilities or long-term conditions who meet the minimum criteria for the role. Please email us at if you would like to opt in.

If you are an applicant who needs any adjustments to the application process or interview, please contact usatwith the subject line: “Adjustment Request” or callTCS London Office /to request an adjustment. We welcome requests prior to you completing the application and at any stage of the recruitment process.


Beware of Fraudulent offers

This is to notify you that TCS does not ask for any sort of payment or security deposit from candidates at any stage of the recruitment process. The firm never sends out job offers from free internet email services like Gmail, Yahoo Mail, and so on. TCS has not authorised any third-party company to collect money on their behalf. As a vigilant job seeker, beware of fraudulent recruitment activity and protect your interests! You can write to to report any fraudulent activity.


Due to the high volume of applications, we will be unable to contact each applicant individually on the status of their application. If you have not received a direct response within 30 days, then it should be deemed unsuccessful on this occasion.


Join us and do more of what matters. Apply online now.

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.