Cybersecurity and Cloud Architect

ARM
Cambridge
1 month ago
Create job alert

The Cybersecurity and Cloud Architect in the Enterprise Security (ES) team is a key member of the security leadership team, reporting directly to the Chief Information Security Officer (CISO). This strategic role is responsible for defining the architecture requirements of our cybersecurity solutions and ensure they are being adhered to. Further, they will be accountable for defining and leading the company's cloud security posture, ensuring that security solutions are aligned with business, technology, and threat drivers. Responsibilities: Responsible leader for the cloud security strategy across a large and complex multi-cloud environment, ensuring the right people, process and technologies are in place. Create and lead technical security strategy plans and roadmaps for all environments, including cloud and on-premise infrastructure. Develop and maintain security architecture artefacts, including models, templates, standards, and procedures. Establish baseline security configuration standards for operating systems, network, infrastructure etc. Understanding of AI and Automation across Enterprise Security to deliver improved efficiency and security outcomes. Perform security reviews, identify gaps, and develop a risk management plan. Track changes in the digital business and threat environments to ensure they are addressed in security strategy plans and architecture artefacts. Validate IT infrastructure and reference architectures for security best practices and recommend changes to enhance security and reduce risks. Conduct threat modelling of services and applications. Perform technical risk assessments on business initiatives and requirements, balancing business enablement and security risk. Review network segmentation to ensure the least privilege for network access. Define and document how new systems or interfaces impact the security posture of the current environment. Evaluate Statements of Work (SOWs) to ensure adequate security protections are in place and assess providers' audit reports for security-related deficiencies. Required skills and experience: Experience in developing and maintaining security architecture processes and strategies for cyber security solutions. Experience with cloud and on-premise infrastructure security. Ability to perform security reviews, identify gaps, and develop risk management plans. Experience in threat modelling and secure coding practices. Superb communication, collaboration and documentation skills. Knowledge of privacy regulations and data flow documentation Nice to Have Skills and Experience: Experience within Technology or Engineering sector In return: Opportunity to work in a dynamic and collaborative environment. Access to the latest security technologies and trends. Professional development and growth opportunities. Competitive salary and benefits package LI-JW Accommodations at Arm At Arm, we want our people to Do Great Things . If you need support or an accommodation to Be Your Brilliant Self during the recruitment process, please email accommodationsarm.com . To note, by sending us the requested information, you consent to its use by Arm to arrange for appropriate accommodations. All accommodation requests will be treated with confidentiality, and information concerning these requests will only be disclosed as necessary to provide the accommodation. Although this is not an exhaustive list, examples of support include breaks between interviews, having documents read aloud or office accessibility. Please email us about anything we can do to accommodate you during the recruitment process. Hybrid Working at Arm Arm’s approach to hybrid working is designed to create a working environment that supports both high performance and personal wellbeing. We believe in bringing people together face to face to enable us to work at pace, whilst recognizing the value of flexibility. Within that framework, we empower groups/teams to determine their own hybrid working patterns, depending on the work and the team’s needs. Details of what this means for each role will be shared upon application. In some cases, the flexibility we can offer is limited by local legal, regulatory, tax, or other considerations, and where this is the case, we will collaborate with you to find the best solution. Please talk to us to find out more about what this could look like for you. Equal Opportunities at Arm Arm is an equal opportunity employer, committed to providing an environment of mutual respect where equal opportunities are available to all applicants and colleagues. We are a diverse organization of dedicated and innovative individuals, and don’t discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.

Related Jobs

View all jobs

Cybersecurity and Cloud Architect

Cloud Security Engineer

Cloud Security Architect

Security Architect

Senior Security Engineer

Vehicle Security Architect

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Job-Hunting During Economic Uncertainty: Cyber Security Edition

The cybe rsecurity sector sits at the forefront of today’s digital landscape, defending businesses and governments alike from increasingly sophisticated threats. From incident response and network security to cloud protections and zero-trust architectures, cyber security professionals tackle an ever-evolving array of challenges. Yet, even this mission-critical field is not immune to economic turbulence. When broader financial markets experience uncertainty—whether through global recessions, regional downturns, or unexpected macro events—the hiring climate can shift, making roles more selective and budgets tighter. For job seekers in cyber security, this can be disconcerting. You might discover that once-abundant vacancies have become scarce, competition for the remaining positions is fiercer, or company priorities pivot away from large-scale expansions toward essential, cost-justified security projects. At the same time, data breaches and cyberattacks don’t pause during economic slowdowns—if anything, they may escalate as bad actors exploit organizational vulnerabilities. This paradox means that while the market feels tough, demand for cyber security expertise remains robust. In this article, we’ll look at: Why economic uncertainty affects cyber security hiring trends. Strategies for staying competitive, even if the number of open roles shrinks. Methods to highlight your skills, adapt to shifting priorities, and network effectively. Approaches for preserving mental well-being during prolonged searches or uncertain feedback loops. How www.cybersecurityjobs.tech can help you find the ideal security-focused role. By proactively sharpening your skill set, tailoring your professional profile, and engaging with a focused community, you can secure a rewarding cyber security job—even when the broader market feels volatile.

How to Achieve Work-Life Balance in Cyber Security Jobs: Realistic Strategies and Mental Health Tips

Cyber security is one of today’s most vital and rapidly expanding sectors. As data breaches, ransomware, and other cyber threats continue to evolve, the demand for skilled professionals is surging across industries—from finance and healthcare to government and e-commerce. Whether you’re a penetration tester, security analyst, or threat intelligence expert, you play a key role in safeguarding digital infrastructure and sensitive information. This high-stakes environment, however, often comes with intense pressure. Long hours, constant vigilance, and an ever-changing threat landscape can make it challenging to find time for personal well-being. Many cyber security specialists report difficulty striking a sustainable work-life balance, unsure if it’s even possible in a field that never truly sleeps. Yet, as concerns about mental health and burnout become more pressing, professionals and employers alike are seeking better ways to combine career advancement with a fulfilling personal life. In this comprehensive article, we’ll explore how to achieve a work-life balance in cyber security. You’ll discover strategies for managing 24/7 threat alerts, the importance of realistic expectations, ways to maintain mental health in high-intensity roles, and tips for setting boundaries without compromising your professional growth. Whether you’re new to this dynamic arena or already an established specialist, these insights can help you thrive personally and professionally in the fast-paced world of cyber security.

Transitioning from Academia to the Cyber Security Industry: How Researchers Can Harness Their Skills to Protect Commercial Environments

Cyber security has become a mission-critical field in an era where data breaches, ransomware attacks, and sophisticated hacking techniques threaten businesses and public institutions alike. As digital transformation touches nearly every facet of modern life, the need for highly skilled individuals capable of defending systems and networks continues to grow. For PhDs and academic researchers with expertise in areas like cryptography, network security, or threat intelligence, this presents an exciting opportunity to deploy your analytical prowess in a high-impact, fast-paced commercial setting. In this guide we’ll explore how academics can successfully pivot from the research lab to the cyber security industry. Learn how to apply rigorous, theory-driven approaches to real-world challenges, from designing secure software architectures to neutralising advanced persistent threats. By embracing the industry’s urgency and end-to-end mindset, you can transform your scholarly insights into robust, market-facing security solutions that protect companies and users on a global scale.