National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Enterprise Hybrid Cloud Platform Security Architect (Advisory) - Senior Manager - National Security

KPMG
Manchester
7 months ago
Applications closed

Related Jobs

View all jobs

Enterprise Security Architect

▷ [Apply Now] Security Architect...

Principal Cyber Security Consultant - Hybrid

Security Architect

Security and Information Security Architect

Security and Information Security Architect

The Role

Enterprises, when starting on their cloud journey, often imagine that they will simplify their environment. The reality for many, however, is that adoption of cloud adds additional technologies and capabilities, drives divergence in operating models, often splits business processes across multiple tech stacks in different landing zones and, overall, adds significant complexity to the enterprise estate. The Hybrid Platform Security Architect is charged with ensuring that business objectives can be realised in a secure and compliant manner in this new more complex world. Security must be seen to be an enabler and not a bottleneck.


Skills, Qualifications and Experience Required

We are seeking vibrant technical leaders who can communicate and manage relationships with senior stakeholders, build compelling transformation journeys and be a key player in their delivery. You will have proven experience in helping clients to shape and deliver technology-enabled change that delivers value, security, agility and efficiency.

 

You have experience of delivering complex large-scale security solutions on cloud or hybrid environments and particularly integration into the wider enterprise You must have a strong knowledge of both traditional security approaches, technologies and op models, as well as a thorough appreciation of the security capabilities of the major cloud platforms (GCP, Azure and AWS). You understand, and can balance, the trade-offs in using “one size fits all” vs “landing zone specific” security solutions. You should be conversant with IdAM solutions, and understand the principles and challenges behind zero trust-based systems. You should have a thorough appreciation of different operating models associated with both legacy and cloud environments, and be able to contribute to op model design and implementation. You should have experience with security testing and security auditing. You have real understanding of IT operating models including DevOps approaches and working practices and how to enhance security through their use. You can manage the security aspects of technical reviews and assessments of cloud strategy, roadmaps, cloud data models, cloud integration and cloud migration tools. Ideally you will hold recognised industry qualifications appropriate to the role and your seniority.

 

You must be a practitioner as well as a theorist. You are passionate about technology, but thrive in multi-disciplinary teams. You must be highly credible in front of both client and your colleagues. You will act as a source of support for customers, throughout the transformation journey, building relationships and helping to ensure the successful implementation of major change.

Key Responsibilities:
As a Senior Manager we will expect you to:

Provide highly credible and informative thought leadership, based on real life experience. Design and build cloud/technology roadmaps, implementation strategies, transformation plans and high-level architecture. Provide impartial assessment of cloud strategy and vendor technology proposals. Provide broad and detailed insight across a range of technology areas including integration and hybrid hosting scenarios. Contribute to the development of vibrant and profitable Cloud and Defence Consulting practices. Work with colleagues to maximise the use of our knowledge and experience. Share knowledge - coaching and advising colleagues. Develop strong client relationships with client stakeholders, to understand their business problems, and identify commercial opportunities for KPMG.


Base Location

The role may be based at any of our UK offices with an expectation of being on-site for a couple of days a week when not on client site. Note, however, that client constraints may result in a requirement to be on site for a significant proportion of the week (depending on project). Significant travel within the UK may be required.

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs Employer Hotlist 2025: 50 UK Companies Actively Hiring Right Now

Bookmark this guide—refreshed every quarter—so you always know who’s really expanding their cyber security teams. Ransomware payouts broke records in 2024, the UK’s new Cyber Security Bill imposed mandatory breach disclosure, and the National Cyber Force’s move to Samlesbury has super‑charged the northern skills market. Result? Demand for security architects, SOC analysts, penetration testers, cloud‑security engineers, threat hunters & GRC specialists is at an all‑time high in 2025. Below you’ll find 50 organisations that have posted UK‑based cyber security vacancies or announced head‑count growth during the past eight weeks. They’re organised into five quick‑scan categories. For every employer you’ll see: Main UK hub Example live or recent vacancy Why it’s worth a look (tech stack, culture, mission) Search any company on CyberSecurityJobs.tech to view current ads, or set a free alert so fresh openings land straight in your inbox.

Return-to-Work Pathways: Relaunch Your Cyber Security Career with Returnships, Flexible & Hybrid Roles

Re-entering the workforce after a career break can feel especially challenging in a fast-moving field like cyber security. Whether you stepped away for parenting, caregiving or another life chapter, the UK’s cyber security sector now offers a range of return-to-work pathways—from structured returnships to flexible and hybrid roles. These programmes value the transferable skills and resilience you’ve developed during your break, pairing you with mentorship, upskilling opportunities and supportive networks to ease your transition back into cyber security. In this article, tailored for parents and carers, you’ll discover how to: Understand the growing demand for cyber security talent in the UK Translate your organisational, communication and problem-solving skills into cyber security roles Tackle common re-entry challenges with practical solutions Refresh your technical knowledge through targeted learning Access returnship and re-entry programmes specific to cyber security Find roles that accommodate family commitments—whether hybrid, flexible or full-time Balance your career relaunch with caring responsibilities Master applications, interviews and networking in cyber security Draw inspiration from real returner success stories Whether you aim to return as an analyst, penetration tester, security engineer or compliance specialist, this guide will equip you with the steps and resources to reignite your cyber security career.

LinkedIn Profile Checklist for Cybersecurity Jobs: 10 Tweaks to Supercharge Recruiter Engagement

In the ever-evolving realm of cybersecurity, having a LinkedIn profile that reflects both your technical prowess and threat-hunting acumen is vital. Organisations are on the lookout for professionals skilled in penetration testing, incident response, security architecture and compliance. With hiring managers scanning dozens of profiles daily, your profile needs to not just rank in searches but convey your expertise in safeguarding digital assets. This step-by-step LinkedIn for cybersecurity jobs checklist offers ten practical tweaks to supercharge recruiter engagement. Whether you’re an aspiring security analyst, a seasoned penetration tester or a chief information security officer aiming for board-level roles, these actionable optimisations will sharpen your LinkedIn presence and position you as a top infosec candidate.