Information Security Architect United Kingdom - Remote

Tbwa Chiat/Day Inc
united kingdom
1 month ago
Applications closed

Related Jobs

View all jobs

Senior Software Security Architect

Security Architect Lead

Director of IT and Technology

M365 Security Design Engineer

Network Architect

Cloud Security Engineer

Rithum is the world’s most trusted commerce network, accelerating how brands, suppliers, and retailers work together to deliver seamless e-commerce experiences. We provide an unmatched platform for brands and retailers, enabling them to accelerate growth, optimise operations across channels, scale product offerings and enhance margins.

Today, more than 40,000 companies trust Rithum to grow their business across hundreds of channels, representing over $50 billion in annual GMV. Using our commerce, marketing, and delivery solutions, our customers create optimised consumer shopping journeys from beginning to end.

Overview

As a Security Architect on our Information Security team, you play a critical role contributing to the team’s success through your technical leadership and expertise. In this critical role, you are responsible for overseeing the development and implementation of high-impact security solutions and strategies, ensuring that our organization stays ahead of the ever-evolving cybersecurity landscape. This role demands a strong foundation in software and cloud security, with a balance of technical expertise and communication skills. You apply your experience and knowledge to ensure that software development practices and application infrastructure are secure, highly available, and resilient to attack. You are relied upon to provide guidance and technical leadership to various teams within the organization. You communicate with stakeholders at all levels of the organization, from technical staff to senior management. This requires the ability to translate technical concepts into clear and concise language that non-technical stakeholders can understand. You are also responsible for leading the architectural design and implementation of new security initiatives and establishing meaningful KPIs for team performance, with a mindset of continuous improvement. As a subject matter expert on security standards, requirements, and reference architectures, you create and update these as necessary to ensure the organization remains secure and compliant.

Responsibilities

  • Ensure cloud-based infrastructure is secure, highly available, and resilient to attack.
  • Design, implement, document, and promote application security solutions.
  • Lead the architectural design review and implementation of new security initiatives.
  • Provide support in the areas of secure coding practices, threat modeling, security architecture, and vulnerability assessment.
  • Develop and maintain security standards, requirements, and reference architectures to ensure organizational security and compliance.
  • Evaluate and promote security solutions and tools.
  • Provide security training, documentation, and advice to technology and non-technology staff.
  • Establish and track meaningful KPIs and SLAs to drive continuous improvement.
  • Operate and evaluate application and environment scanning, testing, and review tools.
  • Communicate effectively with stakeholders at all levels, translating technical concepts into clear language for non-technical audiences.
  • Work effectively with cross-functional teams to implement technical and administrative controls for secure software development including Security Champions and Incident Responders.

Qualifications

Minimum Qualifications

  • 5+ years experience working in a security architecture related role, with an emphasis on AWS security architecture.
  • Familiarity with application security tools such as SAST, DAST, SCA and S-SDLC concepts.
  • Familiarity with application security and development processes and technologies including authentication, encryption, public key infrastructure, and secure communication protocols.
  • Proficiency in data structures, algorithms and object-oriented design.
  • Business/technical English proficiency.

Preferred Qualifications

  • Bachelor's degree in computer science, Management Information Systems, or a related field. Advanced degrees or certifications in technical security or compliance-related areas such as GIAC, CCSK, CISSP or CSSLP are a strong plus.
  • Excellent written and oral communication and presentation skills, effectively communicating complex issues to technical and business audiences.
  • Strong analytical and problem-solving skills, with the ability to navigate complex environments.
  • Detail-oriented and organized, with the ability to manage multiple tasks simultaneously and work with minimal supervision.

Travel Required

Up to 10%.

Other Duties

Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.

What it’s like to work at Rithum

When you join Rithum, you can expect to work with smart risk-takers, courageous collaborators, and curious minds.

As part of the Rithum team, you are valued, supported, and included. Guided by a transparent culture and accessible, approachable leadership, we offer career opportunities aligned to your ambitions and talents. To ensure work and life balance works for you, we also offer an array of resources to support you and your families, including comprehensive benefits and wellness plans.

At Rithum you will:

  • Partner with the leading brands and retailers.
  • Connect with passionate professionals who will help support your goals.
  • Participate in an inclusive, welcoming work atmosphere.
  • Achieve work-life balance through remote-first working conditions, generous time off, and wellness days.
  • Receive industry-competitive compensation and total rewards benefits.
  • Enhanced Private Medical Insurance and a Health Cash Back Plan.
  • Life insurance & disability benefits.
  • Pension plan with 4% Company match.
  • Competitive time off package with 25 Days of PTO, 8 Company-Paid Holidays, 2 Wellness days and 1 Paid Volunteer Day.
  • Flexibility to choose where you work - at home, in the London office, or both!
  • Access to tools to support your wellbeing such as the Calm App and an Employee Assistance Program.
  • Professional development stipend and learning and development offerings to help you build the skills and connections you need to move forward in your career.
  • Charitable contribution match per team member.

Rithum is an equal opportunity employer. We celebrate diversity and are committed to providing an environment of mutual respect where equal employment opportunities are available to all applicants and teammates without regard to race, religion, color, sex, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status or any other protected characteristic. All employment is decided on the basis of qualifications, merit, and business need.

We're committed to providing reasonable accommodations in accordance with the law for qualified applicants. If you require assistance during the interview process due to a medical condition or need support accessing our website or completing the application process, please reach out to us by completing the Accommodations Request Form. Your comfort and accessibility are important to us, and we're here to ensure a seamless experience as you explore opportunities with our team.

#J-18808-Ljbffr

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.