Infrastructure Architect - Inside IR35 - Hybrid

Knutsford
1 month ago
Applications closed

Related Jobs

View all jobs

Senior Infrastructure Architect

Solutions Architect

IT Infrastructure Engineer

Senior Cyber Security Architect

Information Security & Risk Specialist

Information Security & Risk Specialist

Infastructure Architect - Inside IR35 - Hybrid

The SilverFort Infrastructure Architect is responsible for owning, designing, operating, and continuously enhancing SilverFort as an enterprise service, delivering a unified identity and access management platform. The role provides architectural leadership across the SilverFort ecosystem, ensuring the service is secure, scalable, resilient, and aligned to infrastructure and security standards.

This role acts as the primary authority on SilverFort architecture, policy design, and service integrations, working closely with infrastructure, security, network, and platform teams. The architect provides strategic direction, supports complex change and transformation initiatives, and engages with vendors and delivery teams to evolve the service.

Key Responsibilities

Own the end-to-end SilverFort platform architecture, ensuring it aligns with enterprise infrastructure, security, and identity strategies.

Define and maintain SilverFort architectural designs, standards, and patterns, including agentless MFA and access control policy frameworks.

Lead integration of SilverFort with Active Directory, authentication services, network infrastructure, and security platforms.

Provide architectural oversight for new use cases, onboarding activities, and major platform enhancements.

Act as the technical authority for complex design decisions, architectural risks, and non-standard solutions.

Support escalated incidents and problems by providing architectural insight and root cause analysis.

Collaborate with delivery, operations, and security teams to ensure designs are operable, resilient, and supportable.

Engage with vendors and third-party providers to influence product direction, manage escalations, and validate architectural solutions.

Contribute to service roadmaps, lifecycle management, and continuous improvement initiatives.

Produce and maintain high-quality architecture artefacts, design documentation, and stakeholder-facing guidance.

Essential Skills and Experience

Strong understanding of Access Management and IAM architecture, including PAM and multi-factor authentication concepts.

Deep understanding of SilverFort architecture, agentless MFA design, and policy-driven access models.

Strong Active Directory architectural knowledge, including LDAP, Kerberos, NTLM, and RADIUS authentication flows.

Solid understanding of enterprise network architecture, including core network protocols, firewalls, and proxy services.

Proven experience designing and supporting highly available, secure infrastructure services in large-scale environments.

Strong analytical and problem-solving skills, with the ability to diagnose complex, cross-domain issues.

Good understanding of ITIL-aligned service management practices, including incident, problem, and change management, with a focus on architectural governance.

Desirable Skills and Experience

Experience designing or integrating solutions with Azure and Microsoft Entra ID.

Knowledge of EDR and XDR platforms and how they interact with identity, access, and infrastructure controls.

Experience producing architecture diagrams, design documents, and decision records for both technical and non-technical audiences.

Scripting and automation experience (for example PowerShell) and a working understanding of APIs and integration patterns.

To apply for this role please submit your CV or contact Dillon Blackburn on (phone number removed) or at (url removed).

Tenth Revolution Group are the go-to recruiter for Data & AI roles in the UK offering more opportunities across the country than any other recruitment agency. We're the proud sponsor and supporter of SQLBits, Power Platform World Tour, and the London Fabric User Group. We are the global leaders in Data & AI recruitment

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.