National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Network Security Architect

Luton
3 weeks ago
Create job alert

Summary:
We are seeking an experienced and strategic Network Security Architect to design secure, scalable, and resilient network architectures across the enterprise.

The ideal candidate will possess deep knowledge of :

Traditional network infrastructure - LAN; WAN; WIFI etc
Cybersecurity including Zero Trust Architecture
Cloud Security Architecture
Be capable of aligning security controls with business objectives and compliance requirements.

Key Responsibilities:

Lead the design and implementation of secure network architectures for on-premises, cloud, and hybrid environments.
Define network security standards, frameworks, and policies aligned with industry best practices (e.g., NIST, ISO 27001, CIS).
Develop and maintain secure designs for firewalls, VPNs, intrusion prevention systems (IPS/IDS), network segmentation, and zero trust network access (ZTNA).
Collaborate with IT, cloud, and cybersecurity teams to ensure secure integration across systems and applications.
Lead architectural reviews and assurance of designs working with System Integrators & partner resources.
Conduct threat modeling and risk assessments on network infrastructure and recommend mitigations.
Support incident response teams during network-related security incidents and perform root cause analysis.
Evaluate and recommend security tools and technologies, and stay informed on emerging threats and vulnerabilities.

Required Skills and Qualifications:

Proven experience as a Network Security Architect or in a senior network security engineering role.
Experience with Cisco LAN; WAN technologies
Experience with Zscaler or equivalent to drive toward Zero Trust
In-depth knowledge of network protocols, routing, switching, DNS, DHCP, and encryption standards.
Strong hands-on experience with network security solutions such as firewalls (e.g., Palo Alto, Fortinet, Cisco ASA), NAC, IPS/IDS, and SD-WAN.
Understanding of Zero Trust Architecture, microsegmentation, and secure cloud networking (e.g., Azure, AWS, GCP).
Experience with security information and event management (SIEM), threat intelligence, and vulnerability management.
Excellent communication and documentation skills, with the ability to influence and educate stakeholders.
Relevant certifications strongly preferred (e.g., CISSP, CCNP Security, CCIE Security, GIAC, Azure/AWS security certs).Disclaimer:

This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission. Where the role is marked as Outside IR35 in the advertisement this is subject to receipt of a final Status Determination Statement from the end Client and may be subject to change

Related Jobs

View all jobs

Network Security Architect

Network Security Architect

Security Architect for Network and Cloud

Security Architect - Network and Cloud

Network and Infra Endpoint Security Architect - London

Enterprise Security Architect

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.