Principal Security Architect

Logiq
Bristol
3 days ago
Create job alert

Location:Hybrid; with occasional travel expected to client site or Logiq’s offices in Bristol, Chippenham or Exeter.


Salary:Negotiable, plus car allowance, plus up to 10% performance bonus*, plus excellent benefits package.


Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due to rapid growth in ourSecurity Capability, we are looking for experienced Security Architects to join our team.


What is Security Architecture?

Security Architecture is a structured, risk-driven discipline that ensures security is effectively integrated into an organisation’s systems, processes, and people. It spans the lifecycle from strategic planning through design and implementation to governance and continuous improvement, aligning security with business objective


We are seeking Security Architects to join our team, providing guidance in the design, development, and assurance of secure solutions for our clients. This role requires a holistic understanding of security architecture, spanning alignment with business objectives through to detailed design and evaluation of technical controls.

Successful candidates may bring strengths in enterprise or technical security architecture, or both, with the ability to tailor solutions to organisational context, risk posture, and technical environments.

Priority skills for this consulting role include: Strong client engagement, contextual analysis, solution design, and the ability to clearly communicate complex security architecture concepts to both technical and non-technical stakeholders.


Why Join Us?

  • Work on impactful projects that drive efficiency and innovation across diverse sectors.
  • Access professional development pathways tailored to your career ambitions.
  • Enjoy flexible working arrangements and a competitive benefits package.


What the team say

“At Logiq, I love being part of a team that thrives on exciting, fast-paced projects in complex environments. We focus on delivering real value rather than getting bogged down by unnecessary processes. The collaborative culture encourages initiative and empowers me to make impactful decisions, with support always available when I need it. I also feel supported in my project work and career development, with plenty of opportunities to enhance my skills and take on new challenges. Logiq’s investment in its people ensures I have both the tools and encouragement to achieve my goals."


"As someone with a challenging home life, including children with additional needs, the hybrid working model has been invaluable. Logiq treats me as a professional, trusting me to manage my work, projects, and outputs while balancing my family commitments. The flexibility to adapt my schedule for school runs and care needs, combined with a supportive team and rewarding work, makes this a truly unique place to grow and succeed.”


The Role:

You will have experience of working across system lifecycles and be capable of supporting clients through business-focused requirement specification and definition. You will have a broad experience of technical security, producing technical risk assessments and solution architecture documents.


The ideal candidate will be both experienced and invested in ensuring that our clients' solutions are Secure by Design. To enable this, strong inter-personal skills are essential, e.g. ability to lead workshops, engage with business leaders, and interact with diverse project teams and stakeholders.


With your experience you will be comfortable operating in a ‘customer friend’ type role, supporting the client to develop and deliver secure systems, understanding risks and managing complex system security whilst communicating effectively with technical and non-technical stakeholders.


Our consultants are engaged across Security Engineering and Assurance tasks, working on parallel projects and workstreams, and take the lead on day-to-day client interface. You will also be comfortable enhancing customer relationships with new opportunities and assisting with bids and presales where necessary.


Your experience will include:

  • Leading the development of security architecture and design for complex IT requirements, ensuring smooth transition from design to live service. Managing trade-offs based on stakeholder needs and constraints while championing and driving transformation through a clear vision and architecture to lead the delivery journey.
  • Enabling delivery through the definition of methodologies, approach, team structure, and supporting technologies that enable successful transformation across an engineering lifecycle.
  • Shaping policies, principles and standards, aligning IT transformation to these in an organisational/enterprise context, in order to deliver efficiently.
  • Ensuring full lifecycle traceability of stakeholder requirements, supporting project planning with accurate assumptions, and simplifying complexity for senior stakeholders.
  • Familiarity with TOGAF and Archimate or similar


What We’re Looking for:

Essential

  • Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or another industry recognised cyber security certification.


Desirable

  • Full Membership of the Chartered Institute of Information Security (CIISec) - highly desirable.
  • Chartered or Principal status via the UK Cyber Security Council for Secure Systems Architecture.
  • NCSC Certified Cyber Professional in Security Architecture.
  • IEng or CEng registered with UK Engineering body.
  • Chartership through the British Computer Society.
  • SABSA Chartered Security Architect


Other information:

Logiq is committed to investing in people, offering clear progression pathway into our consultancy service, and we will passionately support professional growth to develop our employees.

Flexible working is available including part-time / term time working patterns. All suggestions are welcomed to be discussed as part of a proposed employment package. We are an equal-opportunities employer.

*Bonus payments are discretionary and awarded upon successful completion of probation.

Related Jobs

View all jobs

Principal Security Architect – Sentinel, Defender, Purview

Lead Security Architect

Principal Cyber Security Consultant - Hybrid

Principal Security Consultant - Cloud Security

Principal Engineer

Security Consultant (Security Operations / SOC)

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.