Remote Access Architect

Sheldon Square
3 months ago
Applications closed

Related Jobs

View all jobs

Network Product Owner

Network Engineer / ICT Network Administrator

Senior Cyber Security Architect

Senior Customer Deployment Specialist

Data Platform Engineer

IAM Project Manager

Remote Access Architect – 3-Month Contract (Competitive Day Rate)
Global Retailer | Flexible / Hybrid Location
 
Overview
A leading global retailer is seeking an experienced Remote Access Architect to provide strategic oversight, governance, and technical assurance for a unified, enterprise-wide Remote Access solution. This is a high-impact contract role responsible for shaping the standards, patterns, and architecture principles that enable secure, seamless connectivity for a diverse global workforce.
 
You will act as an independent strategic voice, partnering with security, networks, cloud hosting, and identity teams to ensure a cohesive, scalable, and future-proof remote access service.
 
Key Responsibilities

Define and govern architecture principles, standards, and patterns for the enterprise Remote Access solution.
Provide strategic technical oversight across all major components, ensuring integration and alignment across:
Zscaler Private Access (ZPA)
Zscaler Browser Portal Access
Azure Virtual Desktop (AVD) – hosting & endpoint management
AD/Entra ID
CyberArk (PAM)
Work closely with Security and architecture partners to ensure compliance with enterprise security and regulatory requirements.
Champion a high-quality colleague experience across varied business needs and global operational environments.
Ensure remote access design supports Warehouse, Store, and non-production (CATE) environments.
Serve as a trusted advisor to the Identity & Access Management team, supporting end-to-end service ownership.
Provide independent assessment and recommendations to maintain scalability, security, and future readiness.
Align dependencies across Networks, Cloud Hosting, Device & Endpoint Management, and IAM teams.
Lead or review Design Authority submissions to ensure remote access components meet governance, standards, and strategic objectives. 
Design Authority Focus Areas

ZPA – secure internal app access; ensuring scalability and compliance.
Browser Portal Access – browser-based partner access; usability and onboarding optimisation.
AVD – performance-led design for warehouse and store connectivity.
AD/Entra ID – federation, conditional access, seamless integration.
CyberArk – privileged access controls, segregation of duties, auditability. 
Essential Skills & Experience

Proven experience as an Architect within Remote Access, Identity & Access Management, or similar enterprise architecture domains.
Strong technical knowledge of Zscaler, Azure Virtual Desktop, AD/Entra ID, and CyberArk.
Deep understanding of security governance, compliance, and architecture frameworks.
Ability to balance robust security with intuitive user experience.
Excellent stakeholder engagement and communication skills, with the confidence to present an independent strategic viewpoint.
Experienced in guiding multi-disciplinary teams across complex enterprise environments. 
Contract Details

3 month initial contract
Competitive market day rate
Hybrid (3x week in London)

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.