Be at the heart of actionFly remote-controlled drones into enemy territory to gather vital information.

Apply Now

Security Architect

Basingstoke
5 months ago
Applications closed

Related Jobs

View all jobs

Security Architect

Security Architect

Security Architect

Security Architect

Cyber Security Architect

Cyber and Security Architect – Healthcare

Job Title: Security Architect

Security Clearance: Active DV

Location: Basingstoke (Onsite)

Contract Duration: Until End of Year

About the Role:

We're seeking an experienced Technical Security Architect to join a high-impact project based in Basingstoke. In this role, you will be responsible for embedding robust security considerations into the design, development, and integration of network infrastructures.

You'll work in an Agile Scrum team environment and be a core contributor to the wider programme, operating within an overarching Agile framework that adheres to Secure by Design principles and NIST methodologies.

Day-to-day, you'll collaborate closely with infrastructure and service architects, integrators, and testers, acting as the security subject matter expert across all Scrum deliverables. Your main objective is to drive the successful delivery of key security enforcing capabilities into the platform.

Key Responsibilities:

Integrate security architecture into the design and development of complex network infrastructures.
Lead and support the implementation of secure system designs within Agile project teams.
Serve as the go-to security expert for Scrum deliverables and ensure alignment with NIST standards and Secure by Design practices.
Collaborate with stakeholders to ensure secure integration and deployment processes.
Deliver technical security documentation and support design reviews.
Provide input into the design and rollout of vulnerability scanning solutions.
Present and defend security design decisions to both technical peers and senior leadership.

Required Skills & Experience:

Proven experience in network infrastructure design, development, and security integration.
Strong background in designing and documenting security solutions for complex systems.
Hands-on knowledge of vulnerability scanning tools and implementation strategies.
Demonstrated ability to evaluate and adapt to new technologies under tight deadlines.
Skilled in communicating complex security concepts effectively to diverse audiences.
Must hold Active DV (Developed Vetting) clearance.

This is a great opportunity to apply your expertise in a high-security, fast-paced environment and make a tangible impact on national infrastructure. If you're passionate about cybersecurity and thrive in Agile settings, we'd love to hear from you

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Why Cyber Security Careers in the UK Are Becoming More Multidisciplinary

Cyber security used to be viewed primarily as a technical discipline: firewalls, encryption, intrusion detection, penetration testing. In the UK today, it’s far broader. Organisations now face complex legal frameworks, ethical dilemmas, human-behaviour risks, communication challenges & usability hurdles. This shift means cyber security careers are becoming more multidisciplinary. From protecting NHS patient records to defending financial services, securing supply chains & safeguarding national infrastructure, cyber security now touches every sector. Employers increasingly want professionals who understand law, ethics, psychology, linguistics & design alongside traditional technical skills. In this article, we’ll explore why UK cyber security careers are expanding in this way, how these five disciplines shape the profession, and what job-seekers & employers need to know to thrive in this new landscape.

Cyber Security Team Structures Explained: Who Does What in a Modern Cyber Security Department

Cyber security has become a top priority for UK organisations of all sizes. From small businesses to financial institutions, healthcare providers, and government bodies, the risk of cyber attack is now a constant concern. Threats are more sophisticated, regulations more demanding, and customers more aware of data privacy than ever before. But defending against cyber threats isn’t simply about having the right tools — it’s about having the right team. A modern cyber security department relies on clearly defined roles and responsibilities to ensure that defences are proactive, incidents are managed swiftly, and compliance is maintained. This article explains the structure of a modern cyber security team, the roles you’ll typically find within it, how they collaborate, and what skills, qualifications, and salaries are expected in the UK job market.

Why the UK Could Be the World’s Next Cyber Security Jobs Hub

Cyber security has become one of the defining challenges of the digital age. From protecting personal data and financial transactions to defending national infrastructure and corporate systems, the demand for strong cyber defences has never been higher. As businesses, governments, and individuals depend more heavily on digital services, the scale and sophistication of cyber threats have risen dramatically. Ransomware attacks, data breaches, state-sponsored cyber operations, and insider threats are now everyday risks. In response, organisations worldwide are investing heavily in cyber security talent. The United Kingdom is uniquely positioned to become a global cyber security jobs hub. With its strong tech sector, world-class universities, advanced defence capabilities, and established financial markets, the UK already has the foundations. The question is whether it can scale up, attract, and retain the right talent to meet global demand. This article explores why the UK is poised to become the world’s next cyber security jobs hub, the opportunities available, the challenges ahead, and what needs to happen for this vision to be realised.