Security Architect

Cyber News
Belfast
2 months ago
Create job alert

Company Description

Security Architect – Belfast

Telefónica Tech (part of the Telefónica Group) is a leading NextGen Tech solutions provider with a highly diversified team of over 6,000 exceptionally skilled employees and +60 nationalities. We serve more than 5.5m customers every day in over 175 countries, with a global ecosystem of market-leading partners. Global strategic hubs: Spain, Brazil, the UK, Germany. The Telefónica Tech UK&I hub has an end-to-end portfolio of market leading services and develops integrated technology solutions to accelerate digital transformation through: Cloud, Data & AI (Adatis), Enterprise Applications (Incremental), Workplace Services and Cyber Security & Networking. Values: Open, Trusted and Bold.

Trusted Partners:

  • Microsoft: Top 3 Service Providers, Azure Expert Status, Fastrack & Inner Circle Partner
  • HPE: Platinum Partner – FY23 UK&I Solution Provider of the Year
  • Fortinet: Elite VIP Program – one of only 2 in the UK
  • AWS: Advanced Solution & Managed Service Provider Program

Job Description

Security Architect – Belfast – Hybrid (2-3 days per week onsite)

The Security Architect is responsible for designing, implementing, and maintaining an organization’s overall security architecture. This role involves collaborating with various stakeholders to identify security requirements, developing strategies to address potential threats, and ensuring the confidentiality, integrity, and availability of sensitive information. The role requires to be a key stakeholder in any project that this role is a part of, this means being a subject matter expert in various areas, being able to lead workshops around security solutions and services on your own, and highlighting areas of improvement for our customers to continuously improve their security posture.

Core Responsibilities Include:

Security Architecture Design:

  • Develop and maintain a comprehensive security architecture that aligns with business goals and regulatory requirements.
  • Design and review security solutions, ensuring they meet industry best practices and standards.
  • Planning, studying, and designing a security architecture for IT projects.
  • Designing, developing, and continuously improving vulnerability assessment, security testing, and risk analysis.
  • Designing, developing, and continuously improving the security posture of the company’s products.
  • Providing developers with remediation guidance and advice.
  • Evaluating cloud and security technologies.
  • Designing, developing, and continuously improving security operations.
  • Recommending and providing technical leadership for the implementation of security measures to protect information systems, networks, and data.

Risk Assessment and Management:

  • Conduct risk assessments to identify potential vulnerabilities and threats.
  • Develop risk mitigation strategies and work with relevant teams to implement necessary security measures.

Security Policy Development:

  • Establish and enforce security policies, procedures, and standards across the organization.
  • Collaborate with legal and compliance teams to ensure policies align with industry regulations.

Security Awareness and Training:

  • Provide security training and awareness programs for employees to promote a security-conscious culture.
  • Keep abreast of the latest security trends, threats, and technologies.

Collaboration with IT Teams:

  • Work closely with IT teams to integrate security measures into the overall IT infrastructure.
  • Collaborate with system architects, developers, and administrators to ensure security is incorporated into all aspects of the system development lifecycle.

Incident Response and Forensics:

  • Develop and maintain incident response plans to address security incidents promptly.
  • Conduct forensic analysis of security incidents to identify root causes and prevent future occurrences.

Security Audits and Compliance:

  • Perform regular security audits to assess compliance with established security policies.
  • Ensure compliance with industry standards and regulations.

Qualifications

Desirable Experience:

  • Industry Recognized Cyber Security Certifications: GSEC, CISSP, CISM, CCSP, CISA.
  • Experience in the Healthcare Industry.
  • Experience within IT services / Professional Services.

Key Words:Security Architect – Security Architecture – Security Consultant – CISSP – CISM – CCSP – GSEC

Additional Information:We don’t believe hiring is a tick box exercise, so if you feel that you don’t match the job description 100%, but would still be a great fit for the role, please get in touch.

Apply For Job

#J-18808-Ljbffr

Related Jobs

View all jobs

Security Architect

Security Architect

Security Architect for Network & Cloud

Security Architect - IDAM

Security Architect - Newport

Security Architect (Cyber Security)

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs for Non‑Technical Professionals: Where Do You Fit In?

Defence Needs More Than Hackers in Hoodies When headlines warn of ransomware crippling hospitals or deepfakes swaying elections, we picture hoodie‑clad hackers and elite penetration testers. Yet the reality of the UK’s cyber security sector is broader—and desperately short of talent. The Department for Science, Innovation & Technology (DSIT) estimates a shortfall of 11,200 cyber security professionals in 2024, while 43 % of advertised roles require governance, risk or communication skills rather than hands‑on technical exploits. Put plainly: if you can guide policy, manage projects, interpret regulations or inspire behaviour change, cyber security wants you. This guide highlights the fastest‑growing non‑technical roles, the transferable skills you already possess, and a concrete 90‑day plan to land a cyber security job—no packet sniffers required.

BAE Systems Cybersecurity Jobs in 2025: Your Complete UK Guide to Protecting Governments, Businesses and Critical Infrastructure

From securing the Royal Navy’s new Dreadnought submarines to foiling multimillion‑pound fraud rings, BAE Systems Digital Intelligence (DI)—formerly Detica—sits at the sharp end of global cyber defence. Head‑quartered in Guildford with hubs in Gloucester, Leeds and London, the 5,500‑strong DI business delivers threat‑intelligence platforms, secure‑by‑design software and 24/7 SOC services to government and commercial clients worldwide. With escalating ransomware, AI‑driven disinformation and complex supply‑chain threats, BAE plans to expand its UK cyber workforce by 20 % in 2025. Whether you’re a graduate passionate about reverse engineering, a DevSecOps engineer who loves IaC, or an incident‑response pro comfortable in high‑side environments, this guide explains how to land a BAE Systems cybersecurity job in 2025.

Cyber Security vs. Ethical Hacking vs. Security Analysis Jobs: Which Path Should You Choose?

In an era where data breaches, ransomware attacks, and sophisticated digital threats dominate headlines, the demand for skilled cyber security professionals has never been higher. From global corporations to small businesses, organisations are scrambling to protect their systems, networks, and data from malicious actors. If you’ve been exploring cyber security jobs on www.cybersecurityjobs.tech, you’ve likely encountered various specialised roles—Ethical Hacking (often termed Penetration Testing), Security Analysis, Security Architecture, Incident Response, and more. Yet many job seekers and technology enthusiasts are unsure how these fields overlap or which one is right for them. In this in-depth guide, we’ll demystify three core disciplines—Cyber Security, Ethical Hacking, and Security Analysis—outlining the skills each requires, the responsibilities you can expect, salary ranges in the UK, and typical day-to-day activities. By the end, you’ll have a clearer understanding of these roles, helping you decide which path to pursue in this fast-growing industry. And when you’re ready to take the next step, head over to www.cybersecurityjobs.tech to explore the latest openings and find your perfect match.