SECURITY ARCHITECT

KBR
Moor Row
11 months ago
Applications closed

Related Jobs

View all jobs

Security Architect

Security Architect - IDAM

Security Architect

Security Architect Consultant @ PA Consulting

Security Architect

Security Architect

Title:

SECURITY ARCHITECT

OVERVIEW

The Programme and Project Partners (PPP) model was mobilised in 2019 with the purpose of transforming major project delivery at the Sellafield nuclear site.

The partnership brings together KBR, Jacobs, Morgan Sindall Infrastructure, Altrad Babcock and Sellafield Ltd to deliver a 20-year pipeline of major infrastructure projects to support the decommissioning of Sellafield and to create a clean and safe environment for future generations.

In delivering its pipeline of large-scale infrastructure projects, PPP is creating opportunities for its people, supply chain, economy and communities.

KBR’s rapidly growing nuclear team of teams is working at the forefront of the UK’s nuclear space on some of the most exciting new-build, defence and decommissioning programmes.

KBR was recently named a “Great Place to Work-Certified” company in 2023, an honour that underscores the company’s commitment to being a UK employer of choice for people who want to do work that matters.

SECURITY ARCHITECT

Reports to: Head of IT / ITSO

Location: Warrington / Cumbria, 2 / 3 days per week on site with travel to opposite site potentially once per month

Qualifications, Experience and Skills

Qualifications:

Essential: 

• Bachelor’s Degree in Computer Science or equivalent profession and proven experience of expertise in the area

Desirable: 

• MS Azure certifications and professional qualifications

• Cisco accreditations

• Qualification or membership of a professional body in Information Security.

• Experience of Cyber Security Standards.

Experience and Skills:

• Experience of assuring the security architecture of hybrid cloud environments using MS Azure and Wintel based platforms

• Security assurance of SIEM, SOC and IDAM services within heavily regulated and “secure by design” environments

Essential:

• Excellent communication and organisation leadership abilities

• Expertise in security measures such as firewalls, intrusion detection, and prevention systems, network access controls, and network segmentation

• You must be experienced with key operating systems primarily Windows

• Network security architecture and its development are both important to understand

• Wireless security, such as routers, switches, and VLAN security

• DNS security principles such as routing, authentication, VPN and proxy services

• An understanding of ISO 27001/27002, COBIT, and ITIL frameworks are required

• Assurance of proposals and designs for integrating hybrid cloud platforms, tools and systems into SIEM, SOC and IDAM services including MS Sentinel

• Third party auditing skills and cloud risk assessment methodologies

Desirable:

• Knowledge or experience of MS SQL Server, Oracle RDBMS and VDI/Thin client presentation services

• BYOTD, data classification, data certification, PKI and making systems securely available to trusted third party organisations

• Integration of public SaaS with MS Azure IaaS/PaaS and an overarching security architecture

• MS Azure “Landing Zones”

Core Responsibilities and Duties

General:

The Security Architect supports the creation of designs for security solutions that will underpin tools and systems platformed on a hybrid cloud and subsequently plans, implements and reviews the security assurance activities enabling deployment and use of the resulting systems.

To undertake this work, the Security Architect will undertake:

• Identify loopholes or weaknesses in a system that can put the organisation in jeopardy

• Support planning, investigation and build of reliable, powerful and flexible security architectures for all IT initiatives

• Perform or oversee penetration tests, vulnerability testing, including risk analysis and security assessments on the complete infrastructure

• Investigate the latest security standards, recent security systems and renewed authentication protocols

• Ensure proposed solutions can support the necessary corporate security policies and procedures including those associated with service delivery, management and operations such as those within ITIL4

• Ensure proposed solutions comply with any associated standards and that third party system elements can be assured to confirm their continued compliance

• Identify, test and ensure any integration within or out-with the organisations satisfies security requirements

• Ensure proposed and delivered solutions integrate with SIEM, SOC and IDAM and support the System Integrators and Vendors

• Support development of response plans in the event of any security related issues such as breaches, viruses, phishing scams and support the development of a thorough post event study once the situation has been resolved

#LI-JI1 #LI-HYBRID

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.