Security Architect

Tata Consultancy Services
Glasgow
2 days ago
Create job alert

If you need support in completing the application or if you require a different format of this document, please get in touch withator callTCS London Office numberwith the subject line: “Application Support Request”.


Role:Security Architect

Job Type:Permanent

Location:Swindon


Ready to utilise yourskills in IAM & Security?Are you looking for an excitingopportunity as a Security Architect?


Make a meaningful impact as aSecurity Architect!


Careers at TCS: It means more

TCS is a purpose-led transformation company, built on belief. We do not just help businesses to transform through technology. We support them in making a meaningful difference to the people and communities they serve - our clients include some of the biggest brands in the UK and worldwide. For you, it means more to make an impact that matters, through challenging projects which demand ambitious innovation and thought leadership.

  • Gain exposure to innovative technology.
  • Work with customers and identify opportunities to support their strategy and improve their processes across functions.
  • Gain access to endless learning opportunities.


The Role

As aSecurity Architectfocusing on Mortgages systems, your primary responsibility will be to design, implement, and maintain robust security architectures for payment systems within a financial organization. This role involves ensuring the security of financial transactions, protecting sensitive data, and complying with industry regulations.


Key responsibilities:

  • Develop and implement comprehensive security strategies for Payments System Upgrades.
  • Conduct thorough risk assessments to identify potential security threats and develop mitigation strategies.
  • Create comprehensive threat models aligning with MITRE ATTACK/STRIDE frameworks.
  • Recommend the best controls & mitigations to potential vulnerabilities
  • Ensure the design comply with relevant regulations and standards, including GDPR, SOX, and PCI-DSS.
  • Implement advanced encryption and access control mechanisms to safeguard data integrity and confidentiality.
  • Implement Cloud Security controls through Firewalls and leverage Defender for Cloud capabilities in the Security design
  • Ensure data at rest and data in transit are encrypted using appropriate mechanisms.
  • Communicate security risks and strategies effectively to stakeholders, including executive leadership and IT teams.


Your Profile

Essential skills/knowledge/experience:

  • Should have proven experience as a Security Architect working in a large, complex organization. Ideally, this experience would be within a financially regulated enterprise (e.g., PCI compliance).
  • Proven experience working previously for financial organizations.
  • Previous relevant experience in developing bespoke Threat Models leveraging frameworks like MITRE ATTACK & STRIDE.
  • Proficiency in assessing the Identity & Access Management functions & associated risks during Acquisition process.
  • Be able to understand and assess the security elements of technical designs / solutions and have a proven ability to constructively challenge to deliver better business and security outcomes.
  • Good knowledge of cryptography.
  • Knowledge of MS Defender for Cloud.
  • Basic understanding of Mortgage systems in finance is a nice to have.


Desirable skills/knowledge/experience:

  • Previous experience in working in UK Financial Services or similar highly regulated industry.
  • Have a relevant professional qualification (or be working towards certification), such as CISM / CISSP.
  • Knowledge / experience of PCI-DSS, including PCI-P qualification.
  • Knowledge / experience of Data privacy and GDPR.
  • Experience with regulatory compliance frameworks specific to financial organizations.
  • Excellent interpersonal and communication skills.
  • Ability to work independently and collaboratively within a team.


Rewards & Benefits

TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care, life assurance, laptop, phone, access to extensive training resources and discounts within the larger Tata network.


Diversity, Inclusion and Wellbeing

Tata Consultancy Services UK&I is committed to meeting the accessibility needs of all individuals in accordance with the UK Equality Act 2010 and the UK Human Rights Act 1998.

We believe in building and sustaining a culture of equity and belonging where everyone can thrive. Our diversity and inclusion motto is ‘Inclusion without Exception’. Our continued commitment to Culture and Diversity is reflected across our workforce implemented through equitable workplace policies and processes.


You’ll find a welcoming culture and many internal volunteering and social networks to join (these are optional). Our diversity, inclusion and social activities include 12 employee networks such as gender diversity, LGBTQIA+ & Allies, mental health, disability & neurodiversity inclusion and many more, as well as health & wellness initiatives and sports events and we sponsor the London Marathon.


We welcome and embrace diversity in race, nationality, ethnicity, disability, neurodiversity, gender identity, age, physical ability, gender reassignment, sexual orientation. We are a disability inclusive employer and encourage disabled people to apply for this role.


As a Disability Confident Employer, we offer an interview to applicants with disabilities or long-term conditions who meet the minimum criteria for the role. Please email us at if you would like to opt in.


If you are an applicant who needs any adjustments to the application process or interview, please contact usatwith the subject line: “Adjustment Request” or callTCS London Officeto request an adjustment. We welcome requests prior to you completing the application and at any stage of the recruitment process.


Next Steps

Due to a high volume of applications, we will be unable to contact each applicant individually on the status of their application. If you have not received a direct response within 30 days, then it should be deemed unsuccessful on this occasion.


Application Process

1. Online application > 2. Technical discussion > 3. Managerial discussion > 4. HR discussion


Join us and do more of what matters. Apply online now.

Related Jobs

View all jobs

Security Architect

Security Architect

Security Architect Lead

Security Architect / Technical Design Authority

Security Architect – NIST, ISO27001, PCI-DSS, Cloud

Security Architect

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.