National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Security Architect

Tata Consultancy Services
Warwick
6 days ago
Create job alert

If you need support in completing the application or if you require a different format of this document, please get in touch withator callTCS London Office numberwith the subject line: “Application Support Request”.



Role:Lead Security Architect (OT) network

Job Type:Permanent

Location:Leamington / Gaydon, UK

Work mode:Hybrid

Number of hours:40 hours per week – full time

Are you looking to take on a role inSecurity Architecture?


We have an exciting opportunity for you as aLead Security Architect (OT) network



Careers at TCS: It means more

TCS is a purpose-led transformation company, built on belief. We do not just help businesses to transform through technology. We support them in making a meaningful difference to the people and communities they serve - our clients include some of the biggest brands in the UK and worldwide. For you, it means more to make an impact that matters, through challenging projects which demand ambitious innovation and thought leadership.

  • Build strong relationships with a diverse range of stakeholders.
  • Gain access to endless learning opportunities.
  • Work closely with the range of teams within the business to bring products to life.




The Role

As aLead Security Architect (OT) network, you will define and implement the security architecture strategy for networks, working closely with the Networks team and the wider IT team and business stakeholders, by leveraging the client security architecture team to ensure global consistency and strategic alignment. You will report direct to the group head security architecture and will be able to demonstrate significant experience in working with senior stakeholders and within a Global team. You will have expertise in Network Security Architecture, with particular emphasis assessing threat landscapes, performing risk and impact assessment, defining security network zones, applying security tools and controls and managing any residual risk, both at a program and individual project level.



Key responsibilities:

  • Assist in the creation and execution of the global information security architecture roadmap for the Company using a pragmatic “hands-on” approach.
  • Work with other Security Architects across IT and Business function architects to deliver secure networks across the client’s estate.
  • Definition of a high-level target network security architecture offering the best solution for risk mitigation, performance, economics and customer experience.
  • Formalize Secure Network segmentation and Zoning architectures to support Zero Trust security models.
  • Provide quality security design patterns and blueprints to contribute to the client’s Architecture framework.
  • Develop baseline security standards for defined Zones incorporating information security principles and requirements that govern how to adequately protect access between network zones.
  • Develop Security policy and governance for Policy as a service for future Software Defined Networks.
  • Embed security into existing networks, and work with the Network Architects on next gen designs for both the corporate and OT networks and advise on decommissioning sequence and methods.
  • Provide local SME support for security policies, standards and procedures relating to Networks.
  • Advice on relevant service models and support.
  • Support risk and audit items as appropriate.
  • Drive liaison with the wider IT Architecture community to ensure that information security principles are progressively embedded in day-to-day networking operations.
  • Develop service model architectures ensuring service input and outputs are recorded, gaps become known and recommend process and governance improvements.
  • Promote and support the embedding of security best practice in network architecture development processes to improve standardization.
  • Track developments and changes in the digital business and threat environments to ensure that they are adequately addressed in security strategy plans and architecture artifacts.
  • Monitor trends in information security and incorporate into Security Architecture Strategy.
  • Work closely with external vendors to bring new ideas and technologies into the business.
  • Provide guidance on architecture security requirements in product selections and RFP.
  • Liaise with the Procurement team to conduct security assessments of existing and prospective vendors, especially those with which the organization shares intellectual property (IP), as well as regulated or other protected data.
  • Conduct or facilitate threat modelling of network services and applications that ties to the risk, data and industry drivers associated with the service or application.
  • Establish and deliver methods and tools which provide value for the organization by reducing risk.




Your Profile

Essential skills/knowledge/experience:

  • Good experience in Network Security Architecture (or similar) within a large scale, high critical environment.
  • Deep technical understanding of Enterprise Network Architecture, in both corporate and OT domains.
  • Demonstrable evidence of contributing security subject matter expertise, including in WAN, LAN and Cloud environments.
  • Show strong leadership skills, able to inspire, energize and motivate people around our vision, values and objectives.
  • Strong program management, partnering and consulting skills.
  • Ability to be a team player in a cross-functional environment and influence positively Information Security.
  • Formal training and familiarity with industry standard methods, tools and processes to support a security architecture function, e.g., SABSA, TOGAF, and the embedding of security principles within this.
  • Good knowledge of network security techniques and technologies such as Remote Access, VPN, Firewalls, NAC, DLP, IDS/IPS, SIEM and Wireless security.
  • Good Knowledge of information security principles and best practices and experience in managing information security risk.
  • Familiar with information security frameworks such as NIST, SANS Top 20 CSC, OWASP, ISO27001, CyberEssentials or other similar frameworks.
  • Good knowledge of industry IT compliance standards, particularly in design and implementation.
  • Good Understanding of Operational Technology and the challenges involved in securing access.
  • Knowledge of market issues and dynamics.


Desirable skills/knowledge/experience:

  • IT security certifications such as CISSP.
  • Network certification such as CCIE or CCNP.
  • Network security certification such as CCSA, PCNSE, JNCIS, NSE7, CEH.
  • Previous experience in manufacturing Industries.
  • OT certification GIAC or experience in OT network hardening, including relevant aspects of ISO 62433.
  • Experience in IoT technologies and connected cars.
  • Familiarity with governance and delivery frameworks including COBITv5 and ITI.
  • Excellent written and verbal communication skills with ability to translate technical language into clear, accurate terminology that non-technical people understand.



Rewards & Benefits

TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care, life assurance, laptop, phone, access to extensive training resources and discounts within the larger Tata network.

We offer health & wellness initiatives and sports events; we are the proud sponsor of the London Marathon.



Diversity, Inclusion and Wellbeing

Tata Consultancy Services UK&I is committed to meeting the accessibility needs of all individuals in accordance with the UK Equality Act 2010 and the UK Human Rights Act 1998.

We welcome and embrace diversity in race, nationality, ethnicity, disability, neurodiversity, gender identity, age, physical ability, gender reassignment, sexual orientation. We are a disability inclusive employer and encourage disabled people to apply for this role.

As a Disability Confident Employer, we offer an interview to applicants with disabilities or long-term conditions who meet the minimum criteria for the role. Please email us at if you would like to opt in.

If you are an applicant who needs any adjustments to the application process or interview, please contact usatwith the subject line: “Adjustment Request” or callTCS London Office /to request an adjustment. We welcome requests prior to you completing the application and at any stage of the recruitment process.


Beware of Fraudulent offers

This is to notify you that TCS does not ask for any sort of payment or security deposit from candidates at any stage of the recruitment process. The firm never sends out job offers from free internet email services like Gmail, Yahoo Mail, and so on. TCS has not authorised any third-party company to collect money on their behalf. As a vigilant job seeker, beware of fraudulent recruitment activity and protect your interests! You can write to to report any fraudulent activity.

Due to the high volume of applications, we will be unable to contact each applicant individually on the status of their application. If you have not received a direct response within 30 days, then it should be deemed unsuccessful on this occasion.


Join us and do more of what matters. Apply online now.

Related Jobs

View all jobs

Security Architect

Security Architect

Security Architect

Security Architect

Security Architect

Security Architect

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.

Cyber Security Jobs Employer Hotlist 2025: 50 UK Companies Actively Hiring Right Now

Bookmark this guide—refreshed every quarter—so you always know who’s really expanding their cyber security teams. Ransomware payouts broke records in 2024, the UK’s new Cyber Security Bill imposed mandatory breach disclosure, and the National Cyber Force’s move to Samlesbury has super‑charged the northern skills market. Result? Demand for security architects, SOC analysts, penetration testers, cloud‑security engineers, threat hunters & GRC specialists is at an all‑time high in 2025. Below you’ll find 50 organisations that have posted UK‑based cyber security vacancies or announced head‑count growth during the past eight weeks. They’re organised into five quick‑scan categories. For every employer you’ll see: Main UK hub Example live or recent vacancy Why it’s worth a look (tech stack, culture, mission) Search any company on CyberSecurityJobs.tech to view current ads, or set a free alert so fresh openings land straight in your inbox.

Return-to-Work Pathways: Relaunch Your Cyber Security Career with Returnships, Flexible & Hybrid Roles

Re-entering the workforce after a career break can feel especially challenging in a fast-moving field like cyber security. Whether you stepped away for parenting, caregiving or another life chapter, the UK’s cyber security sector now offers a range of return-to-work pathways—from structured returnships to flexible and hybrid roles. These programmes value the transferable skills and resilience you’ve developed during your break, pairing you with mentorship, upskilling opportunities and supportive networks to ease your transition back into cyber security. In this article, tailored for parents and carers, you’ll discover how to: Understand the growing demand for cyber security talent in the UK Translate your organisational, communication and problem-solving skills into cyber security roles Tackle common re-entry challenges with practical solutions Refresh your technical knowledge through targeted learning Access returnship and re-entry programmes specific to cyber security Find roles that accommodate family commitments—whether hybrid, flexible or full-time Balance your career relaunch with caring responsibilities Master applications, interviews and networking in cyber security Draw inspiration from real returner success stories Whether you aim to return as an analyst, penetration tester, security engineer or compliance specialist, this guide will equip you with the steps and resources to reignite your cyber security career.