Security Architect

Hitachi Vantara Corporation
London
3 weeks ago
Applications closed

Related Jobs

View all jobs

Security Architect

Security Architect

Security Architect Lead

Security Architect / Technical Design Authority

Security Architect – NIST, ISO27001, PCI-DSS, Cloud

Security Architect

Are you passionate about making a difference in healthcare through technology? As a CISSP certified Security Engineer/Architect, you'll play a crucial role as part of an Azure cloud modernisation programme, responsible for designing, implementing, and maintaining security measures for the National Breast Screening Service in the UK.

As well as an extensive technical skill set, you'll have experience of building and managing relationships with key stakeholders in a complex organisation, ensuring effective communication within the security framework at NHS England.

You will be adept at managing and working with near-shore and off-shore technology teams in order to successfully deliver security solutions.

You will also have a deep understanding and experience of UK NCSC Government guidelines and standards in order to ensure compliance throughout.

What You'll Be Doing:

  1. Designing and implementing security controls for the managed tenant and service layer.
  2. Validating the design for the nearshore facility and overseeing all audit requirements requested by the NHSE CISO.
  3. Creating the System Level Security Policy (SLSP) for NBSS.
  4. Documenting and enforcing security policies and procedures to ensure compliance with NCSC standards and regulations.
  5. Investigating security breaches, analysing logs and network traffic to detect suspicious activity, and coordinating response actions to minimize damage.
  6. Educating the team on secure design and coding principles and ensuring adherence to these.
  7. Collaborating with NHS England to design penetration tests.

What You'll Bring to the Team

  1. CISSP certification.
  2. Extensive security engineering or architectural experience in Azure.
  3. Experience in designing, implementing, and maintaining security measures.
  4. Proven ability to build and manage relationships with key stakeholders in a complex organisation.
  5. Excellent communication skills.
  6. Deep understanding and experience with UK NCSC Government guidelines and standards.

*Please note that successful applicants will be required to pass Security Check (SC) clearance for this role. In order to be considered, you must have resided in the UK for a minimum of 5 years*

About Us

We're Hitachi Digital Services, a global digital solutions and transformation business with a bold vision of our world's potential. We're people-centric and here to power good. Every day, we future-proof urban spaces, conserve natural resources, protect rainforests, and save lives. This is a world where innovation, technology, and deep expertise come together to take our company and customers from what's now to what's next. We make it happen through the power of acceleration.

Championing diversity, equity, and inclusion

Diversity, equity, and inclusion (DEI) are integral to our culture and identity. Diverse thinking, a commitment to allyship, and a culture of empowerment help us achieve powerful results. We want you to be you, with all the ideas, lived experience, and fresh perspective that brings. We support your uniqueness and encourage people from all backgrounds to apply and realize their full potential as part of our team.

How we look after you

We help take care of your today and tomorrow with industry-leading benefits, support, and services that look after your holistic health and wellbeing. We're also champions of life balance and offer flexible arrangements that work for you (role and location dependent). We're always looking for new ways of working that bring out our best, which leads to unexpected ideas. So here, you'll experience a sense of belonging, and discover autonomy, freedom, and ownership as you work alongside talented people you enjoy sharing knowledge with.

We're proud to say we're an equal opportunity employer and welcome all applicants for employment without attention to race, colour, religion, sex, sexual orientation, gender identity, national origin, veteran, age, disability status or any other protected characteristic. Should you need reasonable accommodations during the recruitment process, please let us know so that we can do our best to set you up for success.#J-18808-Ljbffr

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.