Security Architect for Network and Cloud

WhatJobs
Belfast
1 week ago
Applications closed

Related Jobs

View all jobs

Security Architect for Network & Cloud

Security Architect for Network & Cloud

Network & Cloud Security Architect

Network Security Architect

Cyber Security Architect

Security Architect

Location: Belfast Workplace: Hybrid The opportunity: The Security Architect for Network and Cloud will lead the design and development of the Firm's cloud network security solutions. You will oversee the operation and configuration of the Firm's cloud security toolsets. This will include the design and management of CNAPP (cloud-native application protection platform) and CASB (cloud access security broker) technologies. Working at Baker McKenzie: Baker McKenzie is the world's leading law firm with offices all over the world. Our Belfast Centre is home to over 400 colleagues in both legal and professional services. We offer one of the best workplace benefits packages in the business with comprehensive private health cover, income protection, life assurance and a full employee assistance plan. These and a host of other benefits make us one of the most desirable companies to work for in Belfast. We are committed to promoting inclusion, diversity, and equity for all and are confident we can provide a career as individual and as exceptional as you. Responsibilities: Design and implement cloud-native security architectures and solutions Design and implement CASB strategies to protect the Firm's cloud services and applications Develop and maintain security policies, standards, and best practices for cloud environments Conduct security assessments and audits of cloud infrastructure and applications Create and Maintain solution documentation for cloud network security Skills and Experience: A Computer Science bachelor's degree or equivalent professional experience Extensive experience in designing and implementing enterprise cloud security solutions Extensive working experience with Microsoft cloud security tools including Microsoft Defender for Cloud Apps and Microsoft Defender for Cloud Experience in deploying enterprise CASB and CNAPP solutions Experience configuring and troubleshooting network security, including security groups, network ACLs and load balancers in cloud environments Strong knowledge of IAM solutions with desired experience in Microsoft Entra ID Strong application and Network security risk assessment skills to identify gaps in security configuration and design Expert-level problem-solving and analytical skills Strong written and oral English communication skills, and ability to convey complex concepts to non-technical constituents Strong Knowledge and understanding of network security frameworks and compliance standards To be considered for this role you will be redirected to and must complete the application process on our careers page. To start the process click the Continue to Application or Login/Register to apply button below.

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

BAE Systems Cybersecurity Jobs in 2025: Your Complete UK Guide to Protecting Governments, Businesses and Critical Infrastructure

From securing the Royal Navy’s new Dreadnought submarines to foiling multimillion‑pound fraud rings, BAE Systems Digital Intelligence (DI)—formerly Detica—sits at the sharp end of global cyber defence. Head‑quartered in Guildford with hubs in Gloucester, Leeds and London, the 5,500‑strong DI business delivers threat‑intelligence platforms, secure‑by‑design software and 24/7 SOC services to government and commercial clients worldwide. With escalating ransomware, AI‑driven disinformation and complex supply‑chain threats, BAE plans to expand its UK cyber workforce by 20 % in 2025. Whether you’re a graduate passionate about reverse engineering, a DevSecOps engineer who loves IaC, or an incident‑response pro comfortable in high‑side environments, this guide explains how to land a BAE Systems cybersecurity job in 2025.

Cyber Security vs. Ethical Hacking vs. Security Analysis Jobs: Which Path Should You Choose?

In an era where data breaches, ransomware attacks, and sophisticated digital threats dominate headlines, the demand for skilled cyber security professionals has never been higher. From global corporations to small businesses, organisations are scrambling to protect their systems, networks, and data from malicious actors. If you’ve been exploring cyber security jobs on www.cybersecurityjobs.tech, you’ve likely encountered various specialised roles—Ethical Hacking (often termed Penetration Testing), Security Analysis, Security Architecture, Incident Response, and more. Yet many job seekers and technology enthusiasts are unsure how these fields overlap or which one is right for them. In this in-depth guide, we’ll demystify three core disciplines—Cyber Security, Ethical Hacking, and Security Analysis—outlining the skills each requires, the responsibilities you can expect, salary ranges in the UK, and typical day-to-day activities. By the end, you’ll have a clearer understanding of these roles, helping you decide which path to pursue in this fast-growing industry. And when you’re ready to take the next step, head over to www.cybersecurityjobs.tech to explore the latest openings and find your perfect match.

Cyber Security Programming Languages for Job Seekers: Which Should You Learn First to Launch Your Security Career?

Cyber security has become a top priority for companies of all sizes, public institutions, and governments. As cyber threats evolve—from sophisticated ransomware attacks to large-scale data breaches—employers are eager to recruit talent with the skills to detect, prevent, and respond to security incidents. If you’re exploring roles on www.cybersecurityjobs.tech, a key question inevitably arises: Which programming language should you learn first for a career in cybersecurity? Cyber security is a multifaceted domain encompassing network security, application security, reverse engineering, digital forensics, ethical hacking (penetration testing), and more. Each niche may have unique language preferences—like Python for scripting tasks, C/C++ for exploit development, or Rust for building secure low-level tools. In this article, we’ll: Highlight the top programming languages used across cyber security. Break down pros, cons, and key use cases for each language. Present a simple beginner’s project for hands-on learning. Share essential resources and tips, so you can stand out in the competitive cybersecurity job market.