Security Architect Senior Consultant

PA Consulting
Belfast
7 months ago
Applications closed

Related Jobs

View all jobs

Active Directory / IAM Security Consultant

Trainee IT Architect

Enterprise Security Architect

OT Security Architect - Outside IR35 - Midlands (hybrid)

CAS Architect

Data Architect

Company description We believe in the power of ingenuity to build a positive human future. As strategies, technologies, and innovation collide, we create opportunity from complexity. Our teams of interdisciplinary experts combine innovative thinking and breakthrough technologies to progress further, faster. Our clients adapt and transform, and together we achieve enduring results. We are over 4,000 strategists, innovators, designers, consultants, digital experts, scientists, engineers, and technologists. And we have deep expertise in consumer and manufacturing, defence and security, energy and utilities, financial services, government and public services, health and life sciences, and transport. Our teams operate globally from offices across the UK, Ireland, US, Nordics, and Netherlands. PA. Bringing Ingenuity to Life. Job description We believe in the power of ingenuity to build a positive human future. We challenge where it matters and own the outcome. We combine strategic thinking, customer-centric service design, and agile engineering practices to accelerate innovation in a tech-driven world. Why consider joining our Digital & Data community? ?? Join our Digital & Data team working alongside product, design and a wide range of other experts and cross-disciplinary teams to bring ideas to life through innovative software solutions. Grow a flexible and unique career within a trust-based, inclusive environment that values excellence, innovation, and curiosity. You have the option to progress with us on a technical career track. No need to go onto the Partner career track if this doesn't align with what you want to do. Hybrid working - our approach is to be in the office or on client site a minimum of 2 days per week. Work on a broad variety of projects and tech stacks for clients across seven sectors - no project is ever the same Join other experts within our supportive and collaborative tech community through knowledge-sharing and peer-level support, coaching and mentoring Deepen your expertise through our a culture of learning and growth - you'll have budget to take courses (technical and non-technical training), plus gain certifications What you can expect ?? Defining end-to-end security architecture and delivering solutions for projects or programs, creating Conceptual, Logical, and Implementation Architecture views. Designing secure system architectures using patterns and principles to manage business and security risks. Reviewing and enhancing clients' current security measures by applying innovative security architecture solutions. Work to agile best practices and cross-functionally with multiple teams and stakeholders. You'll be using your technical skills to problem solve with our clients, as well as working on internal projects Live in-person whiteboarding sessions to problem solve as a team, alongside asynchronous communication on Teams Hybrid working with the team on client site or in our office a minimum of two days per week. However, the actual time you spend and where you spend it will vary by role or assignment, including up to 5 days per week on a client site. An environment that deeply cares about its values Values | PA Consulting Qualifications Essential requirements ? Even if you don't meet every requirement below, feel free to still apply as we are often hiring for similar roles which your background might be better suited to. You have a solid foundation in information security. You hold relevant certifications (e.g., CISSP, CISM, IISP/CCP, TOGAF, SABSA). You bring a background of delivering security solutions for large-scale infrastructure or integration projects. You thrive in problem-solving and analytical thinking You enjoy collaborating with multiple stakeholders in a fast-paced environment Additional information Assessment process ?? Please note that the interview stages may be subject to change based on the specific requirements of the role. Quick call with one of our Tech Recruiters - to discuss your application, the role and PA Round 1: Either a competency or technical interview (60 mins) Round 2: Either a competency or technical interview, whichever you didn't do at first round (60 mins) Final round ??: Meeting with a PA leader - a mini case study and discussion around your client-centricity (60 mins) Life At PA encompasses our peoples' 's about how we enrich peoples' working lives by giving them access to unique people and growth opportunities and purpose led meaningful work. Our purpose guides how we work with our clients and our teams, and support our communities, to deliver insight and impact, solving the world's most complex challenges. We're focused on building a workplace that values human difference and diverse mindsets, and a culture of inclusion and equality that unlocks the potential in our people so everyone can be their best self. We are dedicated to supporting the physical, emotional, social and financial well-being of our people. Check out some of our extensive benefits: Health and lifestyle perks accompanying private healthcare for you and your family 25 days annual leave (plus a bonus half day on Christmas Eve) with the opportunity to buy 5 additional days Generous company pension scheme Opportunity to get involved with community and charity-based initiatives Annual performance-based bonus PA share ownership Tax efficient benefits (cycle to work, give as you earn) We're committed to advancing equality. We recruit, retain, reward and develop our people based solely on their abilities and contributions and without reference to their age, background, disability, genetic information, parental or family status, religion or belief, race, ethnicity, nationality, sex, sexual orientation, gender identity (or expression), political belief veteran status, or other by any other range of human difference brought about by identity and experience. We welcome applications from underrepresented groups. Adjustments or accommodations - Should you need any adjustments or accommodations to the recruitment process, at either application or interview, please contact us on #LI-SA3 To be considered for this role you will be redirected to and must complete the application process on our careers page. To start the process, click the Apply button below to Login/Register.

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.