Senior Application Security Architect

Experis
Knutsford
8 months ago
Applications closed

Related Jobs

View all jobs

Senior IT Security Specialist

Senior DevSecops Engineer - Outside IR35

Senior DevSecOps Engineer - Outside IR35

Senior Security Engineer

Senior Network Engineer

Senior Customer Deployment Specialist

Role Title: Senior Application Security Architect
Duration: 6 Months
Location: Knutsford (2-3 Days Per Week)
Rate: £825 Per Day - Umbrella only

Would you like to join a global leader in consulting, technology services and digital transformation?

Our client is at the forefront of innovation to address the entire breadth of opportunities in the evolving world of cloud, digital and platforms.

Role purpose / summary

Ensure there is a current Security Architecture defined and maintained for key domains (e.g., Endpoint, Cloud, Network, etc.) which clearly outlines the security principles, requirements and capabilities required and how those are instantiated
Ensure there is an architectural vision for all projects that at minimum has a component architecture and high-level business process defined (including the product owner and operational team)
Ensure architecture artifacts allow to us to quickly answer and evidence routine regulatory queries and attestations
Ensure there is a fit for purpose set of Functional and Non-Functional Requirements for project technology deliveries
Map security tooling deployed in the estate (including non-standard environments and non-CISO managed technologies) to the capabilities it implements (not the set of product features - what is actually in use and operationalised)
Review all planned CEP projects have correctly aligned scope and technology/platform strategy
Provide input to and take ownership of relevant architectural artifacts that will be produced as part of CEP outcomes
Surveil emerging threats and emerging technologies to identify opportunities for targeted innovation exercises such Proof of Value evaluations
Produce patterns which outline solutions for commonly occurring business security needs and security service consumption
Validate patterns are adopted by control domain solutions
Support Security Consultants as required on complex engagements and provide architectural artifacts such as patterns and principles where necessary

General skills/expertise

Ability to collaborate with stakeholders to connect dots and achieve implementation and integration of security capabilities across the organisation
Understand, pioneer and drive continuous learning within the team around evolving technologies, security, and regulatory trends in domain area (e.g., Data Security, Application Security) and identify new opportunities to advance cyber security capabilities in response to them - always driving an outside-in mentality to learn from best in class
Participate in/contribute to security architecture reviews and governance to identify security design gaps in existing and proposed security projects and recommend approaches to resolve them
Engage with development teams to ensure they understand and adhere to critical security requirements across all business applications and drive developers toward preferred approaches for achieving those requirements when available
Able to synthesize and distil key inputs to make rapid and qualified architectural decisions
Able to identify, log, and track key risks arising because of design choices, where appropriate??
Exhibits strong problem-solving capabilities leveraging significant technical knowhow and wider team knowledge?
Can find innovative solutions to issues and achieve stakeholder buy-in?
Able to instil a focus on quality and security first mentality
Strong understanding of the methods and means of cyber-attacks and how to defend against them
In depth technical knowledge of cyber security and continuous integration/continuous delivery development methods
Knowledge of the cyber security marketplace and how to apply its capabilities to solve cyber challenges
Proven ability to drive change / provide thought leadership
Advanced degree and/or work experience in relevant technical topics
Strong written and spoken communications skills including the ability to develop effective messaging for technical, non-technical, and senior leadership audiences

All profiles will be reviewed against the required skills and experience. Due to the high number of applications we will only be able to respond to successful applicants in the first instance. We thank you for your interest and the time taken to apply

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.