Senior Lead, Cyber Security Architect

Northern Trust Corp
London
3 weeks ago
Applications closed

Related Jobs

View all jobs

Security Architect

Senior Security Architect

Senior Cyber Security Architect - Health Sector

Senior Security Architect Government and Public Sector

OT Cyber Security Analyst

Senior Information Security Consultant

Senior Lead, Cyber Security Architect

Apply locations London, United Kingdom time type Full time posted on Posted 2 Days Ago job requisition id R139628

About Northern Trust:

Northern Trust, a Fortune 500 company, is a globally recognized, award-winning financial institution that has been in continuous operation since 1889.

Northern Trust is proud to provide innovative financial services and guidance to the world’s most successful individuals, families, and institutions by remaining true to our enduring principles of service, expertise, and integrity. With more than 130 years of financial experience and over 22,000 partners, we serve the world’s most sophisticated clients using leading technology and exceptional service.

Role/ Department:

Seeking a dynamic engineer who is passionate for cloud and security technologies to be part of a team that develops a product impacting tens of thousands of customers. As an architect in our Data Protection team, you will be responsible for designing, implementing, integrating, testing and deploying features and components in a large-scale system. We expect you to drive improvements to code quality, performance, and team processes while leveraging modern web technologies and tools. You should be able to debug problems arising from implementing data protection technologies and understand the implications of your implementations.

The key responsibilities of the role include:

  • Develops and administers solutions that meet system expectations relative to scalability, performance, fault tolerance, usability, and data integrity.
  • Delivers solutions that meet end user expectations relative to performance, usability and security for the Data Protection Engineering and Architecture function.
  • Uses specific knowledge of a discipline to achieve goals through own work and provides guidance to others as a project manager or consultant.
  • Solves complex problems and works independently with minimal guidance.
  • Acts as a resource for colleagues with less experience.
  • Administer and support Microsoft Purview and Microsoft Defender for Cloud Apps, ensuring optimal performance and availability of the platforms.
  • Configure and manage security settings, policies, and compliance features within Microsoft Purview and Defender for Cloud Apps.
  • Implement and maintain data governance policies and procedures to ensure compliance with regulatory requirements and organizational standards.
  • Monitor and report on compliance metrics, data classification, and data loss prevention (DLP) policies.
  • Work closely with IT, security, and compliance teams to integrate Microsoft Purview and Defender for Cloud Apps with existing systems and workflows.
  • Communicate effectively with stakeholders to report on security incidents, compliance metrics, and recommendations for improvement.
  • Review documentation, processes or procedures, and recommend where automation or improvements can be implemented.
  • Determine operational feasibility by evaluating, analyzing, problem definition, requirements, solution development, and proposing solutions.
  • Operate independently and accomplish engineering and organization mission by completing related results as needed.
  • As subject area expert, provide comprehensive, in-depth consulting and leadership to team and partners.

Skills/Qualifications

  • Proven work experience is required.
  • Proven experience in managing and supporting Microsoft Purview and Microsoft Defender for Cloud Apps.
  • Experience with M365 Services (SPO, Teams, Exchange, Entra ID, etc), Microsoft Sentinel, Zscaler, Symantec DLP is a plus.
  • Strong understanding of data governance, compliance frameworks, and information security best practices.
  • Excellent problem-solving skills and attention to detail.
  • Strong communication and interpersonal skills.
  • Scripting experience, including PowerShell, Python, Power Automate, etc.
  • Ticket and change management experience in ServiceNow.
  • Relevant certifications (e.g., Microsoft Certified: Security, Compliance, and Identity Fundamentals, Microsoft Certified: Information Protection Administrator, CISSP, CISM, CISA, Cisco, SANS, etc) are a plus.

Preferred Skills

  • Experience with data loss prevention (DLP) technologies and strategies.
  • Familiarity with compliance regulations (e.g., GDPR, HIPAA) and data protection laws.
  • Knowledge of cloud security concepts and technologies.

Working with Us:

As a Northern Trust partner, greater achievements await. You will be part of a flexible and collaborative work culture in an organization where financial strength and stability is an asset that emboldens us to explore new ideas.

Movement within the organization is encouraged, senior leaders are accessible, and you can take pride in working for a company committed to assisting the communities we serve! Join a workplace with a greater purpose.

We’d love to learn more about how your interests and experience could be a fit with one of the world’s most admired and sustainable companies! Build your career with us and apply today. #MadeForGreater

Reasonable accommodation

Northern Trust is committed to working with and providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation for any part of the employment process, please email our HR Service Center at .

We hope you’re excited about the role and the opportunity to work with us. We value an inclusive workplace and understand flexibility means different things to different people.

Apply today and talk to us about your flexible working requirements and together we can achieve greater.

#J-18808-Ljbffr

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.