Senior Security Architect, Consulting

Cognizant
London
3 weeks ago
Applications closed

Related Jobs

View all jobs

Security Architect - Senior Associate

Security Architect Senior Consultant

Security Architect Senior Consultant

Principal Security Architect

Global Security Architect

GSEC AI ML Security Architect

The Company

Cognizant (NASDAQ:CTSH) is a leading provider of information technology, consulting, and business process outsourcing services, dedicated to helping the world's leading companies build stronger businesses. Headquartered in Teaneck, New Jersey (U.S.), Cognizant has over 350,000 employees as of January 2024. Cognizant is a member of the NASDAQ-100, the S&P 500, the Forbes Global 1000, and the Fortune 500 and is ranked among the top performing and fastest growing companies in the world.

Cognizant Consulting

At Cognizant, our consultants orchestrate the capabilities to truly change the game across strategy, design, technology and industry/functional knowledge to deliver insight at speed and solutions at scale. Our consulting services elevate the unique abilities and business aspirations of customers and employees and build relationships based on trust and value.

Role Profile

The Security Architect will be a member of a small architecture team comprising application and infrastructure specialists. They will have experience and a strong foundation in the design of secure solutions on AWS Cloud and On-premises Data Centres (DCs). They will have experience in creating high-level designs (HLDs) following application and infrastructure security policies, standards and best practice. They will be able to defend design choices at technical governance forums (e.g., TDA).

Responsibilities

  1. Providing technology leadership, delivering high quality, creative and insightful technology advice; ensuring project success through timely and accurate production of agreed deliverables.
  2. Shaping, leading and delivering value through technology advisory consultancy and guiding transformational delivery engagements.
  3. Strong stakeholder management and relationship building skills at senior levels to enable consensus building and shaping technology direction.
  4. Leading in the development and presentation of client proposals collaborating with teams across our business.
  5. Leading in the development of collateral to support Technology Consulting ‘go to market’ propositions and service offerings.
  6. Farming of accounts - working with account teams to support opportunity identification, qualification and sales.
  7. Contributing to the development of practice members’ skills to ensure a consistency of service delivery and expertise through active coaching and mentoring of junior members of the team.
  8. Developing, implementing and continually refining a coherent approach and appropriate frameworks to support business transformation proposals, including presentations, specimen RFI/RFP content, methodologies, toolkits and deliverables.

Core skills and experience:

  1. Creation of high-level security architecture design (HLD).
  2. Security capabilities in AWS Cloud and Data Centres (DCs).
  3. Knowledge of network segmentation and vulnerability management.
  4. Security: Firewalls, Key Management, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Virtual Private Networks (VPNs), Identity & Access Management (IAM), Application Gateway (ALG).
  5. Technologies: WSO2, Nginx, Entrust, GardDuty, Shield.
  6. Knowledge of security frameworks (NIST, CCM).

Desirable skills and experience:

  1. AWS Certified Security Specialty.
  2. Java security frameworks (e.g., JCA, JAAS, JSSE).
  3. Security technology (e.g., ZTNA, SEIM, XDR, EDR).
  4. Sparx EA.

The Security Architect must be comfortable drafting documents, preparing presentations, researching IT architecture and technology topics, and providing oversight to development teams. They must have the ability to abstract complex themes, problem solve, distil key discussion points, organise work, deliver to tight deadlines, and communicate with non-technical and technical stakeholders.

Security Clearance

Please note that candidates must hold or be able to gain UK SC level Security Clearance or higher. Therefore we can only accept applications from British passport holders who meet this criteria.

#J-18808-Ljbffr

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.