National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Senior Security Architect

Pontoon
Bristol
3 weeks ago
Applications closed

Related Jobs

View all jobs

Senior IT Security Officer

Senior Security Consultant - Transformations

Senior Security Engineer, AWS Security

Senior Security Engineer

Senior Application Security Architect

Senior Application Security Architect

Job Title: Security Architect
Contract Duration: 6 Months
Location: Edinburgh, Leeds, Halifax, Manchester, Birmingham, Bristol (2 days a week onsite)
Working Pattern: Full Time
Rate: Highly competitive rate available for suitable candidates

Are you ready to take on a pivotal role in shaping the security landscape of an esteemed organisation in the Banking and Financial Services industry? We are on the lookout for dynamic Security Architect to join our team for a 6-month contract in 2025! This is a fantastic opportunity to contribute to our Group Security Reference Architecture (GSRA) and ensure our security artefacts meet the highest standards.

Required Skills:

Systems Design - Designs and review system architectures through the application of patterns and principles, which support associated security designs.
Research & Innovation - Advises on developments to security properties in technology. Provides input in identifying new technologies and design their use in a business context.
Security Technology - Explains the effectiveness of current and future security designs and can create supporting guardrails and patterns based upon these technology solutions. Shares information on a range of systems but may specialise in one.
Security Transformation Activity - interprets and applies an understanding of policy and process, business architecture, and legal and political implications to assist the development of technical solutions or controls.
Artefact Management - responsible for the assessment and cataloguing of artifacts, ensuring that each item is accurately documented and stored under optimal digital conditions. This involves conducting regular inventory checks, updating records in management systems, and maintaining the digital space where artifacts are housed.
Customer - Independently understands the end-to-end journey. Integrates insights and knowledge from disparate data, processes and systems which are relevant to the customer journey. Defines high-level requirements and supports incubation of new solutions to address customer problems.

What You'll Do:

As a Security Architect, you will be at the heart of our security initiatives, responsible for:

Creating and Managing Security Artefacts: Develop, launch, and maintain artefacts that articulate security requirements and solutions, guiding engineers through LBG's security landscape.
Collaborating with Teams: Work closely with product owners, operations teams, and security engineers to document and uphold security artefacts in alignment with policies and best practises.
Risk Analysis and Mitigation: Assess risks associated with processes, software, and hardware artefacts, implementing robust security measures.
Staying Ahead of Trends: Keep abreast of the latest security trends and technologies, ensuring that our security reference architecture remains valuable and insightful.

Core Competencies:

We are looking for candidates who excel in the following areas:

Security Content Creation: Lead and execute the creation of clear and effective security artefacts.
Analytics and Problem Solving: analyse complex problems and design solutions that achieve business outcomes.
Stakeholder Management: Build and improve relationships with stakeholders, managing priorities and facilitating discussions.
Communication: Clearly convey security concepts to both technical and non-technical audiences.
Direction & Decision Making: Provide guidance to security product owners, defining the direction for security technology solutions.

Key Technologies You'll Work With:

Governance, Risk, and Compliance (GRC)
Endpoint Protection (e.g., Sentinel One, Microsoft Defender)
Identity Access Management (e.g., Ping, SailPoint)
Network Security Solutions (e.g., Akamai, F5)
Cloud Security Technologies (Google & Microsoft)
Data Security Measures (AI, PGP Encryption)

Why Join Us?

Exciting Challenges: Engage in transformative security projects that make a real difference.
Collaborative Environment: Work with talented professionals who inspire and support each other.
Career Growth: Enhance your skills and expand your expertise in a leading financial services organisation.

If you are passionate about security and looking to make a meaningful impact, we want to hear from you! Apply now and be part of our journey towards a safer financial future.

Pontoon is an employment consultancy. We put expertise, energy, and enthusiasm into improving everyone's chance of being part of the workplace. We respect and appreciate people of all ethnicities, generations, religious beliefs, sexual orientations, gender identities, and more. We do this by showcasing their talents, skills, and unique experience in an inclusive environment that helps them thrive. If you require reasonable adjustments at any stage, please let us know and we will be happy to support you

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

LinkedIn Profile Checklist for Cybersecurity Jobs: 10 Tweaks to Supercharge Recruiter Engagement

In the ever-evolving realm of cybersecurity, having a LinkedIn profile that reflects both your technical prowess and threat-hunting acumen is vital. Organisations are on the lookout for professionals skilled in penetration testing, incident response, security architecture and compliance. With hiring managers scanning dozens of profiles daily, your profile needs to not just rank in searches but convey your expertise in safeguarding digital assets. This step-by-step LinkedIn for cybersecurity jobs checklist offers ten practical tweaks to supercharge recruiter engagement. Whether you’re an aspiring security analyst, a seasoned penetration tester or a chief information security officer aiming for board-level roles, these actionable optimisations will sharpen your LinkedIn presence and position you as a top infosec candidate.

Part-Time Study Routes That Lead to Cyber Security Jobs: Evening Courses, Bootcamps & Online Masters

The frequency and sophistication of cyber-attacks have exploded in recent years, making cyber security one of the UK’s most in-demand skill sets. From safeguarding NHS patient data to defending FTSE 100 financial systems, organisations across sectors require qualified professionals—penetration testers, security analysts, incident responders and security architects—to protect critical infrastructure. Yet many professionals cannot pause their careers to upskill full time. Fortunately, an ecosystem of part-time learning pathways—evening courses, intensive bootcamps and flexible online master’s programmes—enables you to learn cyber security while working. This comprehensive guide explores every route: foundational CPD, immersive bootcamps, accredited online MScs, plus funding options, planning strategies and a real-world case study. Whether you’re an IT support technician, a software developer or a compliance manager aiming to pivot into security, you’ll discover how to build expertise at your own pace.

The Ultimate Assessment-Centre Survival Guide for Cyber Security Jobs in the UK

Assessment centres for cyber security positions in the UK are designed to mirror real-world threat landscapes and test both your technical acumen and soft skills under pressure. Across multiple stages—psychometric assessments, penetration testing exercises, incident response group tasks, case studies, interviews and even informal networking breaks—employers assess your ability to identify vulnerabilities, collaborate in high-stakes scenarios and communicate effectively. This guide walks you through each component, equipping you to stand out and secure your next role in cyber defence.