Senior Security Consultant (Architect)

Applicable Limited
London
3 weeks ago
Applications closed

Related Jobs

View all jobs

Senior Security Consultant - Security Architecture

Senior Security Consultant, ProServe (ASEAN), Security, Risk & Compliance

Senior Security Consultant (Architecture - IDAM Engineer )

Senior OT Cyber Security Consultant

Security Consultant – PCNSE, Firewalls, Hybrid (3d/w London) Outside IR35 - £600/day

Senior Application Security Consultant

The team you'll be working with:

Senior Security Consultant (Architect)

The team that you’ll be working with:

NTT DATA is one of the world’s largest global security service providers, partnering with some of the most recognized security technology brands. We’re looking for passionate, curious, and motivated individuals to join our team.

What you'll be doing:

Using your background in Security Architecture, you will help our clients:

Security Architecture:

  • Translate business, data protection and security requirements into practical and well-structured architectural designs, utilizing industry best practices and security frameworks (e.g., NIST, ISO 27001, CIS).
  • Develop and maintain secure architectural patterns and standards, with a solid working knowledge of cloud security (AWS, Azure, GCP).
  • Apply risk-based and threat-based approaches to evaluate and recommend appropriate and proportionate security technologies and solutions (e.g., SIEM, IAM, CASB, container security).
  • Outline key security components, interfaces, and dependencies. Develop architectural diagrams and overviews. Document security design principles and provide rationale.
  • Ensure designs align with business objectives, security policies, and industry best practices, with a focus on cloud-native security considerations.

Risk and Threat Management:

  • Conduct comprehensive risk assessments and threat modelling, providing detailed analysis and actionable recommendations.
  • Advise clients on risk mitigation strategies and security best practices, and support the implementation of those strategies, contributing to measurable improvements.
  • Support security incident response and investigations, contributing to thorough post-incident reviews and identifying areas for improvement.

Stakeholder Engagement and Technical Leadership:

  • Provide expert guidance to clients on secure architecture and risk management, participating in technical discussions with stakeholders.
  • Engage with stakeholders to contribute to informed security decisions and communicate complex security concepts effectively.
  • Deliver clear presentations and reports to technical and non-technical audiences and provide technical guidance to project teams.
  • Collaborate with developers, IT operations, and other security team members to ensure effective security integration throughout the SDLC.

Security Policy and Standards Implementation:

  • Advise on the development and implementation of security policies, standards, and procedures, and support their enforcement, including cloud-specific policies.
  • Conduct security compliance assessments and audits, and assist in addressing any gaps, providing recommendations for remediation.
  • Support alignment with relevant security frameworks and regulations, identifying potential compliance issues and contributing to mitigation strategies.

Technology Evaluation, Deployment, and Management:

  • Conduct security architecture reviews and perform security assessments, including vulnerability scanning, configuration reviews, and cloud security posture assessments, identifying vulnerabilities and recommending detailed remediation strategies.
  • Contribute to the development of security architecture roadmaps and strategic plans, and support their implementation, with a focus on continuous improvement.
  • Evaluate and recommend appropriate security technologies and solutions and support the deployment and integration of those technologies.
  • Provide guidance on the implementation of security controls and best practices and support the maintenance and optimization of those controls.
  • Stay updated with emerging threats and technologies, and research and recommend new security solutions.

Presales and Bid Support:

  • Contribute to the development of proposals and statements of work, including defining the scope, approach, and deliverables.
  • Estimate effort, costs, and timelines for security solutions, considering various factors and constraints.
  • Present security solutions and architectures to potential clients, effectively communicating their value and benefits.
  • Support the bid management process by providing technical input, risk assessments, and compliance considerations.

What experience you'll bring:

It starts with amazing people, challenging projects and a work environment that supports the creation of tangible solutions that make an impact. You will need to have a broad experience of security architecture and have evidence of experience in a number of the following fields of expertise:

  • 7+ years' varied experience in information security, data protection, and security architecture roles, with a focus on cloud security, and compliance.
  • Strong understanding of security governance, risk, and compliance frameworks such as ISO 27001, NIST 800-53 / CSF, NIS/NIS2, DORA, UK CNI / OT / IIOT compliance.
  • Hands-on experience building credibility with external stakeholders through technical presentations, audits, or compliance reporting, including enterprise clients, critical system vendors, certification auditors and regulatory bodies.
  • Proven ability to technically guide and mentor teams, as well as influence and collaborate with senior stakeholders in a similar architecture, security, or risk management role.
  • A hands-on approach with the ability to balance project level strategic oversight with direct involvement in security tasks.
  • Excellent communication skills, with the ability to present complex information clearly and effectively to non-technical stakeholders.
  • Strong attention to detail and the ability to deliver high quality work.
  • Experience in presales activities, including contributing to proposals, estimating effort, and presenting solutions.
  • Experience in supporting bid management processes, providing technical input and risk assessments.
  • A valid right to work in the UK.
  • Eligible to obtain UK SC clearance.
  • CISA, CRISC, CISM or CISSP certification a must.

Who we are:

We’re a business with a global reach that empowers local teams, and we undertake hugely exciting work that is genuinely changing the world. Our advanced portfolio of consulting, applications, business process, cloud, and infrastructure services will allow you to achieve great things by working with brilliant colleagues, and clients, on exciting projects.

Our inclusive work environment prioritises mutual respect, accountability, and continuous learning for all our people. This approach fosters collaboration, well-being, growth, and agility, leading to a more diverse, innovative, and competitive organisation. We are also proud to share that we have a range of Inclusion Networks such as: the Women’s Business Network, Cultural and Ethnicity Network, LGBTQ+ & Allies Network, Neurodiversity Network and the Parent Network.

For more information on Diversity, Equity and Inclusion please click here:Creating Inclusion Together at NTT DATA UK | NTT DATA

What we'll offer you:

We offer a range of tailored benefits that support your physical, emotional, and financial wellbeing. Our Learning and Development team ensure that there are continuous growth and development opportunities for our people. We also offer the opportunity to have flexible work options.

You can find more information about NTT DATA UK & Ireland here:https://uk.nttdata.com/

We are an equal opportunities employer. We believe in the fair treatment of all our employees and commit to promoting equity and diversity in our employment practices. We are also a proud Disability Confident Committed Employer - we are committed to creating a diverse and inclusive workforce. We actively collaborate with individuals who have disabilities and long-term health conditions which have an effect on their ability to do normal daily activities, ensuring that barriers are eliminated when it comes to employment opportunities. In line with our commitment, we guarantee an interview to applicants who declare to us, during the application process, that they have a disability and meet the minimum requirements for the role. If you require any reasonable adjustments during the recruitment process, please let us know. Join us in building a truly diverse and empowered team.

Back to searchEmail to a friendApply now

#J-18808-Ljbffr

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.