Senior Security Solutions Architect

DXC
gb
1 month ago
Create job alert

Job Description:

Responsibilities

Opportunity Analysis

  • Understanding which security offerings best addresses customer needs and business requirements
  • Ongoing qualification of solution merits


Solution Design and Development

  • Providing security solutions to meet client's requirements and being able to adapt to new requirements
  • Addressing Security and Compliance requirements
  • Optimizing security solutions plus broader customer IT strategy
  • Taking end to end view of solution, ensuring elements within their responsibility deliver against the defined business outcomes, using standard components
  • Working with financial analysts to validate results versus applicable criteria
  • Capturing and highlighting risks and any associated costs
  • Modelling multiple offerings/components of security domains
  • Understanding interaction of deal variables (compliance, volumes, services, service level agreements, locations, and more) between tower components
  • Delivering and owning accurate financial models that are logically structured and reflect technical solution


Solution Leadership

  • Experience in directing solution activities
  • Ability to lead service element integration
  • Providing security solutions to meet client needs inclusive of Regulatory and Compliance requirement and being able to adapt to new requirements


Solution-Pursuit Integration

  • Anticipating, communicating and solution to optimize inter-tower dependencies, overlaps, staff sharing etc
  • Effectively integrating client tools, process adoption and delivery startup/transition needs
  • Clearly defining all risks through governance process and working to mitigate


Client/Customer/Account Relationship

  • Understanding and addressing CISO / CxO issues
  • Applying consultative selling techniques to advance opportunities
  • Participating in supports negotiation of technical contract elements
  • Providing solution advice, driving proposals, presentations, and other customer communications during pursuit
  • Input to security offering teams to bring in changes to offerings as per latest security trends and compliance needs


Required

  • 5-10 years in IT Security, mainly as one of follows Security Pre-Sales, Security Engineering, Cyber Security Consultant and Solution Architect.
  • Technical University or bachelor's preferred.
  • Preferred experience in Central Government/UK Public Sector/CNI.
  • Understanding of NCSC Secure design principles, NCSC Cloud Security Principles and NIST framework would be beneficial.
  • Good exposure to pre-sales role involved in Cyber Security Solutioning and understanding the Security Market.
  • Involvement in architecting and proposing cyber security solutions to customer, experience in Managed Security Services market
  • Broad knowledge of outsourcing services and solutions with expertise in area of specialisation
  • Preferably having any of Security certifications like - CISSP, CCSP, CISA and/or Security Product certifications. ITIL and PMP certifications are good to have.
  • Good understanding of Security Risk & Compliance domain, Regulatory and Compliance requirements
  • Ability to work as lead for components of large complex projects.
  • Good proposal writing and presentation skills in English.
  • Must be able to obtain or hold UK BPSS/SC Clearance (Must be resident for minimum 5 years in UK)


Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .

Related Jobs

View all jobs

Senior Security Consultant (OT)

Senior Security Consultant (OT)

Senior Security Engineer | London, UK | Hybrid (London)

Senior Security Engineer (London)

Senior Product Security Architect

Network Security Engineer – Checkpoint SME

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.