Software Security Architect

CHAMP Cargosystems
Newcastle upon Tyne
6 days ago
Create job alert

Responsibilities:


The Security Architect reports to the Chief Information Security Officer. The Chief Information Security Officer determines the activities due by the Security Architect based on evolving needs to improve the company’s security posture and to secure CHAMP assets. Examples of the Security Architect’s responsibilities and duties include:


  • Document and address information security, cybersecurity architecture, and systems security engineering requirements throughout the application acquisition or development life cycle.
  • Employ secure configuration management processes
  • Ensure that acquired or developed system(s) and architecture(s) are consistent with the security policies
  • Establish a strategy to implement security-by-design in the software development lifecycle through the development of policies
  • Develop a threat modeling methodology, a framework to define the security requirements per project, a strategy for enabling the automation of Static security testing and dynamic Security Testing through unit security test framework and automated security test cases.
  • Improve the Coding Standard and include security best practices
  • Lead a security awareness program for software development
  • Perform security reviews, identify gaps in security architecture, and develop a security risk management plan
  • Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately
  • Provide specialist advice and recommend approaches across teams and various stakeholders
  • Inspire and influence others to execute security principles
  • Research and apply innovative security architecture solutions to new or existing problems and be able to justify and communicate design decisions
  • Develop vision, principles and strategy for security architecture


Knowledge, Skills and Abilities:


  • CPSA or equivalent highly appreciated
  • CSSLP or equivalent highly appreciated
  • CISSP or equivalent is appreciated
  • Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing)
  • Ability to drive strategy to establish SAST and DAST framework
  • Knowledge of the enterprise information technology (IT) architectural concepts and patterns
  • Knowledge of installation, integration, and optimization of system components
  • Knowledge of remote access technology concepts
  • Knowledge of communication methods, principles, and concepts that support the network infrastructure
  • Excellent communication (written and verbal) English skills



Education and Experience:


  • Bachelor’s Degree graduate in related field of study.Master’s Degree in related field of study is appreciated
  • Experience as a Security Architect role for 3 years preferred
  • Experience in Software Development for 5 years



The selected candidate may be subject to the provision of an up-to-date (not older than 3 months) criminal record certificate.



Security: the successful candidate will have to comply with CHAMP Security Requirements (including but not limited to CHAMP’s IT Security Policies, especially the ISMS Policy and the Acceptable Use Policy, mandatory courses, confidentiality and data protection, use of company assets, and incident reporting).



CHAMP Cargosystems is an equal opportunity employer and prohibits discrimination and harassment of any kind. We are committed to the principle of equal employment opportunity for all employees and to providing employees with a work environment free of discrimination and harassment. All employment decisions are based on business needs, job requirements and individual qualifications, without regard to race, ethnic background, religion or belief, family or parental status, or any other status protected by the laws or regulations in the locations where we operate.

Please note that any personal data that you submit along with your application will be processed by CHAMP and may be processed by any of its global entities as necessary. These data will be treated in strict compliance with the applicable data protection legislation (i.e. the Law of 2 August 2002 on the protection of individuals with regard to the processing of personal data, as amended, and Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016, - the GDPR -, which entered into force on 25 May 2018, as well as any other subsequent regulation).

Further details on what is considered personal data, how it is processed by CHAMP as well as your rights in this regard can be foundhere. Any questions relating to this should be addressed to CHAMP’s Data Protection Officer:

Gertrud Huberty

2, rue Edmond Reuter

Zone d'Activités "Weiergewan"

L-5326 Contern

Luxembourg

Email: (Please do not use this email to send job application)

Related Jobs

View all jobs

Software Security Architect

Software Security Architect

Software Security Architect

Software Security Architect

Senior Software Security Architect

Senior Product Security Engineer

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.

Cyber Security Jobs in the Public Sector: Protecting the UK’s Digital Future

Cyber threats have grown exponentially in recent years, targeting both private businesses and government institutions. As technology becomes ever more embedded in daily life—managing everything from national security to healthcare records—the risk of cyber attacks also increases. In the UK public sector, where vital services and sensitive citizen data are at stake, cyber security has become a top priority. For professionals looking for a meaningful career at the intersection of technology, national security, and public service, cyber security jobs in the UK public sector present an exciting and fulfilling path. In this blog post, we’ll delve into why cyber security is so critical to government agencies, the most in-demand roles, the skills and qualifications required, and how to navigate the application process. By the end, you’ll have a clearer sense of how you can leverage your technical expertise to protect the nation’s digital infrastructure.

Contract vs Permanent Cybersecurity Jobs: Which Pays Better in 2025?

Cybersecurity has become one of the fastest-growing and most crucial fields in modern business. With high-profile breaches dominating headlines and the ongoing digital transformation exposing organisations to new threats, companies across the UK are competing to attract skilled cybersecurity professionals. Roles range from penetration testers (pen testers) and SOC (Security Operations Centre) analysts to compliance officers, cloud security architects, threat intelligence analysts, and CISOs (Chief Information Security Officers). As demand continues to surge, cybersecurity salaries have climbed accordingly, and businesses have turned to more flexible hiring practices. Alongside permanent employment, many professionals explore short-term day‑rate contracting or fixed-term contracts (FTCs), searching for the ideal balance of pay, job security, and growth opportunities. Which arrangement truly pays better in 2025—and which best aligns with your ambitions? In this article, we dive into the contract vs. permanent debate with a focus on cybersecurity roles. We will examine the current market, the structure of day‑rate vs. FTC vs. permanent positions, the pros and cons of each, and some hypothetical pay comparisons. By the end, you should have a clearer sense of which career path might suit your situation and goals—whether you are a seasoned specialist aiming for top rates, or an up-and-coming analyst seeking a stable environment to develop in.