CISO Security Architect

Anderlecht, Fujitsu
4 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Senior

Job location

Tech stack

Artificial Intelligence
User Authentication
Business Software
Cloud Computing
Cloud Computing Security
Computer Security
Identity and Access Management
Key Management
Network Architecture
Public Key Infrastructure
Cloud Services
Sherwood Applied Business Security Architecture
SAP Applications
SharePoint
Security Information and Event Management
Data Streaming
Data Logging
Archimate
Information Technology

Job description

The Security Architect translates the CISO's strategic directions into concrete and robust technical solutions. The Security Architect ensures consistency, regulatory compliance (NIS2, GDPR, ISO 27001, IEC 62443…), and the effectiveness of security measures across the entire organization, particularly in the context of critical services and vital infrastructures. The Architect contributes to an integrated security architecture covering IT, OT, cloud, and network environments, leveraging Archimate models and functional frameworks such as CyFun and ISO 27001 to ensure traceability and governance of security capabilities, thereby guaranteeing resilience and business continuity. MAIN ACTIVITIES Security Architecture

  • Design, formalize, and evolve the target security architecture, integrating requirements from the early stages of project design (Security by Design, Privacy by Design).

  • Define security architecture standards, models, and principles in alignment with the organization's strategic directions.

  • Integrate key security domains (network, cloud, IT/OT/IoT, ICAM, data, cryptography, etc.) into a coherent and modular vision.

  • Lead or contribute to security intake processes and architecture committees to ensure alignment of solutions with the target architecture. Risk Management

  • Perform technical and architectural risk assessments on projects, infrastructures, business applications, support applications, and industrial systems.

  • Identify threats, vulnerabilities, and attack scenarios, and recommend appropriate mitigation measures.

  • Maintain a consolidated and up-to-date view of risks across various domains, including ERP systems (SAP), IT/OT/IoT environments, the use of Artificial Intelligence, access management, and interapplication data flows. Standards, Compliance, and Governance

  • Contribute to drafting and updating technical security standards, ensuring their alignment with legal requirements and reference frameworks (CyFun, ISO 27001, IEC 62443, NIST, NIS2, GDPR, etc.).

  • Contribute to security governance committees to guide technical decisions.

  • Ensure consistency of architectural principles with internal standards and maintain traceability of decisions.

  • Participate in coordination with competent authorities when necessary. Support and Advisory

  • Assist project, IT, OT, and business teams in integrating security requirements, including in complex contexts (SAP integration, IT/OT convergence, cloud solutions, access management).

  • Provide support during design phases, solution analysis, or procurement processes (RFI/RFP).

  • Ensure the alignment of critical architectural components (ICAM, detection and response solutions, cryptography, etc.) with overall security objectives and the IT roadmap. Continuous Improvement, Security and Technology

  • Monitor the evolution of threats, technologies, regulations, and governance models, identifying innovation opportunities.

  • Propose continuous improvements to strengthen the security posture, including detection and response, logging, resilience, and identity management.

  • Promote modeling, reusability, and consistency of architectural components

Requirements

  • Bachelor's degree in Cybersecurity, Computer Science, or related field; Master's strongly preferred.

  • Minimum of 5 years of experience in a similar role within complex hybrid environments (IT, OT, IoT, Cloud, ERP).

  • Strong knowledge of regulations, standards, and frameworks: CyFun, ISO 27001, NIST, IEC 62443, NIS2, GDPR, CIS Controls, etc.

  • Ability to develop and maintain security processes, policies, and standards aligned with business objectives and regulatory frameworks.

  • Broad technical expertise in several of the following areas: o Network architecture, segmentation, Zero Trust models, and Cloud Security

  • Secure SAP integration

  • ICAM (IAM, IGA, PAM, federation, provisioning, physical/logical access management)

  • Cryptography (PKI, key management, strong authentication)

  • XDR, SIEM, monitoring, and auditing

  • Secure use of Artificial Intelligence and generative models

  • Proficiency with architecture modeling tools and languages (e.g., Archimate). Certifications:

  • Strongly preferred: CISSP

  • Other valued certifications: CISM, CISA, ISO 27001 Lead Implementer, SABSA, or any other certification recognized in the field of cybersecurity. Behavioural Competencies

  • Excellent communication, synthesis, and simplification skills.

  • Ability to interact with diverse stakeholders (technical teams, business units, executive management).

  • Structured, critical, and solution-oriented mindset, capable of challenging and proposing improvements. * Autonomy, rigor, strong sense of priorities, and change management skills. Conformity Criteria

  • Bachelor's degree in Cybersecurity, Computer Science, or related field; Master's preferred.

  • 5-10 years of experience in Cybersecurity architecture or risk assessment, or in a similar role. Evaluation criteria

  • Ability to develop and maintain security processes, policies, and standards that align with business objectives and applicable regulatory frameworks, including European Union and Belgian laws, as well as ISO 27001, IEC 62443, and the NIST SP series.

  • Minimum of 5 years of experience in a similar role within complex hybrid environments (IT, OT, IoT, Cloud, ERP)

  • Experience in designing and implementing security architecture across network, application, data (network, SAP, ICAM, Authentication and authorization protocols, PKI, XDR, SIEM, Monitoring, auditing, AI, Cloud)

  • Expertise in risk assessment and gap analysis

  • Proven experience in large-scale security projects or industry-specific implementations

  • Proficiency with architecture modeling tools and languages (e.g., Archimate)

  • Certifications (Strongly preferred: CISSP); Other valued certifications: CISM, CISA, ISO 27001 Lead Implementer, SABSA, or any other certification recognized in the field of cybersecurity.

  • Excellent communication, synthesis, and simplification skills.

  • Ability to interact with diverse stakeholders (technical teams, business units, executive management).

  • Structured, critical, and solution-oriented mindset, capable of challenging and proposing improvements.

  • Autonomy, rigor, strong sense of priorities, and change management skills

Apply for this position