Enterprise Security Architect

DevNull Security
Manchester, United Kingdom
2 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Compensation
£ 80K

Job location

Remote
Manchester, United Kingdom

Tech stack

Confluence
JIRA
Authentication Protocols
Computer Security
Federated Identity Management
Identity and Access Management
Kerberos (Protocol)
OAuth
Role-Based Access Control
Sherwood Applied Business Security Architecture
Security Assertion Markup Language (SAML)
Single Sign-On
Software Engineering
UML
User Provisioning Software
Togaf
Information Technology
User Accounts

Job description

Dev/Null Security is actively seeking an Enterprise Security Architects who will be responsible for the strategic direction of a security domain, it's capabilities', technologies, and fundamental business benefits.

As an Enterprise Security Architect you will define, maintain and own the architecture strategy and roadmaps of their domain, ensuring alignment to other business technology strategies and providing design authority sponsorship for security initiatives across the group.

Additionally, you may take over management of security solution architects / design engineers who produce the solution design documentation of technical change and provide assurance of these designs while supporting the delivery of new technology and the teams executing their strategies and roadmaps. This will include liasing with engineers and developers , promoting standardisation, and working tightly with the their security control owner, who work for the CISO, across an organisational boundary., * Produce, manage, and update enterprise reference architecture including strategies, roadmaps, standards, principles, and capability models.

  • Provide assurance, support and oversight of solutions designs and support the engineering teams in delivering and executing strategic technology deployments.
  • Ensure solution designs align to published reference architecture.
  • Provide technical expertise & consultation to transformative programmes of work within their security domain.
  • Influence business and technology executives to help them align their initiatives with standardised offerings whilst also engaging with them to understand their business requirements, threats and risks.
  • Clear understanding of both the motivations of the business and technical security.
  • Promote strong documentation and clerkship.

Governance:

  • Willingness and ability to present reference architecture to design authorities and articulate deep technical concepts to a broad range of stakeholders in both large forums and smaller deep-dive sessions.
  • Ensures all reference architecture, high-level designs, architecture patterns, decision records, deviation requests, and technical risks or issue records undergo architectural and project governance processes.
  • Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation.
  • Present publications at technical design authorities for input, feedback, and approval.

Risk and Dependency Management:

  • Effectively manages and escalates both technical and project risks or issues
  • Articulates solutions and remediation steps to technical risks & issues
  • Ability to map design decisions to resultant technical risks & issues to articulate the cause and rationale which leads to any negatively impacting change

Leadership & Teamwork

  • Lead & own the strategic direction in their domain of expertise to ensure that security capabilities continuously mature in order to increase the overall security posture of the business.
  • Lead others and create an environment that supports and inspires people to develop and deliver.
  • Built effective networks both internally and externally and created opportunities for others to work collaboratively.
  • Make strategic business decisions, considering relevant risks, long term implications, commercial realities and stakeholders needs.
  • Willingness and ability to work across information technology as a cybersecurity SME
  • Mentor less experienced members of staff and promotes understanding of the value of architecture and the appropriate use of technologies and standards.

Working at DevNull Security

While DevNull Security is a remote-first company, our consulting team are required to travel to client sites 3 times per week, depending on project and customer needs.

We believe that a career in cybersecurity should be accessible to everyone. We actively welcome applicants from all walks of life, regardless of race, ethnicity, gender identity, age, sexual orientation, disability, neurodiversity, socioeconomic background, or any other aspect of identity.

As a growing company, we're committed to fostering an inclusive, equitable, and accessible hiring experience. We proactively offer adjustments during application and assessment - tell us what you need.

Requirements

Do you have experience in SSH?, Do you have a Bachelor's degree?, Significant experience and proven technical depth within identity & access management, including;

  • User Provisioning and De-provisioning: Automating the creation and removal of user accounts and access rights.
  • Role-Based Access Control (RBAC): Assigning permissions based on user roles within the organisation.
  • Federated Identity Management: Enabling identity sharing and single sign-on across different organisations or domains.
  • Privileged Access Management (PAM): Securing, controlling, and monitoring access to critical systems by privileged users.
  • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML.
  • Secrets Management: Provide assurance that resources across tool stacks, platforms and cloud environments can only be accessed by authenticated and authorised entities.
  • Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level
  • Experience and understanding of both the roles and interlock between enterprise & solution architecture
  • Experience in both operational and transformation cybersecurity roles or a clear working understanding of both perspectives
  • Experience working in large-scale IT transformation programmes, * Masters or doctorate degree in cybersecurity, computer science, software engineering, or related field preferred .
  • CISSP/CISM certification or other broad cybersecurity industry-recognised certificate preferred.
  • SABSA or TOGAF certified preferred.

Platform & Technology:

  • BizzDesign, Archi, or generic UML visualisation experience for high-level designs.
  • High proficiency and expertise in Jira for project & tasks management.
  • Working proficiency in Confluence for documentation.

Apply for this position