Connecting...

W1siziisijiwmtgvmtivmtmvmdkvmjuvntavmziyl2ljdc5qcgcixsxbinailcj0ahvtyiisijiwmdb4nzawiyjdxq
Job

Security Architect/Consultant (Of all Levels)

  • Job ref:

    CCA/1174721_1657536911

  • Location:

    England

  • Sector:

    ICT

  • Job type:

    Permanent

  • Salary:

    £40000 - £80000 per annum

  • Contact:

    Charlie Cameron

  • Email:

    charlie.cameron@cbsbutler.com

  • Published:

    28 days ago

  • Start date:

    ASAP

Security Architect/Consultant (Of all levels)

+ Risk and Governance
+ Permanent opportunity of varying levels
+ Remote Role, with the office location being Bristol when required
+ Salary from £40,000 - £80,000 DOE

This is a highly rewarding and hands one role with exposure across both traditional and cutting edge enterprise IT as well as bespoke Operational Technology systems with a clear and defined pathway to achieve chartership, NCSC certification and greater responsibility. Your work will see you enable and support in solving customer problems in an agile, innovative and team centric manner. We are after creative, passionate, technically savvy and personable people to help grow our practice and solve some of the most challenging, exciting and critical security challenges to the UK's digital landscape.


What you will do
Relate - Our customers and their problem are at the heart of what we do, as a Consultant you will help to actively listen and empathise with our customers to build intimacy.
Understand - We add value by solving problems, as a Consultant you will help define potential solutions to these problems with only limited information based on your experience and technical knowledge.
Assess - We adopt a risk based approach to any security problem, as a Consultant you will need to identify, measure and analyse the risks attracted by a given digital system and its information assets through the completion of risk assessments and defining and implementing the enabling governance structures that support this process.
Treat - Resolving risks is the technical core of our offering, as a Consultant you will assist in defining appropriate and proportionate security solutions right the way across people, process and technology aligned to the identified risk picture through the creation of security architecture visions, patterns and designs.
Assure - Giving our customers confidence that security is where it needs to be is a key requirement across heavily regulated industries. As a Consultant you will assist in defining, implementing and performing assessments of our customer's environment against a given set of criteria spanning people, process and technology.
Develop - All our offerings are based on a core set of products. As a consultant you will assist in building a viable offering as part of the business winning process for a customer as well as help in the technical development of our products to be used across our customer sectors

What we are looking for
Good understanding of TCP/IP based networking concepts across the OSI model layer as well as the common protocols in use and their risks.
Studying towards recognised professional certifications in Cyber Security or directly equivalent hands on experience.
Experience of assisting with managing project delivery and associated metrics such as time, cost and quality.
Experience of and ability to manage multiple stakeholders and their needs with empathy, finding an appropriate balance of listening and speaking.
An ambitious and creative drive to help safeguard UK national infrastructure and become a recognised cyber expert.
Willingness to gain experience in the development and mentoring of junior team members.
UK SC Clearance or the ability obtain it as well as other more in depth security clearances.
Basic ability in deriving security requirements from functional objectives with [basic] knowledge of the underlying solution and customer/team direction.
Basic ability in supporting in the breaking down, at pace basic functional solutions into simpler constituent parts.
Basic ability in communicating why a basic functional system requires a given security wrapper in a way best suited to a given stakeholder.
Willingness to gain experience and technical depth in either network, application or system security controls in their design and the risks they mitigate.