Security Architect
  • United Kingdom London
  • ClickJobs.io
1 year before
31.12.2023
Securely Provision
Systems Architecture
Job Description

Security Architect. Location
• London
• Manchester
• Hybrid working model. Competitive Salary plus benefits.. Collect business requirements for security improvements. Identify gaps in current architecture, focusing on security controls. Collaborate to the creation of roadmaps to deliver against based on available, planned, and unknown service provision. What will you be doing? Review of the existing DCC Security Architecture for Enterprise. Creation of a roadmap to implement the architectural building blocks. Creating traceable requirements from business requirements through to technical controls. Work in cooperation with Enterprise Architects (EIT function) to assure that business requirements are implemented in the Design phase. Work in cooperation with Enterprise Architects (EIT function) to relay technical requirements to service provider delivery teams. Leading technical meetings with service providers. What we are looking for. The Security Architect must have experience of complex environments. This will preferably include experience of outsourced environments, Group/Market (hub and spoke) organisations, systems integrators. Any telecoms and/or energy background would be a bonus. They will be able to process conflicting project requirements into a strategic framework and drive delivery with several diverse stakeholders. The architectural approach does not have to follow a designated framework (TOGAF, SABSA, etc.) but the candidate must be able to demonstrate a logical approach to delivery of components and show a roadmap with dependencies, business requirements and next steps required from additional stakeholders. The successful candidate will have worked as a consultant or architect reporting into C-level. They must be able to understand and explain Security Strategy in detail, and justify why strategic decisions are made, even when it means delaying tactical decisions that could show quick wins or progress. Skills and Experiences Desirable. Familiarity and previous experience with the SABSA model are desirable. Knowledge and familiarity with the CSA Cloud Controls Matrix is beneficial. Familiarity with the ArchiMate modelling language is desirable. About the DCC: At the DCC, we believe in making Britain more connected, so we can all lead smarter, greener lives. That desire to make a difference is what drives us every day and it wouldn’t be possible without our people. Each person at the DCC brings a special kind of power to the business, and if you join us, we’ll give you the means to unleash yours. Here, we depend on each other and hold each other accountable. You have the power to challenge and make change, to take the initiative and enjoy real responsibility. Whether it’s doing purposeful work, helping us grow or building the career you want – we’ll give you the support to do it all. Our secure network for smart meters is transforming Britain’s energy system and helping the country’s fight against climate change: we want you to be part of our journey. Company benefits: The DCC’s continued success depends on our people. It’s important to us that you enjoy coming to work, and feel healthy, happy, and rewarded. In this role, you’ll have access to a range of benefits which you can choose from to create a personalised plan unique to your lifestyle. If there are any questions you’d like to ask before applying, please contact K aren Esson. Your application will be carefully considered, and you’ll hear from us regarding its progress. Join the DCC and discover the power of you. What to do now. Choose ‘Apply now’ to fill out our short application, so that we can find out more about you. please contact karen.esson@capita.com. Capita Opportunity Statement The parent company, Capita Plc*, are a leading UK provider of technology enabled business services. We’re supporting and improving the lives of millions of people every day and we can only do this with the right people in place, working towards a shared goal. We encourage an open, honest working environment where everyone can be true to themselves, and people are valued for their differences. We’re always challenging each other to learn and improve, because we know when we work together, we can deliver better outcomes. We work across such a huge range of businesses and sectors, that you’ll have the opportunity to grow and develop your career in any number of directions. You’ll also become part of a network of 63,000 experienced, innovative, and dedicated individuals across multiple disciplines and sectors. There are countless opportunities to learn new skills and develop in your career, and we’ll provide the support you need to do deliver. Our purpose is to create a better outcome for you.


Quick response

Required Knowledge
  • K0001   Knowledge of computer networking concepts and protocols, and network security methodologies.
  • K0004   Knowledge of cybersecurity and privacy principles.
  • K0005   Knowledge of cyber threats an`d vulnerabilities.
  • K0024   Knowledge of database systems.
  • K0027   Knowledge of organization's enterprise information security architecture.
  • K0028   Knowledge of organization's evaluation and validation requirements.
  • K0035   Knowledge of installation, integration, and optimization of system components.
  • K0043   Knowledge of industry-standard and organizationally accepted analysis principles and methods.
  • K0044   Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • K0200   Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
  • K0203   Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
  • K0211   Knowledge of confidentiality, integrity, and availability requirements.
  • K0293   Knowledge of integrating the organization’s goals and objectives into the architecture.
  • K0092   Knowledge of technology integration processes.
  • K0260   Knowledge of Personally Identifiable Information (PII) data security standards.

Required Skills
  • S0024   Skill in designing the integration of hardware and software solutions.
  • S0367   Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • S0061   Skill in writing test plans.
  • S0139   Skill in applying security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).

Required Abilities
  • A0008  Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).
  • A0051  Ability to execute technology integration processes.
  • A0123  Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • A0148  Ability to serve as the primary liaison between the enterprise architect and the systems security engineer and coordinates with system owners, common control providers, and system security officers on the allocation of security controls as system-specific, hybrid, or common controls.
  • A0149  Ability, in close coordination with system security officers, advise authorizing officials, chief information officers, senior information security officers, and the senior accountable official for risk management/risk executive (function), on a range of security-related issues (e.g. establishing system boundaries; assessing the severity of weaknesses and deficiencies in the system; plans of action and milestones; risk mitigation approaches; security alerts; and potential adverse effects of identified vulnerabilities).