Security Solution Architect
  • United Kingdom London
  • PwC UK
1 year before
31.12.2023
Protect and Defend
Cyber Defense Infrastructure Support
Job Description

Basic Qualifications

Job Requirements and Preferences:

Minimum Degree Required

High School Diploma

Preferred Qualifications

Degree Preferred:

Bachelor Degree

Preferred Fields Of Study

Information Technology, Computer Systems Analysis, Management Information Systems, Computer Engineering, Computer Programming

Certification(s) Preferred

CISSP, Certified Information Systems Security Professional, International Information Systems Security Certification Consortium (ISC2) Certification, Microsoft Azure Solutions Architect, or AWS Solutions Architect

Preferred Knowledge/Skills

Demonstrates intimate abilities and/or a proven record of success in understanding effective control implementation in the following domains:

Application Security;
Cloud & Services Hosting;
Identity and Access Management;
Data Protection;
Borderless Connectivity;
Endpoint Security; and,
Cyber Security Operations.

Demonstrates intimate knowledge and/or a proven record of success in security technology in the following areas:

Understanding of migration or development experience in one of the major cloud platforms;
Possessing extensive experience in security design review and recommendations;
Being conversant with ISO 27002:2005/2013 information security standard;
Having a working knowledge of user and data driven design approaches as well as understanding industry leading practices for key management;
Demonstrating architectural domain knowledge including cloud application architecture and container-based deployment;
Understanding established Software Development Lifecycles and methodologies including agile, scrum, iterative and waterfall;
Analysing Identity access management integration for projects to assure security;
Identifying complex security vulnerabilities and design compensatory controls;
Analysing network security controls, including firewall and router security configuration;
Working in a complex and matrixed organisation;
Partnering with and enabling the development process to assure that security requirements are met while allowing for maximum speed to market;
Supporting a leading edge development effort by developing standardised reusable security frameworks;
Collaborating with multiple stakeholders across functional and technical skill sets;
Supporting and integrating with key business and strategic priorities;
Working with developers and application architects to make IT security design recommendations;
Assuring that effective design of security controls related to people, process, and technology are in place;
Engaging business and technology stakeholders at all levels to gather long term goals & requirements around system security and usability;
Aligning business requirements to complex security architecture frameworks: Designing and building security technology solutions aligned to a global central service environment;
Translating and communicating complex technical topics into practical business terminology both verbally and in writing;
Managing multiple security assessments and changing priorities, simultaneously; and,
Understanding the functions applied in the support of and integration with key business and strategic priorities.

Not the role for you?

Did you know PwC offers flexible career arrangements and contract work? Learn more.

The Skills We Look For

The PwC Professional is our global framework for defining and encouraging leadership at all levels. Learn more.

The Deal

‘The Deal’, our firmwide Employee Value Proposition’ empowers our people to be the best they can be. Learn more.

Our commitment to you

We’re committed to building a culture that empowers all of our people to thrive and feel a sense of belonging at PwC. Learn more.

Application support

If you’re a person with a disability, if you’re neurodivergent, or if you have a condition that you believe may affect your performance during our selection process, we’ll be happy to make reasonable adjustments to our processes for you. Learn more.

Business Solutions


Quick response

Required Knowledge
  • K0001   Knowledge of computer networking concepts and protocols, and network security methodologies.
  • K0004   Knowledge of cybersecurity and privacy principles.
  • K0005   Knowledge of cyber threats an`d vulnerabilities.
  • K0021   Knowledge of data backup and recovery.
  • K0044   Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • K0061   Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
  • K0179   Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • K0332   Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Required Skills
  • S0007   Skill in applying host/network access controls (e.g., access control list).
  • S0077   Skill in securing network communications.
  • S0367   Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Required Abilities
  • A0123  Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).