We are looking for a Lead Security Architect with a passion for Security Architecture to strengthen our Core Team. The ideal candidate would be responsible for driving end-to-end workstreams from the technology perspective, cooperating closely with our Cybersecurity Architects and Consultants.
We need a team member with strong GCP expertise, a strong technical background, excellent architecture skills and an aptitude for global collaboration.
This role will be hybrid visiting clients in London a few days per week.
Responsibilities
Work hand in hand with the cloud migration and security teams to drive cloud transformation from the security standpoint
Manage program streams from the technology perspective
Act as a pivotal point of contact for security architecture matters, liaising with relevant stakeholders, team members and external partners
Support the planning of project deliverables and roadmaps in concert with stakeholders and the cybersecurity lead
Support the team in driving the adoption and ensuring adherence to approved processes, tools and practices by the internal team, fostering a culture of strict adherence to security standards
Requirements
Security or IT-focused university degree (Bachelors) OR equivalent experience
At least 5 years of experience as a Security Architect, ideally in a banking environment
Proven abilities in managing, tracking and progressing deliveries
In-depth knowledge of agile methods, project/program management and project risk management
Relevant certifications such as CCSP, CISM, vendor-specific
Exceptional organizational, leadership and stakeholder management skills
Excellent written and verbal communication skills
Experience in managing a small team, including conflict resolution, performance, leading and coaching
Deep understanding and hands-on experience with Cloud Security in GCP
Knowledge of ITIL, Risk and Compliance Management, Operational Models, Business Continuity Plans and Disaster Recovery Plans would be beneficial
A good grip on cloud security, identity&access management, applied cryptography, network security methodologies and secure development methodologies would be desirable