Cyber Solutions Architect

Firma: CV-Library
Druh práce: Plný úvazek
Plat:
80 000 - 85 000 GBP/Rok

MBR partners are working with a UK based Telecommunication client that offers digital identity solutions that allow enterprises, such as banks, to verify Mobile Service Provider information via an API, for the purpose of building up fraud scores for transactions. For example, companies would be able to understand location information about a subscriber's handset when a transaction is happening (ie is the person roaming). Other examples include information related to Sim-swaps and whether someone might be on an active call and potentially being coerced into making a transaction.

The client works on a revenue split with all the Mobile Network Operators in Germany and Austria and offers the solution to fraud platform companies / local channel partners that incorporate the data into their solutions (with the bank being in the end customer).
The role is with a fast growing business Fraud Prevention Services Business Unit of a 150 million USD revenue global solutions provider.

The Security Solution Architect works within the cybersecurity consultancy, risk and advisory unit which is part of the Global Solutions team. The role involves providing regular
cybersecurity, risk and compliance services/assessments, reports and prioritised recommendations as well as consultative support to their clients while partnering with internal
leadership teams and colleagues in helping the  clients protect their digital assets, information, and systems from cyber threats and vulnerabilities. A crucial function of the role
includes designing and tailoring these services for inclusion in  the clients  product/services portfolio. Ideally you will be in presales or a technical solutions architect able to advise on the gap analysis  of differing threat levels.

ResponsibilitiesKey responsibilities and accountabilities
1. Design and recommend security architectures, solutions, and controls to protect
client critical assets and data.
2. Develop and help customers implement incident response plans, which outline steps
to take in case of a security breach.
3. Perform security assessments for customers, including penetration testing, to identify
weaknesses in systems and networks and propose mitigation plans where required
4.Recommend, design and implement security tools and technologies such as
firewalls, intrusion detection systems, endpoint protection and distributed denial of
service (DDoS) mitigation solutions.
5.Build strong relationships with customers, providing ongoing cybersecurity
consultation and support. Communicate findings and recommendations effectively
and develop strategies and roadmaps for improvement.
6. Ensure technical implementation and customers’ business requirements are aligned
by ensuring that controls, processes and procedures are documented for the
business’s operational team.
7. Lead in risk advisory services to their  customers which entails developing associated
cybersecurity services for their service portfolio.
8. Ensure that the client delivers contractual security requirements for managed service
customers by:
 -Acting as a point of contact between the sales and operational teams during
contract negotiations
- Performing gap analysis and risk assessments on solutions in-flight and in
future contractual commitments
-  Identifying security deliverables, creating work packs and ensuring handover
into operational delivery9. Liaise and manage internal and 3rd party suppliers in the deployments of element or
the total solution relating to cybersecurity.

Required

 Degree or equivalent experience in Computing/IT Security/Cyber
 Experience in IT, Cyber and Information Security technologies and products
 Excellent written and verbal communication skills
 Eagerness to develop their skills and understanding of all information security
domains
 Ability to perform to tight deadlines
 Relevant risk and/or security industry certification(s) such as Certified in Risk and
Information Systems Control (CRISC), Certified Information Security Manager
(CISM), Certified Information Systems Security Professional (CISSP), Certified
Ethical Hacker (CEH).
 Must possess the ability to follow and/or create/ modify operational and technical
procedures and/or best practice documents.
 Experience in constructing comprehensive quotes and proposals
 Experience in consultative sales and communicating value propositions

Please ignore salary details - this role is flexible

Apply for this job