Advance Search

Browse Jobs

ZTA Architect

Posted 25 days ago

  • Reading, Berkshire
  • Any
  • External
  • Expires In 2 months
Job Title:
Remember to check your CV before applying Also, ensure you read through all the requirements related to this role.
ZTA Architect
Location:
Reading (On site)
Day rate
-£550 --£600
Duration of Assignment:
6 Months
Number of Positions:
1
Role Description:
We are looking for an experienced ZTA Architect with 8 to 10 years of technical experience in two or three security domains (Network Security, IT Security, Cloud Security, Identity and Access Management, Application Security, Data Security, PKI & Encryption) at the enterprise level. This role will have a significant impact by ensuring the implementation of key security projects using cutting-edge technologies.
Key Responsibilities:
Review and validate the architecture and design of new and existing projects (IT Infrastructure Projects, Applications) against industry standards, organization’s architecture principles, and design patterns. Highlight risks and areas for improvement.
Ensure adherence to applicable compliances, security policies, and regulatory requirements.
Understand and document business requirements for cybersecurity projects, map them to functional/non-functional requirements, identify appropriate technologies, and evaluate market tools to meet business needs.
Utilize knowledge of Secure Design Principles, Zero Trust Principles, Secure SDLC, and Telecom Security (4G, 5G, IoT).
Produce technical documents and artifacts in line with customer expectations as per the agreed project plan.
Engage with customers and ensure representation in governance forums.
Train offshore resources to support the project post-implementation from offshore.
Key Skills/Knowledge/Experience:
Technical expertise in Enterprise Security Technologies such as IDAM, PKI & Data Security, Infrastructure & Network Security Tools, Application Security, Cloud Security.
Understanding of Security Architecture Frameworks like SABSA and TOGAF to align security requirements with business requirements.
Familiarity with Control Frameworks like ISO 27001 and CoBIT for determining technical controls.
Understanding of NIST-based Zero Trust Standards.
Proven experience in establishing Zero Trust-based architecture for key use cases (Identity-Driven ZTA, Micro-segmentation based ZTA).
Experience in designing and drafting various security architectural and design principles.
Extensive experience in creating enterprise security architecture documents and designs for key security controls.
Over 15 years of experience with certifications such as CISSP, CCSP, SABSA/TOGAF.
Apply