Cyber Security Solutions Architect

55000.00 - 75000.00 GBP Annual + GBP55000 - GBP75000/annum
17 Jun 2019
03 Jul 2019
Contract Type
Cyber Security Solutions Architect

• To lead the Cyber Security offering across the business to provide customer focused solutions that deliver the best outcomes for our customers.

• Provide input to assist with business development opportunities and provide Project Management of newly won contracts, including leading through all phases of the project or work cycle.

• Accountable for cyber service delivery in all sectors; meeting project time scales, KPI targets, quality compliance, safety requirements, continuous improvement and delivering the budgeted margin.

• Accountable for meeting all contractual obligations and meeting, and where possible exceeding, customer expectations.

• Support the business by representing the business in their area of expertise, developing and owning (as appropriate and agreed) specific customer relationships and building the company's reputation.

• Own the driving of continuous improvement and sharing of best practice for all aspects of the technical design, development, deployment and delivery of each project or contract relating to cyber security.

• As Cyber Security Solutions Architect support the Business Manager Service & Support in developing a growth strategy in their particular market sector and implement the Operational Delivery Plan.

• Work collaboratively with all Business Units to develop effective matrix management working, embedding effective governance, resource & risk management, and leveraging best practices.

Reason for Role:

The Cyber Security Solutions Architect will be responsible for all engineering aspects of their particular offer, and particularly delivering their elements of the projects or contracts with the agreed margin and where required helping to generate and meet the sales budget.

The Cyber Security Solutions Architect will report to the Business Manager S&S and support the business strategy by developing the Business Cyber Security offer and leading project and engineering delivery within the Business Units to budget and project time scales whilst exceeding customer expectations.

The Cyber Security Solutions Architect will report to the Business Manager for Service & Support and will help in developing the Cyber Security business offering by leading project and engineering delivery within the Business Units to budget and project time scales whilst exceeding customer expectations.

• Ensure the Cyber component of the project is delivered to plan and as sold budget

• Gross margin protection

• Customer satisfaction

• Organic growth

• Utilisation

Essential Requirements

• Educated to degree level (or equivalent).

• Experience and good understanding of the company's Cyber Security capability, markets (e.g. Power Generation, Nuclear, Power Distribution or similar) and service offering

• Solid understanding of the Cyber and Security market and industry, with ability to apply insights into decision making.

• Understanding of internal networks and politics within the business and marketplace and evidence of leveraging this knowledge to navigate complexity.

• Able to demonstrate stakeholder management and the ability to develop effective relationships at all levels.

• Build and maintaining strong relationships with internal and external customers and key business stakeholders.

• A drive for outstanding customer service and high performance culture.

• Ability to create and communicate a compelling vision and sense of purpose that motivates teams at all levels.

• Strong networking and influencing skills, both with internal and external stakeholders.

• Ability to lead a step change in performance through operational improvement

• Excellent communication skills with the confidence and ability to deliver formal reports and presentations both internally and externally.

• Understand the principles of matrix management and apply these to their operation.

• Builds effective partnerships with high-level stakeholders.

• Ability to apply practical and pragmatic understanding of service delivery, meeting customer's expectations, commercial negotiations and project management.

• Comfortable at operating in an engineering and non-engineering environment, meeting specific accountabilities.

• Customer retention/satisfaction.

• Knowledge and use of Lean techniques

Essentials Qualifications;

CISSP - Certified Information System Security Professional.

CEH - Certified Ethical Hacker; This is a very low grade exam for penetration testing but essentially is a driving license

CSTM/QSTM - CHECK Team member


OSCP - Offensive Security Certified Professional

Check team leader status (CTL)

Knowledge in IEC 62443; Industrial Network & System Security. This is a standard that A LOT of our customers work too.

Ideally we want someone who has got knowledge and exposure to this list:

Windows Server Platform

Windows 2008/12 Server configuration and administration

Install, Configure, Manage


Active Directory Management

DNS Management

DHCP Management

Group Policy Management


Fault finding

RDS, Thin Client

Windows Client Platform

Windows 7/10 Client configuration

Install, Configure, Manage



Fault finding


Unix / Linux

Server / Client configuration

Install, Configure, Manage



Fault finding



VMware ESXi

VMware vCenter

ESXI host configuration and management

Virtual Machine Build and Deploy

Install, Configure, Manage

Architecture Design

Clusters, DRS, HA, VSAN

Vswitches, VMotion

Snapshot management

Security, local, datacenter, cluster


Setup of Backup and Restore tasks in chosen backup solution(VEEAM or Other)


Layer 2 Switches

Layer 3 Switches

OSI Layers

Protocols, Sub netting etc.


Medium - Cable, Fibre

Install, Configure, Manage


Security, Port, MAC, RSP, DHCP snoop, 802.1x, etc.

Backup and Restore switch configurations


Install, Configure, Manage

AP, MESH networks

Security, MAC, 802.11x, etc.

Security Products





Web Access Firewalls WAF

Data Leak Protection DLP

Scanners, Nessus, OpenVAN, Core Impact, GFI ???

Tools sets, Kali, Backtrack, Core Impact, Parrot, Backbox, Black arch ???

Exploit Frameworks, Metaspoit, Powerspolit, Empire,

Foot printing

Social Engineering

Digital Forensics

Network Attacks

Scanning, enumerating

DOS, Spoofing, session hijack, SQL injection, XSS


Vulnerability testing

RAS Solutions

Digital Rights Management DRM

Log Event Management LEM


Mobile Devices

Policy & Governance

Disaster Recovery and Business Continuity

ISO 27001


Control Frameworks

Risk Management


Managed Authorise Access Management, MAC, DAC etc.

Chain of custody


Incident Response

Capacity Management

Identity and Access Provisioning Lifecycle

Change Management