Enable job alerts via email!

Security Architect

Buscojobs

Greater London

On-site

GBP 50,000 - 90,000

Full time

Yesterday
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An innovative firm is seeking a skilled cybersecurity professional to join their dynamic team. In this role, you will lead security operations and incident response efforts, utilizing cutting-edge tools to detect and mitigate threats. You'll collaborate with diverse teams to implement a Zero Trust Architecture, ensuring robust security across cloud and hybrid environments. This position offers the chance to make a significant impact in a rapidly growing organization, where your expertise will help shape the future of cybersecurity. If you are passionate about protecting digital assets and have a proactive mindset, this opportunity is perfect for you.

Qualifications

  • 5+ years of experience in security operations and incident response.
  • Strong knowledge in threat detection and malware analysis.

Responsibilities

  • Lead threat detection and incident response efforts across various environments.
  • Develop and maintain incident response playbooks aligned with risk posture.

Skills

Security Operations
Incident Response
Threat Detection
Malware Analysis
Zero Trust Architecture
Vulnerability Assessment
Strong Communication Skills

Education

Bachelor’s or Master’s degree in Cybersecurity
Relevant Certifications (CISSP, CISM, etc.)

Tools

IBM QRadar
Splunk
CrowdStrike Falcon
Microsoft 365 Defender
Nessus
Fortinet
Palo Alto

Job description

What makes Cognizant a unique place to work? The combination of rapid growth and an international and innovative environment! This creates many opportunities for people like YOU — individuals with an entrepreneurial spirit who want to make a difference in the world.

At Cognizant, you will collaborate with colleagues from around the globe to develop solutions for leading companies, helping them become more flexible, innovative, and successful. This is your chance to be part of a success story.

Your day-to-day will include:

  1. Security Operations & Incident Response
  2. Leading threat detection, investigation, and remediation efforts using tools such as IBM QRadar, Splunk, CrowdStrike Falcon, Microsoft 365 Defender, and SentinelOne.
  3. Performing real-time and retrospective analysis of logs, alerts, and PCAP files to detect malicious activity using Wireshark and SIEM platforms.
  4. Conducting static and dynamic malware analysis and coordinating with threat intelligence teams for actionable IOCs.
  5. Developing, tuning, and maintaining incident response playbooks aligned with organizational risk posture.
  6. Implementing and maintaining a Zero Trust Architecture, securing access through strong authentication, micro-segmentation, and continuous monitoring.
  7. Leveraging ZTNA principles in cloud and hybrid environments, ensuring strict verification for every access request regardless of location or device.
  8. Integrating identity-based access controls across firewalls, VPNs, and cloud platforms to support secure remote access and workload isolation.
  9. Collaborating with network, AD, and cloud teams to establish secure perimeters and enforce device trust and user validation.
  10. Maintaining comprehensive visibility and lifecycle management of IT / OT assets using tools like Axonius and CrowdStrike.
  11. Implementing robust endpoint security across various environments, including manufacturing and labs.
  12. Integrating asset inventory with vulnerability management processes for accurate risk scoring and prioritization.
  13. Classifying assets based on risk level, business criticality, and compliance needs.
  14. Conducting vulnerability assessments using Nessus and CrowdStrike, and coordinating remediation with system owners.
  15. Documenting and tracking security incidents, risks, and mitigation strategies through dashboards and reports.
  16. Collaborating with leadership to deliver executive reports and insights on security posture and incidents.
  17. Building automation scripts and workflows to reduce manual efforts in detection, remediation, and reporting.
  18. Creating custom correlation rules, dashboards, and threat detection content in Splunk.
  19. Managing Zero Trust Network Access (ZTNA) to enforce secure, identity-aware access across hybrid environments.
  20. Configuring ZTNA policies for application segmentation to reduce lateral movement and enhance security.
  21. Monitoring web and application traffic through ZTNA platforms to detect anomalies and enforce policies.
  22. Creating dynamic ZTNA policies based on user identity, device posture, location, and risk score.
  23. Utilizing Secure Web Gateway (SWG) capabilities to inspect web traffic, block malicious downloads, and prevent data exfiltration.
  24. Deploying and maintaining Cybersecurity Asset Management platforms for asset visibility.
  25. Creating dynamic queries to detect unmanaged or vulnerable assets and trigger automated remediation workflows.
  26. Using asset management tools to correlate data across systems for real-time security gap identification.
  27. Supporting compliance audits through dashboards that detail asset security status, patching, and coverage.
  28. Using asset management tools for lifecycle tracking, licensing checks, and enforcing security baselines.

Technical Skills & Tools that will help you succeed:

  • Endpoint Security: Microsoft 365 Defender, CrowdStrike, SentinelOne
  • Cloud Security: Azure AD, Azure Security Center, Monitor, AKS, ACR, VNets, Functions, RBAC
  • Vulnerability Tools: Nessus, IBM AppScan, OSINT, Joe Sandbox (basic knowledge is good to have)
  • Firewalls & Networking: Fortinet, Palo Alto, DNS, TCP/IP, DHCP, IPS/IDS (basic knowledge)
  • Email Security: Proofpoint, DarkTrace, Mimecast (basic or good to have)
  • Strong communication skills; ability to translate technical risks effectively.

Preferred Qualifications:

  • Bachelor’s or Master’s degree in Cybersecurity, Computer Science, Information Systems, or related fields.
  • Relevant certifications such as CISSP, CISM, CEH, Microsoft Certified: Azure Security Engineer, CompTIA Security+, or similar.

Next Steps: If you believe this opportunity is right for you or if Cognizant appeals to you, we want to connect! Please apply directly.

Cognizant is committed to Equal Employment Opportunities. Successful candidates will undergo a background check.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.