°Õ³ó±ðÌý²Ñ¾±²õ²õ¾±´Ç²Ô
°Â±ðÌý²¹°ù±ðÌý³ó±ð°ù±ðÌý³Ù´ÇÌý´Ú¾±²Ô»åÌý³Ù³ó´Ç²õ±ðÌý·É³ó´ÇÌý²õ³Ù°ù¾±±¹±ðÌý´Ú´Ç°ùÌý±ð³æ³¦±ð±ô±ô±ð²Ô³¦±ð,Ìý²µ´ÇÌý³Ù³ó±ðÌý±ð³æ³Ù°ù²¹Ìý³¾¾±±ô±ð,Ìý²¹²Ô»åÌý³¦°ù²¹±¹±ðÌý³¦´Ç²Ô³Ù¾±²Ô³Ü´Ç³Ü²õÌý²µ°ù´Ç·É³Ù³ó.
°Â±ð’r±ðÌý²¹²ÔÌý²¹±ô±ô-´¡³Ü²õ³Ù°ù²¹±ô¾±²¹²ÔÌý³¦²â²ú±ð°ù²õ±ð³¦³Ü°ù¾±³Ù²âÌý´Ú¾±°ù³¾Ìý³ó±ð±ô±è¾±²Ô²µÌý²õ´Ç³¾±ðÌý´Ç´ÚÌý³Ù³ó±ðÌý³¦´Ç³Ü²Ô³Ù°ù²â’sÌý²ú¾±²µ²µ±ð²õ³ÙÌý´Ç°ù²µ²¹²Ô¾±²õ²¹³Ù¾±´Ç²Ô²õÌý²õ³Ù²¹²âÌý²¹³ó±ð²¹»åÌý´Ç´ÚÌý³¦²â²ú±ð°ùÌý°ù¾±²õ°ì.Ìý°Â±ð’r±ðÌý±ô´Ç´Ç°ì¾±²Ô²µÌý´Ú´Ç°ùÌý±è±ð´Ç±è±ô±ðÌý·É³ó´ÇÌý²õ³ó²¹°ù±ðÌý´Ç³Ü°ùÌý»å°ù¾±±¹±ðÌý³Ù´ÇÌý±ô±ð²¹°ù²ÔÌý°ù±ð±ô±ð²Ô³Ù±ô±ð²õ²õ±ô²â,Ìý²¹³¦³ÙÌý·É¾±³Ù³óÌý¾±²Ô³Ù±ð²µ°ù¾±³Ù²â,Ìý²¹²Ô»åÌý°ù²¹¾±²õ±ðÌý³Ù³ó±ðÌý²ú²¹°ùÌý´Ú´Ç°ùÌý´Ç³Ü°ùÌý³¦±ô¾±±ð²Ô³Ù²õÌý²¹²Ô»åÌý³Ù±ð²¹³¾³¾²¹³Ù±ð²õÌý²¹±ô¾±°ì±ðÌý–¯³ó´Ç²õ±ðÌý²õ±ð±ð°ì¾±²Ô²µÌý²¹Ìý±è±ô²¹³¦±ðÌý·É³ó±ð°ù±ðÌý²â´Ç³Ü°ùÌý»å°ù¾±±¹±ðÌý²¹²Ô»åÌý±ð³æ±è±ð°ù³Ù¾±²õ±ðÌý²¹°ù±ðÌý³¾±ð³ÙÌý·É¾±³Ù³óÌý±ð±ç³Ü²¹±ôÌý±ð²Ô³Ù³ó³Ü²õ¾±²¹²õ³¾Ìý²¹²Ô»åÌý´Ç±è±è´Ç°ù³Ù³Ü²Ô¾±³Ù²â.Ìý¶Ù¾±±¹±ðÌý¾±²Ô³Ù´ÇÌý²¹Ìý³¦³Ü±ô³Ù³Ü°ù±ðÌý³Ù³ó²¹³ÙÌý³Ù°ù±ð²¹²õ³Ü°ù±ð²õÌý¾±²Ô²Ô´Ç±¹²¹³Ù¾±´Ç²ÔÌý²¹²Ô»åÌý´Ç´Ú´Ú±ð°ù²õÌý²¹Ìý²µ°ù´Ç·É³Ù³óÌý±è±ô²¹³Ù´Ú´Ç°ù³¾Ìý³Ù³ó²¹³ÙÌý¾±²õÌý²¹²õÌý±ô¾±³¾¾±³Ù±ô±ð²õ²õÌý²¹²õÌý²â´Ç³Ü°ùÌý²¹³¾²ú¾±³Ù¾±´Ç²ÔÌý²¹²Ô»åÌý·É´Ç°ù°ìÌý±ð³Ù³ó¾±³¦.
°Õ³ó±ðÌý°¿±è±è´Ç°ù³Ù³Ü²Ô¾±³Ù²â
This role is responsible for designing, reviewing, and guiding secure technology solutions across business and enterprise environments. The role ensures security requirements are considered early in the design lifecycle, identifies risks and control gaps, and provides practical guidance to support secure, compliant, and resilient implementation of systems, applications, and integrations.
°Â³ó²¹³ÙÌý³Û´Ç³Ü’l±ôÌý¶Ù´Ç
- Lead security assessments of new and changed technology solutions across delivery, procurement, and change initiatives
- Review solution architecture and key security controls to identify risks, gaps, and improvement opportunities.
- Assess designs against security requirements, standards, and applicable frameworks.
- Provide risk ratings, remediation advice, and architecture recommendations to support secure implementation.
- Confirm agreed security uplift prior to go live, including relevant privacy and resilience controls.
- Support governance, reporting, and secure by design uplift through effective stakeholder engagements.
°Â³ó²¹³ÙÌý³Û´Ç³Ü’l±ôÌýµþ°ù¾±²Ô²µ
- Deep security architecture expertise across cloud, SaaS, hybrid, on premises, and integrated technology environments.
- Proven ability to assess and design security controls across identity, connectivity, data protection, monitoring, resilience, and secure change.
- Able to translate architecture and assurance inputs into clear risk-based decisions, remediation priorities, and implementation guidance.
- Strong knowledge of security standards and compliance obligations relevant to enterprise and regulated environments.
- Experience in security architecture, cyber assurance, technology risk, or solution security review roles.
- Proven ability to perform design and architecture reviews for business applications, platforms, integrations, or infrastructure solutions.
- Experience producing security review outputs such as risk assessments, design review findings, control recommendations, and go live assurance advice.
- Strong stakeholder engagement skills and ability to work across technical and non-technical teams.
- Relevant certifications desirable, such as CISSP, SABSA, TOGAF, ISO 27001, CCSP, CISM, or equivalent.
°Â³ó²¹³ÙÌý³Û´Ç³Ü’l±ôÌý³Ò±ð³Ù
- ´¡Ìý³Ù±ð³¦³ó²Ô¾±³¦²¹±ô±ô²âÌý±ð³æ³¦±ð±ô±ô±ð²Ô³Ù,Ìý³¦´Ç±ô±ô²¹²ú´Ç°ù²¹³Ù¾±±¹±ðÌý³Ù±ð²¹³¾
- °ä´Ç³¾±è±ð³Ù¾±³Ù¾±±¹±ðÌý²ú²¹²õ±ðÌý²õ²¹±ô²¹°ù²âÌý²¹²Ô»åÌý´Ú±ô±ð³æ¾±²ú¾±±ô¾±³Ù²âÌý³Ù´ÇÌý²õ³Ü¾±³ÙÌý³ó´Ç·ÉÌý²â´Ç³ÜÌý·É´Ç°ù°ìÌý²ú±ð²õ³Ù
- °ä±ô±ð²¹°ùÌý¾±²Ô±¹±ð²õ³Ù³¾±ð²Ô³ÙÌý¾±²ÔÌý²â´Ç³Ü°ùÌý±è°ù´Ç´Ú±ð²õ²õ¾±´Ç²Ô²¹±ôÌý²µ°ù´Ç·É³Ù³óÌý²¹²Ô»åÌý±ô´Ç²Ô²µ-³Ù±ð°ù³¾Ìý²õ³Ü³¦³¦±ð²õ²õ
°ä³Ù°ù±ôÌý¾±²õÌý²¹²ÔÌý±ð±ç³Ü²¹±ôÌý´Ç±è±è´Ç°ù³Ù³Ü²Ô¾±³Ù²âÌý±ð³¾±è±ô´Ç²â±ð°ùÌý³¦´Ç³¾³¾¾±³Ù³Ù±ð»åÌý³Ù´ÇÌý»å¾±±¹±ð°ù²õ¾±³Ù²â,Ìý¾±²Ô³¦±ô³Ü²õ¾±´Ç²Ô,Ìý²¹²Ô»åÌý²ú±ð±ô´Ç²Ô²µ¾±²Ô²µ.Ìý°Â±ðÌý±¹²¹±ô³Ü±ðÌý»å¾±±¹±ð°ù²õ¾±³Ù²âÌý²¹²Ô»åÌý·É±ð±ô³¦´Ç³¾±ðÌý²¹±è±è±ô¾±³¦²¹²Ô³Ù²õÌý´Ú°ù´Ç³¾Ìý²¹±ô±ôÌý²ú²¹³¦°ì²µ°ù´Ç³Ü²Ô»å²õ,Ìý±ð²Ô³¦´Ç³Ü°ù²¹²µ±ðÌý²¹²Ô²â´Ç²Ô±ðÌý·É³ó´ÇÌý³¾±ð±ð³Ù²õÌý³¾´Ç²õ³ÙÌý´Ç´ÚÌý³Ù³ó±ðÌý³¦°ù¾±³Ù±ð°ù¾±²¹Ìý³Ù´ÇÌý²¹±è±è±ô²âÌý– e±¹±ð²ÔÌý¾±´ÚÌý²â´Ç³ÜÌý»å´Ç²Ô’tÌý³Ù¾±³¦°ìÌý±ð±¹±ð°ù²âÌý²ú´Ç³æ.
±õ´ÚÌý²â´Ç³ÜÌý²Ô±ð±ð»åÌý²¹²õ²õ¾±²õ³Ù²¹²Ô³¦±ðÌý²¹³¦³¦±ð²õ²õ¾±²Ô²µÌý´Ç°ùÌý°ù±ð±¹¾±±ð·É¾±²Ô²µÌý³Ù³ó±ðÌý¾±²Ô´Ú´Ç°ù³¾²¹³Ù¾±´Ç²ÔÌý´Ç²ÔÌý³Ù³ó¾±²õÌý·É±ð²ú²õ¾±³Ù±ð,Ìý²Ô±ð±ð»åÌý³ó±ð±ô±èÌý²õ³Ü²ú³¾¾±³Ù³Ù¾±²Ô²µÌý²¹²ÔÌý²¹±è±è±ô¾±³¦²¹³Ù¾±´Ç²ÔÌý´Ú´Ç°ùÌý±ð³¾±è±ô´Ç²â³¾±ð²Ô³ÙÌý´Ç°ùÌý°ù±ð±ç³Ü±ð²õ³Ù¾±²Ô²µÌý²¹²ÔÌý²¹³¦³¦´Ç³¾³¾´Ç»å²¹³Ù¾±´Ç²Ô,Ìý±è±ô±ð²¹²õ±ðÌý³¦´Ç²Ô³Ù²¹³¦³ÙÌý³Ü²õÌý²¹³ÙÌý³¦²¹°ù±ð±ð°ù²õ°ª³¦³Ù°ù±ô.³¦´ÇÌý´Ú´Ç°ùÌý´Ú³Ü°ù³Ù³ó±ð°ùÌý³ó±ð±ô±è.