Cyber Solutions Architect in London

Location: London

Salary: Hidden

Recruiter: MBR Partners

Date Advertised: 2024-06-12

MBR partners are working with a UK based Telecommunication client that offers digital identity solutions that allow enterprises, such as banks, to verify Mobile Service Provider information via an API, for the purpose of building up fraud scores for transactions.

For example, companies would be able to understand location information about a subscriber's handset when a transaction is happening (ie is the person roaming).

Other examples include information related to Sim-swaps and whether someone might be on an active call and potentially being coerced into making a transaction.

The client works on a revenue split with all the Mobile Network Operators in Germany and Austria and offers the solution to fraud platform companies / local channel partners that incorporate the data into their solutions (with the bank being in the end customer).

The role is with a fast growing business Fraud Prevention Services Business Unit of a 150 million USD revenue global solutions provider.

The Security Solution Architect works within the cybersecurity consultancy, risk and advisory unit which is part of the Global Solutions team.

The role involves providing regular cybersecurity, risk and compliance services/assessments, reports and prioritised recommendations as well as consultative support to their clients while partnering with internal leadership teams and colleagues in helping the  clients protect their digital assets, information, and systems from cyber threats and vulnerabilities.

A crucial function of the role includes designing and tailoring these services for inclusion in  the clients  product/services portfolio.

Ideally you will be in presales or a technical solutions architect able to advise on the gap analysis  of differing threat levels.

ResponsibilitiesKey responsibilities and accountabilities1.

Design and recommend security architectures, solutions, and controls to protectclient critical assets and data.

2.

Develop and help customers implement incident response plans, which outline stepsto take in case of a security breach.

3.

Perform security assessments for customers, including penetration testing, to identifyweaknesses in systems and networks and propose mitigation plans where required4.

Recommend, design and implement security tools and technologies such asfirewalls, intrusion detection systems, endpoint protection and distributed denial ofservice (DDoS) mitigation solutions.

5.

Build strong relationships with customers, providing ongoing cybersecurityconsultation and support.

Communicate findings and recommendations effectivelyand develop strategies and roadmaps for improvement.

6.

Ensure technical implementation and customers’ business requirements are alignedby ensuring that controls, processes and procedures are documented for thebusiness’s operational team.

7.

Lead in risk advisory services to their  customers which entails developing associatedcybersecurity services for their service portfolio.

8.

Ensure that the client delivers contractual security requirements for managed servicecustomers by: -Acting as a point of contact between the sales and operational teams duringcontract negotiations- Performing gap analysis and risk assessments on solutions in-flight and infuture contractual commitments-  Identifying security deliverables, creating work packs and ensuring handoverinto operational delivery9.

Liaise and manage internal and 3rd party suppliers in the deployments of element orthe total solution relating to cybersecurity.

Required Degree or equivalent experience in Computing/IT Security/Cyber Experience in IT, Cyber and Information Security technologies and products Excellent written and verbal communication skills Eagerness to develop their skills and understanding of all information securitydomains Ability to perform to tight deadlines Relevant risk and/or security industry certification(s) such as Certified in Risk andInformation Systems Control (CRISC), Certified Information Security Manager(CISM), Certified Information Systems Security Professional (CISSP), CertifiedEthical Hacker (CEH).

 Must possess the ability to follow and/or create/ modify operational and technicalprocedures and/or best practice documents.

 Experience in constructing comprehensive quotes and proposals Experience in consultative sales and communicating value propositionsPlease ignore salary details - this role is flexible



Read More