Menu

Security Architect

Job details
Posting date: 28 April 2025
Hours: Full time
Closing date: 28 May 2025
Location: Leicester, Leicestershire
Remote working: Fully remote
Company: Virgule International Limited
Job type: Contract
Job reference: Vrg_2425_058

Apply for this job

Summary

Reference: Vrg_2425_058

Job title: Security Architect

This is a futuristic cybersecurity role focused on advanced threat detection, incident response, and network defense. The role requires hands-on expertise in SIEM tools, EDR solutions, forensic analysis, threat intelligence platforms, and network monitoring systems to build a proactive, resilient security posture in evolving digital environments.

Key Responsibilities:

Deploy, manage, and optimize SIEM solutions such as Splunk, IBM QRadar, LogRhythm, and ArcSight for real-time security monitoring and analysis.

Implement and manage network security devices including Palo Alto Networks, Fortinet, Cisco ASA, and Check Point Security Gateway.

Operate endpoint detection and response (EDR) platforms such as CrowdStrike, SentinelOne, Carbon Black, and Microsoft Defender for Endpoint to prevent and investigate threats.

Ensure Identity and Access Management (IAM) standards are enforced across users, devices, and systems.

Utilize threat intelligence platforms like Recorded Future, ThreatConnect, Anomali ThreatStream, and MISP to proactively identify and mitigate emerging threats.

Employ encryption and secure file handling tools such as OpenSSL, Hashcat, and VeraCrypt to safeguard sensitive data.

Configure and monitor Intrusion Detection and Prevention Systems (IDS/IPS) to detect anomalies and malicious activity.

Conduct digital forensic investigations using TheHive, EnCase, FTK (Forensic Toolkit), and Autopsy.

Implement and manage Data Loss Prevention (DLP) systems to prevent data breaches and ensure compliance.

Use network analysis tools like Wireshark and Tcpdump for deep packet inspection and incident diagnostics.

Monitor system performance and network infrastructure using SolarWinds and Nagios.

Collaborate with IT and security teams to strengthen policies, incident response strategies, and risk management.

Required Skills & Qualifications:

Proficiency in SIEM tools: Splunk, IBM QRadar, LogRhythm, ArcSight

Experience with firewalls and security appliances: Palo Alto Networks, Fortinet, Cisco ASA, Check Point

Expertise in EDR solutions: CrowdStrike, SentinelOne, Carbon Black, Microsoft Defender for Endpoint

Strong understanding of Identity and Access Management (IAM) principles and tools

Knowledge of Threat Intelligence Platforms: Recorded Future, ThreatConnect, Anomali ThreatStream, MISP

Familiarity with encryption and password cracking tools: OpenSSL, Hashcat, VeraCrypt

Hands-on experience with IDS/IPS systems

Proficient in forensic tools: TheHive, EnCase, FTK, Autopsy

Solid understanding of Data Loss Prevention (DLP) technologies

Network analysis and troubleshooting skills using Wireshark and Tcpdump

Experience with infrastructure monitoring tools: SolarWinds, Nagios

Strong analytical thinking, attention to detail, and ability to work under pressure

Excellent communication and collaboration skills

Employment Type: Full-time, Permanent [with Part-time and Fixed-term options available]

Apply for this job