At a Glance
- Tasks: Design and implement cybersecurity architecture while collaborating with various ICT teams.
- Company: Join Frontex, the European Border and Coast Guard Agency, dedicated to enhancing security across Europe.
- Benefits: Enjoy a dynamic work environment at Frontex Headquarters in Warsaw with potential for contract renewals.
- Other info: Contract starts in May 2025, with flexible working hours and opportunities for professional growth.
- Why this job: Make a real impact on cybersecurity while working with cutting-edge technology and diverse teams.
- Qualifications: Ideal candidates should have a background in ICT security and strong analytical skills.
The predicted salary is between 48000 - 84000 £ per year.
Job Description:
ICT Security Architect
1 Overview
This Specific Contract defines specific terms and conditions, organized in tasks and activities, for implementation of the framework contract Frontex/2021/RP/1261/AH/AA lot 1 in relation to work item 2nd Level Support described in Chapter 6.3.7 of the FWC Terms of Reference document.
The group of the Framework Contract Terms of Reference requirements that apply the most is: Personnel. All terms and conditions, as well as goals and approaches, of the mentioned Framework Contract are to be followed and respected in execution of this Specific Contract.
2 Contract Type and Venue
This contract is time-and-means according to the definition given in the Framework Contract. Contractor\’s Staff shall work at Frontex Headquarters.
3 Language
All documentation and communication, either in paper or in electronic form, shall be in English (U.K.). Contractor\’s Staff shall communicate in English in any written or spoken contexts, at least at the CEFR.
4 Objectives
The objectives of the contract are as follows:
- Develop organisation\’s cybersecurity architecture to address security and privacy requirements
- Establish a secure environment during the development life cycle of systems, service, and/or products
- Lead the development, integration and maintenance of cybersecurity components ensuring the cybersecurity specifications are met
- Assure the security of the solution architectures through security reviews
- Collaborate with key security personnel and other teams in applying the security principles in the architecture
- Adapt the organization\’s security architecture to emerging threats
- Contribute to the definition of the security architectural blueprint and integrate new solutions with existing framework based on a security architectural blueprint
- Develop and maintain ICT security strategy
The objectives are to be achieved under the direction and in cooperation with ICT Security Operations Team and other architects, as well as in close and regular cooperation with other ICT teams (Software Development Team, Network Team, and Service Centre and Service Management Team).
5 Place of performance
All the tasks under this contract shall be performed at Frontex Headquarters in Warsaw, Poland.
6 Duration and schedule
The contract enters into force on the date of its signature by the last contracting party. Performance of tasks under the contract shall be ideally effectively initiated in May 2025 and in any case within 2 months of the contract\’s signature.
The initial duration of this contract is until 30 September 2025, with the possibility of 4 renewals. Unless stated otherwise, services shall be delivered on a daily basis.
7 Description of Tasks
All the tasks described below shall be performed in parallel, as determined by each task\’s input.
Task 1: Design of strategic and operational ICT Security standards and architectures
Relevant information will be delivered by Architecture Team and involved DIG members.
The aim of this task is to analyse, consult and introduce both strategic and operational ICT security deliverables, such as ICT Security Strategy, ICT Security Architecture, ICT security standards that will be used by other architects and delivery teams.
- Analyse the legal framework for ICT Security requirements
- Analyse and evaluate the cybersecurity of the organisation\’s architecture
- Develop organisation\’s ICT security architecture to address security and privacy requirements
- Develop and maintain ICT security strategy
- Produce architectural documentation and specifications
- Present high-level security architecture to stakeholders
- Establish a secure environment during the development life cycle of systems, service, and/or products
- Lead the development, integration and maintenance of cybersecurity components ensuring the cybersecurity specifications are met
- Collaborate with key security personnel and other teams in applying the security principles in the architecture
- Adapt the organisation\’s security architecture to emerging threats
- Perform market evaluation to identify appropriate solutions to business requirements
- Contribute to the definition of the security architectural blueprint and integrate new solutions with existing framework based on a security architectural blueprint
- Collaborate with ICT Security operation team
- Identifying issues and risks related to the ICT Security
- Reporting on activities performed under this task
Acceptance Criteria
- Speed and agility of responding to orders
- Adherence to deadlines
- Completeness and quality of the work results
- Efficiency and effectiveness
- Adherence to applicable standards
Task 2: Support for ICT projects
Relevant information will be delivered by Architecture Team and involved project members.
The aim of this task is to support delivery teams in guiding the design of the ICT systems in the area of ICT security.
- Analyse the legal framework for ICT Security requirements in the project
- Apply ICT security strategic and operational standards and architectures
- Assure the security of the solution architectures through security reviews
- Collaborate with ICT Security operation and project team
- Identifying issues and risks related to the ICT Security
- Reporting on activities performed under this task
Acceptance Criteria
- Speed and agility of responding to orders
- Adherence to deadlines
- Completeness and quality of the work results
- Efficiency and effectiveness
- Adherence to applicable standards
#J-18808-Ljbffr
ICT Security architect employer: E-Solutions
Contact Detail:
E-Solutions Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land ICT Security architect
✨Tip Number 1
Familiarise yourself with the latest cybersecurity frameworks and standards relevant to the role. Being well-versed in these will not only help you understand the job requirements better but also allow you to engage in meaningful discussions during interviews.
✨Tip Number 2
Network with professionals in the ICT security field, especially those who have experience working with organisations like Frontex. Attend industry events or webinars to make connections and gain insights that could give you an edge in your application.
✨Tip Number 3
Prepare to discuss specific examples of how you've developed or implemented security architectures in previous roles. Highlighting your hands-on experience will demonstrate your capability to meet the objectives outlined in the job description.
✨Tip Number 4
Stay updated on emerging threats and trends in cybersecurity. Being able to speak knowledgeably about current challenges and solutions in the field will show your commitment and expertise, making you a more attractive candidate.
We think you need these skills to ace ICT Security architect
Some tips for your application 🫡
Understand the Job Requirements: Carefully read through the job description for the ICT Security Architect position. Make sure you understand the specific tasks and responsibilities, as well as the skills and qualifications required. Tailor your application to highlight how your experience aligns with these requirements.
Craft a Strong CV: Your CV should clearly outline your relevant experience in ICT security architecture. Focus on your achievements and contributions in previous roles, particularly those that relate to cybersecurity standards, strategic planning, and collaboration with teams. Use bullet points for clarity and impact.
Write a Compelling Cover Letter: In your cover letter, express your enthusiasm for the role and the organisation. Highlight your understanding of the cybersecurity landscape and how you can contribute to developing and maintaining ICT security strategies. Be sure to mention any specific experiences that demonstrate your ability to meet the objectives outlined in the job description.
Proofread Your Application: Before submitting your application, thoroughly proofread all documents for spelling and grammatical errors. Ensure that your writing is clear and professional, as communication skills are crucial for this role. Consider asking a friend or colleague to review your application for additional feedback.
How to prepare for a job interview at E-Solutions
✨Understand the Cybersecurity Landscape
Before your interview, make sure you have a solid grasp of current cybersecurity trends and threats. Familiarise yourself with the latest security frameworks and standards relevant to the role, as this will demonstrate your commitment and knowledge in the field.
✨Showcase Your Technical Skills
Be prepared to discuss specific technical skills and experiences that relate to ICT security architecture. Highlight any relevant projects you've worked on, particularly those involving the development and integration of cybersecurity components.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions where you may need to demonstrate how you would handle specific security challenges. Practice articulating your thought process and decision-making skills in these situations, as it shows your analytical abilities.
✨Emphasise Collaboration and Communication
Since the role involves working closely with various teams, be ready to discuss your experience in collaborative environments. Highlight examples where you've successfully communicated complex security concepts to non-technical stakeholders.