At a Glance
- Tasks: Upgrade legacy applications and design secure architectures for hybrid environments.
- Company: Dynamic tech firm focused on innovative security solutions.
- Benefits: Flexible location, competitive pay, and inclusive work culture.
- Why this job: Join a team making a real difference in securing vital systems.
- Qualifications: Experience in legacy system modernisation and secure architecture design.
- Other info: Embrace diversity and enjoy excellent career growth opportunities.
The predicted salary is between 36000 - 60000 £ per year.
Location: Remote - adhoc travel to London
Duration: 6 month initial
You will be supporting a Legacy Application program in upgrading hundreds of business applications across Wintel, Linux and cloud environments.
Core Competencies- Legacy System Modernisation: Proven experience in upgrading legacy applications while maintaining operational continuity, including migration strategies for Wintel-to-cloud or Linux-to-cloud transitions.
- Secure Architecture Design: Ability to create architecture patterns for hybrid environments (on-premises, cloud) and enforce secure-by-design principles (e.g., NIST, ISO 27001).
- ITHC Leadership: CREST/CHECK-accredited experience conducting or supporting pre- and post-deployment security assessments, vulnerability management, and remediation planning.
- Wintel/Linux: Securing legacy applications via patching, hardening, and privilege management (e.g., Active Directory, SELinux).
- Cloud (AWS/Azure/GCP): Designing IAM policies, encryption (FIPS 140-validated modules), and network segmentation for hybrid environments.
- DevSecOps: Integrating SAST/DAST tools into CI/CD pipelines and automating compliance checks.
- Threat Modeling: Using frameworks to identify risks in legacy-to-modern transitions.
- Security Control Sets: Defining controls for data encryption, access management, and audit logging aligned with NCSC guidelines.
- ITHC Reports: Delivering CHECK-compliant reports with actionable remediation plans. Align audit outcomes with organisational risk appetite, ensuring legacy system upgrades mitigate critical threats (e.g., unauthorised access, data leakage).
- Audit risk registers and treatment plans to confirm they address legacy technical debt and transformation uncertainties.
- Stakeholder Collaboration: Leading cross-functional teams (developers, ops, risk owners) to align security with business objectives.
- Risk Appetite Management: Balancing security requirements with project timelines and budgetary constraints.
- Threat assessments and risk registers.
- Security Controls Statement of Applicability.
- Pre- and post-ITHC compliance reports.
UK Government Experience: Preferred to have 3 years previous experience supporting UK Government Depts as a Security Architect.
Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome applications from people of all backgrounds and perspectives. Our success is driven by our people, united by the spirit of partnership to deliver the best resourcing solutions for our clients. If you need any help or adjustments during the recruitment process for any reason, please let us know when you apply or talk to the recruiters directly so we can support you.
LAP Security Architect employer: Sanderson Recruitment
Contact Detail:
Sanderson Recruitment Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land LAP Security Architect
✨Network Like a Pro
Get out there and connect with folks in the industry! Attend meetups, webinars, or even just grab a coffee with someone who’s already in the role you want. Building relationships can open doors that a CV just can’t.
✨Show Off Your Skills
When you get the chance to chat with potential employers, don’t hold back! Share specific examples of how you’ve tackled legacy system upgrades or secured applications. We want to hear about your hands-on experience!
✨Tailor Your Approach
Every job is different, so make sure you’re tailoring your conversations to highlight the skills that matter most for the LAP Security Architect role. Focus on your experience with cloud environments and secure architecture design.
✨Apply Through Us!
Don’t forget to apply through our website! We’re here to support you every step of the way, and applying directly helps us match you with the right opportunities faster. Let’s get you that dream job!
We think you need these skills to ace LAP Security Architect
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience with legacy system modernisation and secure architecture design. Use keywords from the job description to show we’re on the same page!
Showcase Your Skills: Don’t just list your skills; give examples of how you’ve applied them in real-world scenarios. We love seeing how you’ve tackled challenges like upgrading legacy applications or managing security assessments.
Be Clear and Concise: Keep your application straightforward and to the point. We appreciate clarity, so make sure your achievements and experiences shine without unnecessary fluff!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you don’t miss out on any important updates!
How to prepare for a job interview at Sanderson Recruitment
✨Know Your Legacy Systems
Make sure you brush up on your knowledge of legacy system modernisation. Be ready to discuss specific examples of how you've successfully upgraded applications while keeping operations running smoothly. Highlight any migration strategies you've implemented, especially from Wintel to cloud or Linux to cloud.
✨Showcase Secure Architecture Skills
Prepare to talk about your experience in designing secure architectures for hybrid environments. Familiarise yourself with secure-by-design principles like NIST and ISO 27001, and be ready to explain how you've enforced these in past projects. This will show that you understand the importance of security in application upgrades.
✨Demonstrate ITHC Leadership
If you've got CREST/CHECK accreditation, flaunt it! Discuss your experience with pre- and post-deployment security assessments, vulnerability management, and remediation planning. Be specific about the tools and methodologies you've used, as this will demonstrate your hands-on expertise.
✨Engage in Stakeholder Collaboration
Highlight your ability to lead cross-functional teams and align security with business objectives. Prepare examples of how you've balanced security requirements with project timelines and budgets. This will show that you can effectively manage risk while delivering results.