Exp Required: 12+ Years
Job Purpose and primary objectives:
The role is for a colleague within the Security Engineering team, working independently as well as within the larger function, across some of the most forward-looking projects within Lloyds Banking Group. The role involves working within project, obtaining a deep understanding of various technologies in order to produce necessary design or solution documents. This will involve leading projects technically, working with security teams and SMEs across the Group as well as with vendors and developers.
Provide the following capabilities as required by the project or determined by the work load alignment:
Security Engineering and Design
Participate within each project as a primary resource ensuring commitment to attend all appropriate calls and meetings as agreed with the project manager.
Accept ownership for technical related deliverables as defined by the project scope. Agree these deliverables with the aligned Senior Security Engineer for the portfolio to ensure strategic and risk reduction adherence. Work with the project manager and business analyst to ensure any critical success factors or business objectives are reasonable and can be met.
Manage requirements from stakeholders within each project and collaborate with the Senior Security Engineer portfolio lead on challenges that need wider business discussion or escalation to the Lead Security Engineers.
Analyse security risk within each design as appropriate to the scope and ensure that all interested stakeholders are informed or consulted where necessary.
Design and implement security controls using a combination of Enterprise Architecture Patterns, Security Standards and bespoke deliverables.
Work closely with vendors, platform teams and SME’s where necessary in order to agree architectural decisions, design statements and exceptions. Where necessary support the project in obtaining waivers related to security design decisions taken.
Take the lead on security architecture decisions and issues where the problem scenario is not covered by a pattern or standard. Seek guidance from domain architects or domain engineers where appropriate.
Collaborating with alternative technical resources with the goal of supporting projects in the production of design documentation e.g. TSD’s or security documentation where necessary.
Ensuring that the drivers of Cost, Pace and Quality are maintained during production of or contribution to design artefacts.
Provide security architectural SME knowledge and design engineering effort that leads to the creation of high quality solutions that comply with all relevant ITEC policies and Security Standards.
Provide security support for assigned projects at review committees, boards or forums in order to facilitate the project through governance.
Provide support for projects as they move into the delivery stage at a level suitable to ensure that the solution is implemented as per the design. Ensure the solution is taken back through governance where the design has changed during the implementation cycle.
The candidate should have experience and knowledge of a broad range of IT security principles and associated technologies. The candidate should be able to clearly demonstrate their understanding of each skill area and evidence previous work programmes where they have been a significant part of their secure implementation.
The candidate should have significant knowledge of Cyber Security as it applies to Enterprise business and ideally exposure to risk or threat assessment techniques.
The candidate should have technical experience and demonstrable skill in one or more of the following areas:
Exposure to cloud security models including public, private and hybrid concepts
Cloud policy engineering & deployment
certificate handling and protocols (x509, PKCS12 etc)
Security Control Frameworks e.g. ISO27001 and practical experience in their implementation
Security Architecture principles, generic best practices
Network security devices including NGFW, UTM or NIPS/NIDS
Endpoint defence solutions including NGAV or EDR. Exposure to malware infection vectors and defence methods
Endpoint and Server hardening principles, best practices
Web application firewalls, network load balancers, proxy systems
Network, Endpoint and Application logging concepts, best practice and monitoring systems including SIEM
Authentication, Authorisation and Accounting concepts, best practice and IAM management systems. OTP and MFA systems.
Active Directory Security including federated solutions using ADFS, SAML etc
Application security including web applications, SaaS services etc
Data handling principles,