Senior Cybersecurity Architect - Implementation
What's Your Score?
- See the score CodeNinja's ATS gives your resume
- Get AI-rewritten bullet points
- Download Gulf-ready CV
60 seconds. $3.99 one-time.
About the Role
We are seeking a Senior Cybersecurity Architect to support the implementation and operationalization of cybersecurity across one of the largest banks in Saudi Arabia. The role sits within the Architecture Unit and focuses on embedding cybersecurity into business processes, technology delivery, and operational change activities. This is a hands-on, delivery-driven role, requiring active participation in change management processes, including review of business requirements, solution changes, and production-impacting activities, to ensure cybersecurity requirements are consistently addressed before and during implementation.
Key Responsibilities
Cybersecurity Implementation & Business Integration
• Lead the implementation of cybersecurity controls and architectures across business and technology domains.
• Embed cybersecurity requirements into:
• Business processes
• Application and infrastructure delivery lifecycle
• Operational and production change activities
• Collaborate closely with business, IT, and security teams to ensure security is built-in, not bolted-on.
Change Management & Requirements Review
• Actively participate in formal change management processes, including:
• Reviewing and assessing technology and infrastructure changes
• Conducting security impact analysis for standard, normal, and emergency changes
• Providing input for change approvals to ensure security risks are identified and mitigated
• Review and assess Business Requirement Documents (BRDs), functional specifications, and solution designs to ensure cybersecurity requirements are clearly defined and addressed.
• Validate that approved security requirements are effectively implemented during change execution.
Architecture & Control Operationalization
• Translate cybersecurity policies, standards, and regulatory requirements into implementable security architectures, patterns, and control designs.
• Define and enforce:
• Security reference architectures and patterns
• Baseline security configurations
• Defense-in-depth and zero-trust models
• Ensure security architectures are consistently adopted and executed across projects and change initiatives.
Hands-On Security Design & Delivery
• Design, review, and oversee the implementation of security controls, including:
• Firewalls, WAF, IDS/IPS, and DDoS protection
• Secure Email Gateways and API Security Gateways
• VPN, SD-WAN, and Network Access Control (NAC)
• Endpoint Security, EDR/XDR
• Identity and Access Management (IAM)
• SIEM and centralized logging platforms
• Drive system, platform, and cloud hardening across operating systems, databases, virtualization platforms, containers, and cloud services.
Cloud, Platform & Infrastructure Security
• Implement and standardize security controls across hybrid environments (on-premises, private cloud, and public cloud – OCI / Azure / GCP).
• Secure virtualized and containerized platforms (VMware, Hyper-V, Kubernetes, OpenShift).
• Integrate cloud-native and third-party security services into enterprise platforms.
Security Operations Enablement
• Collaborate with SOC and operations teams to ensure security controls are monitorable, operable, and effective.
• Integrate SIEM and SOAR capabilities to support detection, response, and continuous improvement.
• Support incident investigations and ensure lessons learned are incorporated into control and architecture improvements.
Risk, Compliance & Assurance
• Ensure cybersecurity implementations align with regulatory and industry standards, including:
• SAMA CSF
• NCA ECC
• SWIFT CSP
• PCI DSS
• NIST
• Produce implementation-focused, audit-ready documentation, including:
• Solution and implementation designs
• Architecture diagrams and standards
• Control mapping, evidence, and change records
• Conduct threat modeling, risk assessment, and support mitigation measures.Requirements
Qualifications
• Bachelor’s or Master’s degree in Computer Science, Information Security, or a related field.
• 15+ years of experience in cybersecurity, with strong exposure to change-driven environments.
• Proven experience in banking or other highly regulated sectors.
Preferred Certifications
• CISSP, CCSP, CISM
• Cloud or security architecture certifications (SABSA, TOGAF, OCI, Azure, or GCP)
Key Attributes
• Strong execution mindset with keen attention to detail during change and release cycles.
• Comfortable reviewing BRDs, solution designs, and change requests.
• Ability to assess risk and make pragmatic security decisions under tight delivery timelines.
• Clear communicator with excellent documentation and stakeholder coordination skills.
• High ownership and accountability in complex, regulated environments.Benefits
Why Join
• Play a key role in embedding cybersecurity into business change and delivery processes.
• Work on enterprise-scale hybrid environments within a highly regulated banking sector.
• Competitive compensation package with renewal potential and exposure to advanced security technologies.
Requirements
- •Experience in cybersecurity implementation and architecture
- •Hands-on delivery experience
- •Active participation in change management processes
- •Review of business requirements and solution changes
- •Translate policies into implementable security architectures
- •Design and review of security controls (Firewalls, WAF, IAM, SIEM)
- •Experience with cloud security (OCI, Azure, GCP)
- •Familiarity with hybrid environments and container security
Nice to Have
- •Experience with Kubernetes
- •OpenShift
- •Zero Trust models
- •Secure Email Gateways
- •API Security Gateways
- •VPN
- •SD-WAN
- •NAC
Responsibilities
- •Lead implementation of cybersecurity controls and architectures
- •Embed cybersecurity requirements into business processes and IT delivery
- •Collaborate with business, IT, and security teams
- •Review and assess technology and infrastructure changes
- •Conduct security impact analysis for changes
- •Provide input for change approvals
- •Design, review, and oversee implementation of security controls
- •Implement and standardize security controls across hybrid environments
- Scan your CV for errors before CodeNinja sees it
- Get AI-rewritten bullet points
- Download Gulf-ready CV
60 seconds. $3.99 one-time.