Network Security Architect

Methods
2 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English

Job location

Remote

Tech stack

Microsoft Access
Intrusion Detection Systems
Virtual Private Networks (VPN)
Network Security
Network Control
Routing
Network Segmentation
Public Key Infrastructure
Zero Trust Network Access
Data Streaming
Software Vulnerability Management
Network Access Control
Microsoft InTune
Palo Alto Networks
Fortinet
Cisco networks

Job description

We are seeking a Network Security Architect to support a major security uplift programme focused on improving network segmentation, boundary controls, and device trust across critical systems., * Own and define network security architecture, including segmentation, zoning, and trust boundaries

  • Design and document network boundaries, ingress/egress points, and control layers
  • Produce and maintain high-quality architecture diagrams, including system interdependencies
  • Define firewall strategies, rule sets, and network control models
  • Design device trust and authentication frameworks (PKI, Conditional Access, posture validation)
  • Define security controls for BYOD and unmanaged devices
  • Embed Zero Trust principles across network and identity layers
  • Lead end-to-end mapping of critical systems, including dependencies and data flows
  • Provide technical oversight of vulnerability management and patching strategy
  • Work with engineering teams to ensure secure implementation of designs

Requirements

  • Strong background in network security / infrastructure security
  • Experience contributing to or owning architecture and design decisions
  • Deep understanding of network segmentation, zoning, and boundary controls
  • Hands-on experience with enterprise firewalls (Palo Alto, Cisco, Fortinet)
  • Experience with device trust, Conditional Access, or identity-integrated security
  • Ability to produce clear architecture documentation and diagrams
  • Strong networking fundamentals (routing, switching, protocols), * Experience with Zero Trust architecture programmes
  • Knowledge of Entra ID, Intune, PKI, certificate-based authentication
  • Exposure to NAC (Network Access Control)
  • Familiarity with IDS/IPS, WAF, VPN, proxy technologies
  • Experience mapping critical systems and dependencies

This role will require you to have or be willing to go through Security Clearance. As part of the onboarding process candidates will be asked to complete a Baseline Personnel Security Standard; details of the evidence required to apply may be found on the government website Gov.UK. If you are unable to meet this and any associated criteria, then your employment may be delayed, or rejected . Details of this will be discussed with you at interview

Methods is passionate about its people; we want our colleagues to develop the things they are good at and enjoy.

Benefits & conditions

  • Autonomy to develop and grow your skills and experience
  • Be part of exciting project work that is making a difference in society
  • Strong, inspiring and thought-provoking leadership
  • A supportive and collaborative environment

Development - access to LinkedIn Learning, a management development programme, and training

Wellness - 24/7 confidential employee assistance programme

Flexible Working - including home working and part time

Social - office parties, breakfast Tuesdays, monthly pizza Thursdays, Thirsty Thursdays, and commitment to charitable causes

Time Off - 25 days of annual leave a year, plus bank holidays, with the option to buy 5 extra days each year

Volunteering - 2 paid days per year to volunteer in our local communities or within a charity organisation

About the company

Since our establishment in 1990, Methods has partnered with a range of central government departments and agencies to transform the way the public sector operates in the UK. Our mission is to improve and safeguard public-facing services. We apply digital thinking to ensure the future of our public services is centred around our citizens. Our human touch sets us apart from other consultancies, system integrators and software houses - we have a customer-centric value system whereby we focus on delivering what is right for our clients. We passionately support our clients in the success of their projects while working collaboratively to share skill sets and solve problems. At Methods we have fun while working hard; we are not afraid of making mistakes and learning from them. Methods are experts in delivering secure, resilient cyber and information services - keeping systems and data safe. We help reduce risk and vulnerabilities from cyber-attacks by developing a security road-map tailored to your unique needs. We help organisations improve processes such as threat management by building an identity management programme, and establishing prevention, detection and response capabilities to cyber-attacks.

Apply for this position