cover image
i-confidential

i-confidential

www.i-confidential.com

3 Jobs

49 Employees

About the Company

For over 15 years, our blend of expert-led consultancy and specialist resourcing have enabled clients to achieve their security goals.




We’ve worked with some of the UK’s best known firms, including top banks and insurance providers.

That expertise can help cyber security and risk leaders in any industry who:

1) Face a constantly evolving threat landscape, increasing regulatory pressures, and new problems that often emerge unexpectedly.

2) Struggle to find the right expertise and work to limited budgets. Providing the best defence possible requires smart choices.




Trusted relationships are at the heart of our business. We take the time to get to know our clients and develop a valuable partnership.

combine their experience with proven, knowledge-based methods to deliver great results. They can ensure the right foundations are in place, resolve immediate problems, and help with shaping future improvements.

use their industry knowledge and trusted network to source the right people for even the most complex cyber security and risk requirements. They can enhance and supplement existing areas or even build teams to lead projects on a client’s behalf.

The skills and know-how of our people are matched by a friendly, supportive culture that values openness, pragmatism, and commitment.

Please reach out if you would like to learn more about how we can help your organisation:

Security Resources: recruitment@i-confidential.com
All other enquiries: info@i-confidential.com

Listed Jobs

Company background Company brand
Company Name
i-confidential
Job Title
IAM Engineer/ Architect
Job Description
Job Title: IAM Engineer/Architect Role Summary: Deliver end‑to‑end design for Identity & Access Management solutions within a transformation programme, focusing on AI‑driven platforms and cloud infrastructure. Expactations: Provide high‑level architecture design, manage technical risk, present solutions to senior stakeholders, and act as subject‑matter expert in IAM across projects. Key Responsibilities: - Develop and document high‑level IAM solution designs aligned with business needs and architectural standards. - Create new architecture patterns, approve key design decisions, and manage technical risks. - Present designs to design authorities and senior stakeholders. - Offer technical thought leadership and serve as an IAM subject‑matter expert across initiatives. Required Skills: - Deep expertise in Identity & Access Management. - Hands‑on experience with Google Cloud Platform (GCP) and Kubernetes. - Familiarity with AI/ML services and AI system implementation. - Strong communication skills for both technical and non‑technical audiences. - Knowledge of enterprise architecture frameworks (e.g., SABSA, TOGAF). - Proficiency with BizzDesign, Jira, and Confluence is advantageous. Required Education & Certifications: - CISSP and/or CISM certification highly desirable. - Relevant bachelor's degree in Computer Science, Information Technology, or related field.
Edinburgh, United kingdom
Hybrid
06-11-2025
Company background Company brand
Company Name
i-confidential
Job Title
Security Solutions Architect
Job Description
**Job Title:** Security Solutions Architect **Role Summary:** Design, implement, and govern secure network and application architectures for a financial services client. Focus on SDLC security, network segmentation, application segmentation, and compliance with global regulatory frameworks (NIST, SANS, ITU). Develop architecture artefacts, conduct threat modeling, risk assessments, and collaborate with cross‑functional stakeholders to deliver secure, auditable solutions. **Expectations:** - Deliver end‑to‑end network segmentation (zones, segments, isolation) from design to deployment and migration. - Produce and maintain standards, patterns, strategies, roadmaps, and recommendation papers. - Ensure compliance with industry security frameworks and global regulatory requirements. - Communicate complex security concepts to non‑technical stakeholders clearly. **Key Responsibilities:** - Architect and design secure application and network segmentation in alignment with SDLC. - Document architecture artefacts (reference architecture, standards, patterns, roadmaps). - Perform threat modelling, risk assessments, and maintain data‑driven evidence for decision‑making. - Liaise with security architecture peers, project managers, business analysts, system architects, policy owners, and senior management. - Review and validate architecture artefacts through peer review and design authority approvals. - Support regulatory audit readiness and respond to regulator requirements. - Use BizzDesign, Archi, or UML for high‑level design visualisation. **Required Skills:** - Practical experience with legacy and modern networking infrastructure. - Hands‑on knowledge of inter‑zone and intra‑zone controls: WAAP, NIPS/NIDS, NGFWs, DDoS protection, API gateways, reverse proxies, AuthNZ. - Proficiency in Jira (project & task management) and Confluence (documentation). - Strong analytical and risk‑assessment abilities. - Excellent written and verbal communication with cross‑functional teams. - Experience with SDLC security and application security practices. - Familiarity with NIST, SANS, ITU frameworks and regulatory audit processes. **Required Education & Certifications:** - Bachelor’s degree in Computer Science, Information Security, or related field. - Professional security certifications preferred: CISSP, CISM, CCSP, or equivalent. ---
Sheffield, United kingdom
Hybrid
19-11-2025
Company background Company brand
Company Name
i-confidential
Job Title
Security Architect
Job Description
Job title: Security Architect Role Summary Design, author and govern end‑to‑end network and infrastructure security architectures for a financial services client, ensuring alignment with functional and non‑functional business requirements, industry standards and regulatory controls. Provide technical leadership, high‑level design artefacts, and governance oversight throughout the architecture lifecycle. Expactations - Deliver complete high‑level design documentation, architecture patterns, decision records, and risk logs (securely, on time). - Publish new architecture patterns, technical risks, issues, and deviations when required. - Maintain, extend, and re‑platform an Azure‑hosted web application that manages firewall rule recertification for CheckPoint, Illumio and Fortinet, supporting WAF, network segmentation, and proxy capabilities. - Influence technical design authorities and business stakeholders to secure solutions. - Lead investigations of control gaps, remediation plans and residual risk assessments for local and national programmes. Key Responsibilities - Create and publish high‑level network and infrastructure security designs (firewalls, WAF, SDN segmentation, IDS/IPS, proxies, NAC). - Architect features for web application upgrades, including WAF, network segmentation, proxy capabilities and infrastructure migration. - Provide technical expertise during large‑scale IT transformation programmes. - Coordinate design authority presentations, peer reviews and governance approvals. - Ensure solutions meet security bases, config baselines, HA, DR, and compliance requirements. - Identify and mitigate technical and project risks, mapping design decisions to risk outcomes. - Act as liaison between cybersecurity services and technical design authorities, translating business and security needs. - Maintain artefacts in Confluence, manage Jira for tasks, and model in BizzDesign, Archi or UML as required. Required Skills - Deep technical knowledge of network security controls: firewalls (CheckPoint, Illumio, Fortinet), WAF, software‑defined segmentation, IDS/IPS, proxies, NAC. - Experience with secure protocols (TLS/SSL, IPsec, SSH) and secure baselining. - Proficiency in traffic analysis, anomaly detection, and network policy management. - Expertise in disaster recovery, redundancy, high‑availability design. - Strong architecture and design skills: BizzDesign, Archi, UML, Confluence and Jira. - Ability to manage separation of control, design authority, and governance. - Effective communication with non‑security SMEs, business leaders, and technical teams. - Proven record in operational and transformation cybersecurity roles within large programmes. Required Education & Certifications - Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent professional experience). - Relevant certifications such as CISSP, CISM, CCSP, or vendor‑specific (CheckPoint, Illumint, Fortinet) preferred.
Manchester, United kingdom
Hybrid
24-12-2025