Job Specifications
Location
Westminster, London About the job Job summary
The Digital Data and Technology Division provides UKEF's DDaT operational IT services and transformational capability for the delivery of change programmes. The Division includes project and change managers, a PMO function, Business Analysts, Developers, DevOps and Enterprise Architecture. The Enterprise Architecture Team role is to develop and maintain a framework that will assist UKEK to align our strategy, processes and technology to achieve our goals.
The Enterprise Architecture function is critical for UKEF to proactively and holistically lead enterprise responses to disruptive forces by identifying and analysing the execution of change toward desired business visions and outcomes. Enterprise Architecture enhances customer value add by presenting business and IT leaders with signature-ready recommendations to achieve agreed business outcomes.
About the Role
The Technical & Security Architect is a key member of the EA Team and is responsible for the architecture and security of the team's domains monitoring platform and to ensure that the .gov.uk registry provider delivers a resilient service.
The UK Public Sector depends on Internet domain name spaces such as ".gov.uk", and you will ensure these name spaces remain stable, trusted, well managed and resistant to compromise.
You will bring together your proven technical and cyber expertise with business transformation where branding, government policy and law all play a part through the creation of secure technical solution designs ensuring all our services and infrastructure are secure by design.
It is essential that you are positive, proactive and collaborative with a commitment to providing excellent customer service. Job description
Main Activities
The key responsibilities and deliverables for this post are working with your UKEF colleagues and customers to ensure that UKEF is able to meet evolving customer demand using a secure, scalable and robust enterprise architecture blueprint.
The main activities of your role will be:
Designing secure systems - you can design and review system architectures through the development of patterns and principles.
Security technology - you can demonstrate strong knowledge of system architectures. You can understand and articulate the impact of vulnerabilities on existing and future designs and systems, and how easy or difficult it will be to exploit these vulnerabilities. You can be recognised as an expert by peers in the broader security industry.
Communicating between the technical and non-technical - you can identify the needs of business and technical stakeholders. You can effectively manage stakeholder expectations. You can demonstrate excellent communication skills and can manage difficult conversations or negotiations.
Making and guiding decisions - you can make decisions characterised by managed levels of risk and complexity, and recommend decisions as risk and complexity increase. You can resolve technical disputes between wider peers and indirect stakeholders, considering all views and opinions.
Strategy- you can apply strategy, using and challenging patterns, standards, policies, roadmaps and vision statements. You can provide guidance.
Turning business problems into secure technical designs - you can design systems characterised by high levels of risk, impact, and business or technical complexity. You can simultaneously work across multiple services or a single large or complicated service.
Understanding the whole context - you can understand trends and practices outside your team and how these will impact your work. You can see how your work fits into the broader strategy and historical context. You can consider the patterns and interactions on a larger scale.
The public core of the internet - you will have detailed and extensive experience of naming and numbering systems, cryptographic mechanisms, packet routing and common protocols and how the domain name system (DNS) works
You will also have detailed and extensive expertise of at least two of the following:
managing domains for a large, distributed and federated organisation
how domains are used to support Internet services and their security
different ways that a domain vulnerability can be exploited, and how to prevent them
developing tools that interact with domain records
This list is not exhaustive, and you may be required to carry out additional duties according to business needs. Person specification Essential Qualifications
Relevant degree in associated Computer Science subject or equivalent demonstrable professional experience (A, I)
Recognised architectural qualification eg TOGAF, BCS (A) Knowledge
Demonstrable knowledge of the creation of and embedding of relevant architectural policies, standards and models (A, I, P)
Demonstrable knowledge of security frameworks, standards and regulatory requirements eg GDPR, PCI DSS (A, I) Skills/Ability
Ability to demons
About the Company
Government Digital and Data is a community of experts leading digital transformation in government, delivering modern and efficient services. Together, we are a powerful force creating more efficient services that have a meaningful impact on people's lives.
The Government Digital Service leads the Government Digital and Data function for government.
Know more