Security Design Engineer
Listed on 2026-01-13
-
IT/Tech
Cybersecurity, Systems Engineer -
Engineering
Cybersecurity, Systems Engineer
NTT DATA Birmingham, England, United Kingdom
Security Design EngineerPlease note, you will need to be eligible for SC clearance
NTT DATA is one of the world's largest global security service providers, partnering with some of the most recognized security technology brands. We're looking for passionate, curious, and motivated individuals to join our team.
Working under direct supervision, you will apply your developing expertise in security architecture, network security design, and infrastructure protection to create security designs, implement security controls, and support security engineering projects. You will contribute to infrastructure security solutions while building your skills in secure design patterns, security technologies, and architecture frameworks under the guidance of senior engineers and architects.
KEY RESPONSIBILITIES Security Architecture Design Support- Create straightforward architecture designs for network and infrastructure projects under direct supervision
- Develop network security diagrams, security zone models, and data flow diagrams following design standards
- Support enterprise architecture teams with security requirements and design input
- Document security design decisions and architectural rationale clearly
- Contribute to security reference architectures and reusable design patterns
- Participate in architecture review sessions and incorporate feedback into designs
- Design network security solutions including firewall architectures, network segmentation, and DMZ configurations
- Create detailed firewall rulesets, access control lists, and security policy designs
- Design VPN solutions for site‑to‑site and remote access connectivity
- Develop network security diagrams showing security zones, trust boundaries, and data flows
- Support implementation of network security controls following approved designs
- Document network security configurations and change procedures
- Design security technology solutions including SIEM, endpoint protection, and monitoring platforms
- Create technical specifications for security tool deployments under supervision
- Support proof of concept activities for security technology evaluations
- Design integration approaches for security tools within existing infrastructure
- Document technical requirements and implementation procedures for security solutions
- Assist with security technology vendor assessments and product selection
- Design security hardening standards for servers, network devices, and endpoints under supervision
- Create secure baseline configurations aligned with CIS Benchmarks and industry standards
- Develop security configuration policies and validation procedures
- Design automated hardening and compliance checking solutions
- Document security configuration requirements for infrastructure components
- Support security configuration assessments and remediation planning
- Produce high-quality security architecture documents and design specifications under supervision
- Create technical diagrams including network topology, security architecture, and data flow diagrams
- Develop security design standards and implementation guidelines
- Maintain design document repositories and configuration management
- Write technical security procedures and operational runbooks
- Contribute to security architecture governance and design review processes
- Support security architecture reviews and design assessments under supervision
- Validate security control implementations against design requirements
- Conduct technical security gap analyses and identify design weaknesses
- Assess security risks in infrastructure designs and recommend mitigations
- Perform security configuration reviews and compliance assessments
- Document assessment findings and remediation recommendations
- Quality and completeness of security designs and technical documentation produced
- Successful implementation of security solutions based on approved designs
- Client and stakeholder satisfaction with security design deliverables
- Accuracy of security configurations and minimal rework required
- Progre…
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: