IT Security Architect 

IT Security Architects are technical specialists responsible for designing cyber resilience solutions and experts in security models, software, tools and standards (e.g. RESILIA, TOGAF, COBIT). They advance organizational cyber resilience through solutions that allow for secure but convenient access to information, and which comply with best practices and any regulatory mandates. Solutions include for example, identity and access management, threat and vulnerability management, mobile security and encryption technologies. Security Architects will stay abreast of industry security trends and developments, as well as applicable government regulations.

Typical Tasks

  • Create and maintain the enterprise security architecture design
  • Identify cyber risks specific to information systems
  • Design and embed cyber resilience solutions to mitigate cyber risks
  • Develop system capability for restoration after a catastrophic failure event
  • Defines initiatives within the cyber resilience strategic roadmap
  • Monitor technology and external developments.

Potential Next Steps

Chief Information Security Officer. 

How to get there

AXELOS professional certifications are recognized worldwide by employers as an indicator of your skills and commitment as an ITSM professional.

The following certifications are aimed at practising IT Security Architect and will support your development into more senior ITSM roles:

Service Design / Service Offerings and Agreements / Planning, Protection and Optimization

  • Maintain an accurate service catalogue
  • Improve service provider focus on customer outcomes
  • Develop specific and measurable targets for IT services
  • Monitor and improve customer satisfaction with the quality of service delivered
  • Manage customer and IT expectations for services delivered
  • Negotiate and agree service level requirements and targets
  • Understand current and future needs of the business for availability
  • Ensure that service performance achievements meet all of their agreed targets
  • Monitor and understand the patterns of business activity
  • Reduce risks to IT services to agreed acceptable levels.

Learn More About Service Design

Learn More About Service Offerings and Agreements 

Learn More About Planning, Protection and Optimization

Continual Service Improvement

  • Identify opportunities for improving services, processes and tools
  • Reduce the cost of providing services
  • Ensure that IT services enable the required business outcomes
  • Identify what needs to be measured, analyzed and reported for improvement.

Learn More About Continual Service Improvement

RESILIA™ Foundation

  • Introduction to cyber resilience.
  • How decisions impact good/bad cyber resilience.

Learn More About RESILIA™ Foundation

RESILIA™ Practitioner

  • What does effective cyber resilience look like?
  • What are the risks and issues that can easily hit cyber resilience?
  • How to get the best balance of risk, cost, benefits and flexibility within an organization.

Learn More About RESILIA™ Practitioner