Back to list

Enterprise Security Architect

What do you do as Enterprise Security Architect at skeyes?

As our Enterprise Security Architect, you will translate the skeyes and IT strategy into a global IT architecture by connecting the business processes with the application, data and infrastructure layers. Your ultimate goal is to design an organisation-wide architectural plan. You will play a crucial role in the digital transformation within skeyes.

  • You will be responsible for the creation of architecture models that reflect the company's strategies and goals and take responsibility for ICT architecture within one or more domains. You do this by:
    • Analysing business needs from an architectural point of view to translate them into performant and coherent ICT solutions;
    • Developing, implementing, monitoring, evaluating and adjusting the architecture in order to have a coherent framework within projects and developments;
    • Presenting and developing recommendations and translating them into executable roadmaps;
    • Creating blueprint roadmaps for complex and large technology environments together with internal partners;
    • Identifying and specifying implementation modalities of both existing and new technologies;
    • Functioning as a guardian of the architecture in the different architecture pillars like applications, integration, data, technology.
  • You play a crucial role as a point of contact for both business and IT when it comes to skeyes' ICT architecture. You do this by:
    • Providing guidance on enterprise architecture and systems processing in the data, application, integration, security and technology areas.
    • Promoting continuous improvement and development of methodologies used, among others.
    • Proposing improvements to optimise the functionality of the IT department with a view to cost efficiency, among other things.
    • Building a bridge between IT and business by advising management on complex ICT issues, ensuring decision-making.
  • You identify IT challenges and opportunities in collaboration with stakeholders to ensure the success of your projects. You do this by:
    • Reconciling conflicting requirements and functions by finding appropriate technological solutions.
    • Facilitating and leading the substantive decision-making process within the project team. You always follow the validation mechanisms.
    • You ensure that decisions on the projects are made on the basis of solid governance.
  • You keep abreast of evolutions and developments in IT architecture and relevant technologies. You estimate their usability and possibilities within the context of skeyes. In this way, you contribute to defining the future-oriented prevailing principles and frameworks.

Role for the Security Architect and key qualifications

As an Enterprise Security Architect at skeyes, you will have a critical responsibility to enhance the security posture of skeyes entire IT and OT landscape.  You will be tasked with the following:

  • Collaborating closely with IT and TechOPS teams to integrate security best practices into both the design and implementation phases of IT projects.
  • Translate high-level security policies set by the CISO team into detailed technical solutions within project designs and IT changes.
  • Ensure that all new and existing IT projects are compliant with the latest security standards and practices.
  • Design and recommend security enhancements and architectural modifications to existing IT infrastructures.
  • Serve as the technical expert in security design questions.
  • Create Security architecture principles and technical requirements at skeyes.

Candidate profile

What makes you the perfect Enterprise Security Architect?

  • You have at least 5 years of experience within IT. You have system design experience. Previous enterprise architecture experience is a plus.
  • You have a master's degree in engineering, preferably with specialisation in IT, or can demonstrate through experience that you have reached an equivalent level.
  • You breathe IT architecture and get your satisfaction from delivering architectural deliverables. As a result, you inspire colleagues and fuel their drive.
  • Your analytical mind enables you to understand the complex business model and associated systems. By applying architectural patterns, you achieve successful translation into designs and system requirements, among other things.
  • You bring proven experience in one of the architectural domains like security, data, application, integration, technology architecture.
  • You bring simplicity and transparency to communication, subordinating the complexity of the technical solutions to the target architecture.
  • You are always attentive to technological developments and know how to translate them into business opportunities. By taking your advisory role within this position, you know how to convince management of the necessary evolutions.
  • You keep in touch with the technical implementation aspects, making you an understanding interlocutor for the technical teams.
  • You see documentation and communication as essential, so that the architecture is supported by the entire skeyes organisation.
  • You can communicate well in English. Moreover, you can express yourself fluently in Dutch and/or French.

Requirements and qualifications:

  • In-depth knowledge of security architectures, protocols, and methodologies.
  • Strong understanding of network infrastructure including data, endpoint, application, and cloud security.
  • Expertise in identity and access management (IAM) systems and standards.
  • Familiarity with compliance requirements and industry standards such as GDPR, ISO 27001, NIST frameworks.
  • Advanced knowledge in technical security solutions such as Fortinet, Cisco, or Palo Alto, with relevant certifications (e.g., Fortinet NSE3 or higher)
  • Proven track record of designing and implementing security solutions in complex IT and OT environments. Demonstrable experience in bridging the gap between executive-level policies and ground-level technical implementations.
  • Serves as a plus: Certified Information Systems Security Professional (CISSP) or equivalent.
Apply Print

Security Screening


In light of the vacancy to which you respond we would like to draw your special attention to the fact that prior to being employed by skeyes candidates have to undergo a security screening which will be carried out by the National Security Authority. More info

Cookies policy

skeyes uses cookies on this website. Essential cookies are necessary for the website to work properly and cannot be refused. Functional cookies are useful for certain features of the site. You can refuse them but, in some cases, your use of the site may not be optimal. Other cookies are used for analytical and marketing purposes and will only be placed if you agree to their placement. See our cookies policy to find out more.