Presales Cybersecurity Solution Architect at Unisys - UK
Bangalore, karnataka, India -
Full Time


Start Date

Immediate

Expiry Date

12 Apr, 26

Salary

0.0

Posted On

12 Jan, 26

Experience

10 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cybersecurity Architecture, Security Engineering, Security Consulting, Threat Detection, Incident Response, Vulnerability Management, Identity Governance, Compliance, Cost Modeling, Financial Analysis, Technical Proposal Development, Gen AI Tools, Security Compliance Frameworks, Cloud Security, Network Security, Security Operations

Industry

IT Services and IT Consulting

Description
What success looks like in this role: We are seeking a Principal Presales Solution Architect to lead the design and sales strategy for enterprise cybersecurity managed services. This role combines deep security architecture expertise with commercial acumen, cost modeling expertise, and hands-on proficiency with Gen AI tools. You will design end-to-end cybersecurity solutions integrating threat detection, incident response, vulnerability management, identity & access governance, cloud security, and security operations—addressing enterprise security maturity across on-premises, hybrid cloud, and multi-cloud environments. You will author compelling technical proposals, build financial business cases, and influence enterprise deals worth $5–$20M+ in security services value. You'll partner closely with sales, delivery, and executive leadership to win transformational security opportunities and establish the foundation for successful delivery. KEY RESPONSIBILITIES: Solution Architecture & Design Lead enterprise discovery and requirements-gathering sessions to understand current security posture, threat landscape, compliance obligations, and strategic security objectives Design comprehensive cybersecurity managed services solutions spanning: Threat Detection & Response: SIEM/XDR deployment, SOC operations, 24/7/365 monitoring, threat hunting, incident response Vulnerability & Risk Management: Vulnerability assessment, patch management, risk quantification, remediation prioritization Identity & Access Management: IAM/PAM architecture, multi-factor authentication, privileged access governance, identity compliance Cloud Security: Cloud workload protection, cloud access security brokers, data loss prevention, cloud compliance Network Security: Next-generation firewalls, network segmentation, intrusion prevention, DDoS mitigation Security Compliance & Governance: Regulatory compliance (SOC2, ISO 27001, HIPAA, PCI-DSS), audit & reporting, security governance frameworks Develop detailed solution architecture documents, security roadmaps, and implementation playbooks that align with customer maturity levels, budgets, timelines, and risk tolerance Present solutions to CXO-level (CISO, CIO, CFO) and technical audiences, translating technical security capabilities into quantifiable business outcomes (risk reduction, compliance achievement, operational efficiency, breach cost avoidance) Cost Modeling & Financial Analysis Develop detailed cost models and ROI analyses for cybersecurity solutions, including: Infrastructure and tools (SIEM, XDR, IAM, firewall, cloud security platforms) Managed services delivery (SOC staffing, monitoring, incident response, threat hunting) Implementation, integration, and training costs Ongoing operational and licensing costs Cost of non-compliance and breach scenarios Build bottom-up cost estimates from security assessment findings, maturity gap analysis, and service delivery models Create financial scenarios and sensitivity analyses demonstrating value across different investment horizons, risk profiles, and threat scenarios Develop breach cost avoidance analyses and risk-adjusted ROI models that influence executive investment decisions Use cost modeling as a consultative tool to influence solution scope, technology selection, and service delivery approach Validate cost assumptions with delivery and finance teams to ensure proposals are realistic, defensible, and profitable post-signature Technical Proposal Development Own the technical RFP response process for cybersecurity opportunities; translate customer requirements into compelling, technically sound, commercially viable proposals Develop executive summaries, security architecture diagrams, implementation timelines, resource plans, risk mitigation strategies, compliance roadmaps, and success metrics Articulate how our integrated managed services approach, security maturity methodologies, and SOC capabilities address customer technical, operational, and compliance requirements Coordinate with internal stakeholders (delivery, security engineering, compliance, operations, finance) to validate assumptions and ensure delivery feasibility Use Gen AI tools (e.g., Microsoft Copilot) daily to accelerate documentation, refine technical language, synthesize complex security requirements, and improve proposal quality and turnaround time Leverage AI-assisted analysis to generate threat scenario modeling, compliance impact assessments, comparative threat landscape analyses, and persuasive risk narratives Delivery Partnership & Post-Sales Success Partner with security delivery and SOC leadership to ensure presales solutions are feasible, cost-effective, and aligned with our integrated security delivery model and service playbook Author transition documents, security implementation roadmaps, operational playbooks, and compliance monitoring frameworks that guide delivery teams and set customer expectations Participate in solution kickoffs, security strategy reviews, and steering meetings to ensure alignment between promised security outcomes and execution Gather post-engagement feedback to refine security solutions, cost models, service maturity, and delivery excellence #LI-SP2 You will be successful in this role if you have: Experience: 10–14 years in cybersecurity architecture, security engineering, security consulting, or cybersecurity presales/solutions roles Minimum 6–8 years focused on enterprise security managed services, security operations, threat detection, or security compliance Demonstrated track record of winning enterprise security deals or leading complex security solution designs that influenced outcomes Proven expertise developing security cost models, financial analyses, and ROI scenarios for security platforms and managed services Track record authoring technical security RFP responses and proposals that have directly influenced security deal wins or negotiations Experience designing or delivering integrated security service models spanning threat detection, vulnerability management, identity governance, compliance, and incident response Specific experience with SIEM/XDR deployments, SOC operations, or security managed services delivery Technical Expertise Deep knowledge of enterprise security architecture and threat landscape: SIEM/XDR platforms (Splunk, Microsoft Sentinel, Elastic, Crowdstrike, etc.) Identity & Access Management (IAM/PAM) solutions (Okta, Microsoft Entra, CyberArk, etc.) Cloud security platforms (Palo Alto Prisma Cloud, Microsoft Defender for Cloud, AWS Security Hub, etc.) Network security (next-gen firewalls, network segmentation, zero trust architecture) Endpoint security and EDR/XDR solutions Data protection and DLP solutions Compliance and governance tools Strong understanding of: Security operations and SOC maturity models Incident response and threat hunting methodologies Security compliance frameworks (SOC2, ISO 27001, HIPAA, PCI-DSS, NIST, CIS Controls) Vulnerability management and threat risk quantification Zero Trust architecture and network segmentation strategies Cloud security governance and multi-cloud security posture management Hands-on experience with: Security assessments and threat modeling Vulnerability assessment tools and methodologies SIEM/XDR configuration, tuning, and optimization Security incident response and post-incident analysis Security compliance audits and gap analysis Proficient use of Gen AI tools (Claude, ChatGPT, Microsoft Copilot, GitHub Copilot) in daily security architecture and proposal work as integrated productivity tools, not novelties Demonstrated ability to use AI tools for threat scenario synthesis, compliance impact analysis, risk quantification, proposal acceleration, and analysis Business & Soft Skills Exceptional communication and presentation skills; ability to translate complex security concepts for C-level executives (CISO, CIO, CFO) and diverse stakeholder groups Strong consultative and discovery capabilities; ability to identify and quantify hidden security risks and business impacts Results-oriented; ability to manage multiple concurrent opportunities and prioritize for maximum impact Collaborative; comfortable influencing outcomes across sales, delivery, compliance, finance, and executive teams Strategic thinking; ability to align security solutions to organizational transformation goals, risk tolerance, and business context Financial acumen and comfort with cost modeling, margin analysis, and understanding solution design's impact on profitability Certifications & Nice-to-Haves Advanced security certifications (at least one required): CISSP (Certified Information Systems Security Professional) CCSP (Certified Cloud Security Professional) CCSK (Certificate of Cloud Security Knowledge) OSCP (Offensive Security Certified Professional) or equivalent offensive security certification GCIH (GIAC Certified Incident Handler) or ECIH equivalent Additional relevant certifications: CISM (Certified Information Security Manager) CEH (Certified Ethical Hacker) or equivalent Vendor certifications (Splunk, Microsoft Sentinel, Palo Alto, AWS Security, etc.) ITIL, COBIT, or security service management frameworks Experience in security managed services, MSSP, or security consulting organizations Published thought leadership on cybersecurity strategy, threat landscape, or Gen AI in security Experience with security pricing models, security services delivery, or security business development Familiarity with security analytics, threat intelligence platforms, or AI-powered security solutions Unisys is proud to be an equal opportunity employer that considers all qualified applicants without regard to age, blood type, caste, citizenship, color, disability, family medical history, family status, ethnicity, gender, gender expression, gender identity, genetic information, marital status, national origin, parental status, pregnancy, race, religion, sex, sexual orientation, transgender status, veteran status or any other category protected by law. Local employment practices and rights may vary by jurisdiction and are subject to applicable local laws. This commitment includes our efforts to provide for all those who seek to express interest in employment the opportunity to participate without barriers. If you are a US job seeker unable to review the job opportunities herein, or cannot otherwise complete your expression of interest, without additional assistance and would like to discuss a request for reasonable accommodation, please contact our Global Recruiting organization at GlobalRecruiting@unisys.com. US job seekers can find more information about Unisys’ EEO commitment here. Unisys is a global technology solutions company that powers breakthroughs for the world’s leading organizations. Our solutions – cloud, AI, digital workplace, logistics and enterprise computing – help our clients challenge the status quo and unlock their full potential. To learn how we have been helping clients push what’s possible for more than 150 years, visit unisys.com and follow us on LinkedIn. https://www.unisys.com/unisys-legal/recruiting Notice for U.S. Applicants: Unisys is an Equal Opportunity Employer – Minorities/ Females/ Veterans/ Individuals with Disabilities/ Sexual Orientation/ Gender Identity

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities
The role involves leading the design and sales strategy for enterprise cybersecurity managed services, including solution architecture and cost modeling. The architect will also develop technical proposals and partner with sales and delivery teams to ensure successful implementation.
Loading...