At i-confidential we are always looking for top-tier talent to meet the requirements of our ever-growing list of clients, which includes several of the UK’s best-known firms.
We specialise in delivering first-class cyber security and risk solutions to support a range of exciting businesses, and we are always looking for talented individuals to join us on that journey.
We currently have a requirement for a Lead Security Solution Architect to work on a Privileged Access Management programme with one of our financial services clients. The role requires someone who can provide thought leadership and will own the end-to-end design, manage the design team and making sure quality design is delivered on time.
Overview:
Our client is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the organisation.
One of the pillars of that programme is Privileged Access Management (PAM). Our client is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements.
Key Deliverables:
- Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements (including High- and Low-Level Designs)
- Articulate and publish key design decision records and options to ensure all solutions follow a logical, transparent decision-making process.
- Articulate, publish, and ensure approval of any design deviations resulting in technical debt.
- Ensure any technical risks or issues arising from a solution design are recorded and mitigated.
- Produce, manage, and translate the requirements into the architecture for that solution, ensuring technology and services meet the customer needs and expected business outcomes.
- Ensure the design of the solutions are efficient, timely and cost effective throughout the project lifecycle.
- Have a clear understanding of both the motivations of the business and technical security
- Promote strong documentation and processes.
Skills:
- Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud
- Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level.
- Experience in both operational and transformation cybersecurity roles or a clear working understanding of both perspectives.
- Experience working in large-scale IT transformation programmes.
- Experience working with PAM solutions such as CyberArk, Centrify, Delinea and OneIdentity
- Preparing end-to-end configuration of the strategic PAM capability – including on-prem deployments as well as Cloud native toolings
- Assisting in preparation of demonstrable journeys on the configured PAM tooling
Leadership:
- Provides technical thought leadership to the Design Team and the Project
- Ability to manage a project team of technical architects, engineers, and/or analysts
- Ability to take a deputised role in programme management-related tasks where necessary
Please note this requirement does not support overseas working and is Inside IR35.
#LI-DNI