At a Glance
- Tasks: Design and implement security solutions for a top bank's Identity and Access Management programme.
- Company: Join a leading bank transforming its cybersecurity landscape.
- Benefits: Competitive salary, flexible working, and opportunities for professional growth.
- Why this job: Make a real impact in cybersecurity while working with cutting-edge technologies.
- Qualifications: Experience in security architecture and knowledge of Privileged Access Management.
- Other info: Collaborative team environment with excellent career advancement opportunities.
The predicted salary is between 48000 - 72000 Β£ per year.
Job Profile β Security Solution Architect
Applying for this role is straight forward Scroll down and click on Apply to be considered for this position.
Location: UK β Sheffield (3 days weekly from office)
Project Overview
Top Bank is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. One of the pillars of that programme is Privileged Access Management (PAM). Bank is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements.
We are seeking an experienced Security Solution Architect that can complement an existing team of Solution Architects to progress with designs of different components of the PAM solution and other supporting systems it will need to integrate with as part of the end-to-end journey.
Security Solution Architects manage end-to-end solution design and are responsible for delivering architecture design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. They will be responsible for the creation of high-level and low-level designs, documenting key design decisions, design deviations, and technical risks and issues where appropriate.
Security Solution Architects should be comfortable presenting and sharing solutions at design authorities and senior leadership & stakeholders as well as working with global teams to both explain the design and agree designs related to the Password Management of new Technologies.
Principal Preferred Requirements
Cybersecurity Expertise:
* Experience as a Solution Architect with knowledge of identity & access management, and especially PAM
* Strong experience documenting High-Level and Low-Level designs.
* Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level
* Experience working in large-scale IT transformation programmes
* Experience working with PAM solutions such as CyberArk, Centrify, Delinea / Thycotic and OneIdentity
Qualifications & Certifications:
* CISSP/CISM certification or other broad cybersecurity industry-recognised certificate
Platform & Technology:
* BizzDesign, Archi, or generic UML visualisation experience for high-level designs
* Working proficiency in Jira for project & tasks management
* Working proficiency in Confluence for documentation
Principal Accountabilities and Responsibilities
Architecture & Design:
* Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements including low-level / detailed designs
* Articulate and publish key design decision records and options to ensure all solutions follow a logical, transparent decision-making process
* Articulate, publish, and ensure approval of any design deviations resulting in technical debt
* Ensure any technical risks or issues arising from a solution design are recorded and mitigated.
* Produces, manages and translates the requirements into the architecture for that solution, ensuring technology and services meet the customer needs and expected business outcomes
* Ensures the design of the solutions are efficient, timely and cost effective throughout the project lifecycle
* Clear understanding of both the motivations of the business and technical security
* Promote strong documentation and clerkship
Risk and Dependency Management:
* Effectively manages and escalates both technical and project risks or issues
* Articulates solutions and remediation steps to technical risks & issues
* Ability to map design decisions to resultant technical risks & issues to articulate the cause and rationale which leads to any negatively impacting change
Teamwork
* Willingness and ability to work across information technology as a cybersecurity SME
* Experience of performing peer reviews of the PAM teamβs designs
* Collaborate with members of the Engineering and Test teams within the programme
General
* Excellent knowledge of English both spoken and written
Security Solution Architect employer: Coforge
Contact Detail:
Coforge Recruiting Team
StudySmarter Expert Advice π€«
We think this is how you could land Security Solution Architect
β¨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend meetups, and connect with people on LinkedIn. You never know who might have the inside scoop on job openings or can put in a good word for you.
β¨Tip Number 2
Prepare for interviews by practising common questions and scenarios related to Security Solution Architecture. We recommend doing mock interviews with friends or using online platforms to get comfortable with your responses.
β¨Tip Number 3
Showcase your expertise! Create a portfolio that highlights your previous projects, especially those involving PAM solutions. This will give potential employers a clear view of what you can bring to the table.
β¨Tip Number 4
Donβt forget to apply through our website! Itβs the easiest way to ensure your application gets noticed. Plus, we love seeing candidates who take the initiative to engage directly with us.
We think you need these skills to ace Security Solution Architect
Some tips for your application π«‘
Tailor Your CV: Make sure your CV is tailored to the Security Solution Architect role. Highlight your experience with PAM solutions and any relevant certifications like CISSP or CISM. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how your background makes you a perfect fit for our team. Keep it concise but impactful β we love a good story!
Showcase Your Documentation Skills: Since this role involves a lot of documentation, make sure to showcase your ability to produce high-level and low-level designs. Include examples of your previous work if possible, as this will demonstrate your expertise in the field.
Apply Through Our Website: Don't forget to apply through our website! Itβs the easiest way for us to receive your application and ensures youβre considered for the position. We canβt wait to see what you bring to the table!
How to prepare for a job interview at Coforge
β¨Know Your PAM Inside Out
Make sure you brush up on your knowledge of Privileged Access Management solutions like CyberArk and Centrify. Be ready to discuss how these tools can enhance security and streamline processes, as this will show your expertise and understanding of the role.
β¨Showcase Your Design Skills
Prepare to talk about your experience with high-level and low-level designs. Bring examples of architecture design documents you've created in the past, and be ready to explain your design decisions and how they align with business requirements.
β¨Communicate Clearly with Non-Techies
Since you'll need to work with non-security technical SMEs, practice explaining complex concepts in simple terms. This will demonstrate your ability to bridge the gap between technical and non-technical stakeholders, which is crucial for this role.
β¨Be Ready for Team Collaboration Questions
Expect questions about teamwork and collaboration. Think of examples where you've worked with cross-functional teams or performed peer reviews. Highlight your ability to manage risks and communicate effectively within a team setting.