At a Glance
- Tasks: Lead identity architecture and design for cutting-edge security solutions.
- Company: Join Wipro, a global leader in tech services and consulting.
- Benefits: Competitive pay, flexible working, and opportunities for professional growth.
- Why this job: Make a real impact in cybersecurity while working with innovative technologies.
- Qualifications: 12+ years in Identity & Access Management architecture required.
- Other info: Dynamic work environment with a focus on digital transformation.
The predicted salary is between 48000 - 72000 £ per year.
Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients' most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses.
Location: Coventry - Hybrid
Role PurposeThe Senior IDAM Architect is the end to end technical authority for all Identity Pillar scope under Lot 1, accountable for Initiate, Discovery, Design, and Implementation across Identity Governance & Administration (IGA), Active Directory/Entra ID, RBAC/ABAC, PKI, Conditional Access, Identity Lifecycle, CIEM, and identity threat protection capabilities. This role acts as the single technical point of contact for all identity related decisions, integrations, designs, and technical escalations, ensuring adherence to Zero Trust principles, Client Delivery & Cyber frameworks, and the architectural governance process.
Key Responsibilities- Programme-Level Identity Architecture Leadership: Serve as the lead architect for all identity capabilities: IGA, directories (AD/OT AD/Entra ID), RBAC/ABAC, Conditional Access, PKI, CIEM, machine identity, identity lifecycle automation. Own the architectural strategy and roadmap for the Identity Pillar across Year 1 (I&D) and influence Year 2 planning. Act as the single technical authority across all identity workstreams, ensuring coherence, interoperability, and alignment with Zero Trust Identity outcomes. Lead technical governance engagement: Information Security TAG, PESA approvals, Design Authority reviews, and cross pillar integration sessions.
- Initiate & Discovery Responsibilities (Identity Specific): Lead comprehensive DAAS discovery for identity components: identity stores and directories; AD forests/domains and OT AD footprint; application identity models; entitlements, access patterns, privileged roles; IGA process and connector readiness; non human / service identities. Conduct identity specific discovery across: JML processes, access request flows, attestation cycles; directory security posture (CIS benchmarks, Microsoft best practices); account discovery (human, service, machine) across IT, OT, cloud, SaaS, air gapped systems. Evaluate and document: identity risks; excessive privileges; identity lifecycle issues; unmanaged accounts; access policy gaps. Produce: discovery logs; dependency registers; technical constraints; discovery outputs traceable to future designs.
- Identity Architecture Design Responsibilities: Produce HL/ML/LLD for the IGA platform (SailPoint/Saviynt/etc.). Define architecture for lifecycle automation (Joiner/Mover/Leaver); access request & approval workflows; entitlements management; attestation & certification; role mining & identity analytics. Define integration patterns with HR (authoritative source); AD/OT AD/Entra ID; ServiceNow; SIEM for identity related detections; PAM/PIM for privileged identities. Produce architecture for AD, Entra ID, and OT AD identity capabilities: secure configuration baselines; naming conventions, OU design, GPO strategy; trust boundaries, domain/forest design; identity lifecycle & sync patterns; directory-tiering strategy (Tier 0). Define enterprise RBAC/ABAC models: business roles, application roles, segregation of duties, governance and lifecycle of roles; ensure alignment with HR data models and IGA role mining outputs. Architect conditional access policies (CA rules, sign in risk, device trust, session controls); Define MFA strategy: Authenticator App, FIDO2, passwordless, biometrics; Define Zero Trust authentication patterns for privileged identities, third parties, mobile/remote users, OT identities where applicable. Produce architecture for PKI, certificate issuance, renewal, and lifecycle governance; Define trust anchors and certificate policies for user identities, device identities, service principals, OT and cloud workloads. Define cloud identity entitlement patterns (Azure/AWS); Establish least privilege, JIT/JEA patterns for cloud workloads.
- Implementation Responsibilities (Identity-Focused): Provide hands on architectural oversight to ensure implementations follow approved designs. Oversee rollout and validation of: IGA connectors, workflows, lifecycle processes; AD/Entra ID configuration updates and hardening; Conditional access/MFA/policy rollout; RBAC role deployment and attestation setup; PKI enhancements, CA templates, certificate workflows; CIEM configuration and governance. Guide identity engineers and application onboarding teams through technical sequencing, integration steps, and issue resolution. Validate end to end identity flows (authentication, provisioning, deprovisioning, attestation).
- Identity Governance, Compliance & Risk: Ensure all identity designs align with Zero Trust Identity requirements; CAF/eCAF outcomes; regulatory and compliance frameworks (GDPR, NIS R, PCI DSS). Define governance processes for privileged identity control; identity data quality; access attestation; policy exceptions. Support the audit and compliance teams with identity reporting, evidence, and control design.
- Stakeholder & Technical Leadership: Act as the single point of contact for all identity related technical matters across the programme. Lead communication with Cyber Architecture, HR, IT Ops, Security Operations, Application teams, OT Identity & OT Engineering teams. Conduct design walkthroughs, knowledge handovers, and training sessions for BAU teams. Resolve identity related escalations, engineering blockers, and architecture decision disputes.
- Technical Expertise: 12+ years in Identity & Access Management architecture. Deep expertise in: IGA (SailPoint/Saviynt), RBAC/ABAC; AD/Entra ID/OT AD; Authentication/Federation (SAML, OAuth2, OIDC); Conditional Access & MFA; PKI & Certificate Lifecycle; CIEM, cloud identity & Zero Trust identity patterns. Extensive experience designing and integrating identity capabilities across hybrid (IT/OT) landscapes.
- Delivery & Architecture: Proven experience delivering large-scale IAM transformations end to end. Strong architectural documentation and governance skills. Ability to lead multi vendor and multi platform identity delivery teams.
- Behavioural: Executive-level communication and architectural leadership. Operates confidently across strategic, detailed technical, and operational domains. Structured, methodical, collaborative, and outcome driven.
- Identity DAAS Discovery Reports
- Requirements (Functional & Non Functional)
- High/Mid/Low-Level Identity Designs
- IGA Architecture, Connector Designs & Workflow Specifications
- Directory Services Architecture Pack
- RBAC/ABAC Role Taxonomy & Governance Framework
- Conditional Access & MFA Design Pack
- PKI Architecture & Lifecycle Model
- Identity Implementation Playbooks
- Governance, Controls & Attestation Designs
- Technical submissions for TAG/PESA/Design Authority
We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry.
SECURITY ARCHITECT L1(CONTRACT) in Coventry employer: Wipro Limited
Contact Detail:
Wipro Limited Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land SECURITY ARCHITECT L1(CONTRACT) in Coventry
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the industry. Attend meetups, webinars, or even just grab a coffee with someone who’s already in the field. You never know who might have the inside scoop on job openings!
✨Tip Number 2
Show off your skills! Create a portfolio or a personal website showcasing your projects and achievements. This is your chance to shine and demonstrate what you can bring to the table, especially for a role as technical as a Security Architect.
✨Tip Number 3
Prepare for interviews like it’s game day! Research the company, understand their values, and be ready to discuss how your experience aligns with their needs. Practise common interview questions and think about how you can showcase your expertise in identity management.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, we love seeing candidates who are proactive about their job search!
We think you need these skills to ace SECURITY ARCHITECT L1(CONTRACT) in Coventry
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Security Architect role. Highlight relevant experience and skills that match the job description, especially in Identity & Access Management. We want to see how your background aligns with our needs!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about this role and how you can contribute to our team. Keep it concise but impactful – we love a good story!
Showcase Your Technical Skills: Since this role requires deep technical expertise, make sure to highlight your experience with IGA, RBAC/ABAC, and other relevant technologies. We’re looking for someone who can hit the ground running, so don’t hold back!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands. Plus, it shows us you’re serious about joining our team at StudySmarter!
How to prepare for a job interview at Wipro Limited
✨Know Your Identity Architecture
Make sure you brush up on your knowledge of Identity Governance & Administration (IGA), RBAC/ABAC, and other key areas mentioned in the job description. Be ready to discuss how you've applied these concepts in past roles, as this will show your technical expertise and understanding of the role.
✨Prepare for Technical Questions
Expect to face some challenging technical questions during the interview. Review common scenarios related to identity architecture, such as designing secure configurations or implementing Zero Trust principles. Practising your responses can help you articulate your thought process clearly.
✨Showcase Your Leadership Skills
As a Senior IDAM Architect, you'll need to demonstrate strong leadership abilities. Prepare examples of how you've led teams or projects in the past, particularly in complex identity management transformations. Highlight your communication skills and how you've resolved conflicts or escalations.
✨Understand the Company Culture
Research Wipro's values and culture before the interview. Understanding their focus on innovation and digital transformation will help you align your answers with their mission. Be ready to discuss how your personal values and career goals fit within their framework.