Techfynder logo
Upload CV
avatar
avatar

Lead Security Solution Architect

  • TEST TRIANGLE
  • Job Type : Contract

  • room United Kingdom /Sheffield

Number Of Applications : 0

Job Posted On : 29/09/2025

Job Posted On : 29/09/2025

  • Onsite

    Yes

  • Remote Work

    No

  • Experience Required

    8 - 10 yrs

  • Start Date

    Oct 19, 2025

  • Number of Positions:

    1

  • Visa Sponsorship

    No

  • Spoken Languages

    English

  • Job Post Currency

    Negotiable

REQUIRED SKILLS

CyberArk
Centrify
Delinea
Privilege Password Management
CONTRACT

Job Duration: 6 months

Daily Salary: Negotiable

Job Description

Title: Lead Security Solution Architect 

 

Location: UK - Sheffield (Hybrid) 

Mandatory Skills: Privilege Password Management CyberArk.  

Experience: 8-10 Years.​

​

Job Description:​

Project Overview​

Client is working on a strategic Identity and Access Management programme and is re-

shaping the way Authentication, Federation, Privileged Access Management, Access 

Governance, Secrets Management and API Security is done across the bank. Client is 

working on uplifting controls and capabilities in privileged access for the Group and 

introducing the strategic password vaulting solution that will enable to meet strategic 

requirements. ​

Security Solution Architects manage end-to-end solution design and are responsible for 

delivering architecture design documents in line with functional and non-functional business 

requirements, strategies, principles, standards, and patterns. Alongside the creation of high-

level designs, Security Solution Architects will be required to record key decisions, design 

deviations, and technical risks and issues where appropriate. Security Solution Architects 

should be comfortable presenting and sharing solutions at design authorities and senior 

leadership & stakeholders. ​

The Lead Security Solution Architect will provide technical thought leadership and direction 

to their project team and may represent the project / programme as subject matter expert.   

​

Principal Preferred Requirements:​

Cybersecurity Expertise: ​

Significant experience and proven technical depth within one of the following domains of 

cybersecurity; security operations & incident response, threat & vulnerability management, 

identity & access management, cryptography, infrastructure, network, application, data, 

cloud. ​

Broad background across information technology with the ability to communicate clearly 

with non-security technical SMEs at a comfortable level. ​

Experience working with PAM solutions such as CyberArk, Centrify, Delinea and 

OneIdentity. ​

Preparing end-to-end configuration of the strategic PAM capability – including on-prem 

deployments as well as Cloud native toolings. ​

Qualifications & Certifications:​

CISSP/CISM certification or other broad cybersecurity industry-recognised certificate​

SABSA or TOGAF certified preferred. ​

Architecture & Design: ​

Produce, manage, and update end-to-end solution designs in line with reference architecture 

& business requirements (including High and Low Level Designs​

Articulate and publish key design decision records and options to ensure all solutions follow 

a logical, transparent decision-making process.​

Articulate, publish, and ensure approval of any design deviations resulting in technical debt. ​

Ensure any technical risks or issues arising from a solution design are recorded and mitigated. ​

Produces, manages and translates the requirements into the architecture for that solution, 

ensuring technology and services meet the customer needs and expected business outcomes. ​

Ensures the design of the solutions are efficient, timely and cost effective throughout the 

project lifecycle. 

​

Promote strong documentation and clerkship. 

​

Governance:​

Ensures all high-level designs, architecture patterns, decision records, deviation requests, and 

technical risks or issue records undergo architectural and project governance processes. ​

Ensure all architecture artefacts undergo appropriate peer review prior to design authority 

presentation. ​

Present publications at technical design authorities for input, feedback, and approval. 

​

Risk and Dependency Management: 

​

Effectively manages and escalates both technical and project risks or issues​

Articulates solutions and remediation steps to technical risks & issues​

Provides technical thought leadership to the Design Team and the Project​

Ability to manage a project team of technical architects, engineers, and/or analysts. 

Sectors

  • Information Technology

Shifts

  • General Shift
About Company

IT Recruiting Company

2025-09-29
2026-04-19T18:30
https://d316yk9f1zluhf.cloudfront.net/62cc0869276eb50001f72cfd-4.jpg
INR

Contact us below to hear about our global solutions

marketing@techfynder.com

India : +91 9030744477

Ireland: +353 19685077

Download on Google PlayDownload on the App Store
British Council Certified Counsellor
    SUPPORT
  • FAQ
  • Terms & Conditions
  • Contact Us
    OUR COMPANY
  • Meet the Team
  • Our Blogs
    OUR SERVICES
  • Jobfynder
  • Talentfynder
  • Studyfynder
  • Skillfynder
  • Internshipfynder
    Top Jobs
  • Jobs in India
  • Jobs in Ireland
  • Jobs in Germany
  • Jobs in Nigeria
  • Jobs in UK
  • Jobs in USA

Contact us below to hear about our global solutions

marketing@techfynder.com
Download on Google PlayDownload on the App Store
    SUPPORT
  • FAQ
  • Terms & Conditions
  • Contact Us
British Council Certified Counsellor
    OUR COMPANY
  • Meet the Team
  • Our Blogs
    OUR SERVICES
  • Jobfynder
  • Talentfynder
  • Studyfynder
  • Skillfynder
  • Internshipfynder
    TOP JOBS
  • Jobs in India
  • Jobs in Ireland
  • Jobs in Germany
  • Jobs in Nigeria
  • Jobs in UK
  • Jobs in USA

©2025 Techfynder® a product of Test Triangle All rights reserved.