Cybersecurity Solution Architect – SSH & Cryptography Specialist
Listed on 2026-01-17
-
IT/Tech
Cybersecurity, Systems Engineer
Are you an expert in cryptography and secure key management? Do you thrive on designing robust security solutions for complex enterprise environments? We’re looking for a Cybersecurity Solution Architect with deep expertise in SSH key management and advanced cryptographic practices to lead the design and delivery of secure architectures across large-scale transformation programmes.
In this role, you’ll own end-to-end solution design, create high-level architecture patterns, and ensure alignment with strategic direction. You’ll work closely with enterprise architects, senior stakeholders, and technical teams to deliver secure, efficient, and cost-effective designs. This is a unique opportunity to influence key decisions, provide technical thought leadership, and drive innovation in identity, access, and cryptography for next-generation platforms.
Key Responsibilities- Design and deliver secure solution architectures with a strong focus on SSH key lifecycle management and cryptographic controls.
- Define and publish architecture patterns, decision records, and design deviations.
- Identify and mitigate technical risks and dependencies throughout the project lifecycle.
- Present solutions at design authorities and engage senior leadership for approvals.
- Act as a subject matter expert in cryptography and secure access management.
- Promote strong documentation and governance practices.
- Proven experience in SSH key management, including:
- Secure generation, rotation, and storage of SSH keys.
- Implementing automated SSH key lifecycle solutions.
- Deep technical knowledge in cryptography, including:
- PKI and certificate management.
- Symmetric & asymmetric encryption algorithms.
- Secure key exchange protocols.
- Hash functions and integrity verification.
- Strong understanding of authentication protocols (Kerberos, OAuth, SAML).
- Experience with Privileged Access Management (PAM) and Federated Identity.
- Broad IT background with ability to communicate effectively with non-security SMEs.
- Experience in large-scale IT transformation programmes.
- Familiarity with Bizz Design, Archi, or UML for high-level designs.
- Proficiency in Jira and Confluence for project and documentation management.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: