Security Architect L1
Listed on 2026-01-13
-
IT/Tech
Cybersecurity, Systems Engineer, IT Consultant, Cloud Computing
Job Title:
SECURITY ARCHITECT L1(CONTRACT)
City:
Warwick
State/Province:
Warwickshire
Posting
Start Date:
1/8/26
Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients' most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world.
For additional information, visit us at
Warwick
SC cleared/SC eligible candidates only
Key Responsibilities- Architecture & Design
- Support high-level and detailed architecture for Cyber Ark PAM Self Hosted (Vault, PVWA, CPM, PSM, PSMP, PTA, DR) and Cyber Ark Conjur/Secrets Manager, ensuring resilience, scalability, and compliance with CNI standards.
- Develop reference architectures, design patterns, and standards for seamless integration into infrastructure, applications, Dev Ops pipelines, containers, and multi cloud environments.
- Integration & Cross Team Collaboration
- Integrate Cyber Ark with corporate systems: AD/LDAP, SAML/OIDC, MFA providers, SIEM platforms (e.g., Splunk), and ITSM tools.
- Collaborate with security, infrastructure, IAM, Dev Ops, and application teams to ensure alignment with CNI policies and controls.
- CNI-Specific Security & Compliance
- Apply CNI security frameworks (e.g., NCSC, NIST, ISO
27001, FCA/Financial) in threat modeling, control selection, and architecture decisions. - Perform assessments, audits, and vulnerability analyses to maintain compliance with critical infrastructure regulations.
- Apply CNI security frameworks (e.g., NCSC, NIST, ISO
- Migration & Transition
- Lead migration from self hosted or legacy PAM systems to Cyber Ark Privilege Cloud or modern on-prem/cloud infrastructure. Develop migration roadmaps, runbooks, cutover strategies, and success metrics.
- Execute migration tasks: safe/platform migration, account and platform mapping, connector replacement, policy transformation, key rotation, and integration cut over.
- Implementation & Handover
- Manage installation, configuration, testing, and deployment of solution components; then transition them to operational “monitor and maintain” teams.
- Document HLDs/LLDs, runbooks, operational procedures, and deliver training to internal teams.
- Operational Support & Upgrades
- Provide expert-level L2/L3 support, incident response, troubleshooting (e.g., rotation issues, connector failures), troubleshooting root causes, and recommending issue resolution.
- Oversee platform health, patching, upgrades, and system hardening for CNI-level resilience.
- 1. Design and develop enterprise cyber security strategy and architecture
- a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses
- b. Identify risks associated with business processes, operations, information security programs and technology projects
- c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge
- d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
- e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations
- f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc.
- g. Provide support during technical deployment, configuration, integration and administration of security technologies
- h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc.
- i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity
- j. Provide solution of RFP’s received from…
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: