We are looking for an experienced Security & Identity Architect to lead the design and implementation of secure-by-design principles across enterprise technology environments.
This is a strategic and hands-on architecture role focused on embedding cyber security controls into projects, platforms, cloud services, and digital solutions across the organisation. You will work closely with architecture, infrastructure, delivery, and leadership teams to ensure security requirements are integrated from design through to deployment.
You will also play a key role in shaping and governing the organisation's Identity & Access Management (IAM) strategy, helping to drive improvements in Zero Trust security, privileged access controls, and identity lifecycle management.
Key Responsibilities
Lead and enhance the organisation's Security by Design and project assurance frameworks
Define and maintain security non-functional requirements (NFRs) across all new systems and services
Review technical solutions and ensure secure architecture standards are met before go-live
Identify, document, and track security risks and technical debt
Provide guidance on secure cloud adoption across Azure and AWS environments
Drive IAM governance, including MFA, RBAC, PAM/PIM, Conditional Access, and Zero Trust controls
Support penetration testing, vulnerability management, and remediation activities
Collaborate with internal stakeholders, suppliers, and external partners to improve security posture
Contribute to security standards, policies, audits, and compliance activities
Support M&A onboarding/offboarding from a cyber security and identity perspective
Skills & Experience:
Proven experience in Security Architecture and Identity & Access Management
Strong understanding of Security by Design and secure software development lifecycles
Experience with enterprise IAM technologies and governance frameworks
Knowledge of cloud security principles across Azure and/or AWS
Experience with DevSecOps and Infrastructure as Code environments
Strong understanding of cyber security domains including authentication, authorisation, logging, monitoring, vulnerability management, and platform security
Excellent stakeholder management and communication skills
Ability to influence technical and non-technical audiences
What Success Looks Like:
Security controls consistently embedded into projects and solutions
Improved IAM maturity and Zero Trust adoption
Reduced security risk exposure across platforms and services
Strong collaboration across architecture, infrastructure, and delivery teams
Clear visibility and management of security-related technical debt and risk