Security Architect
i-confidential
Manchester, England, United Kingdom
Information Technology
We are currently looking for a Security Architect/Design Engineer with specific experience in Application Security. This is to join an existing team with one of our financial services clients.
Applicants will need to attend a client office 3 days per week; location can be a choice of Edinburgh/Sheffield/Birmingham/Manchester.
The role will involve managing end-to-end solution design and delivering design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. Alongside the creation of high-level designs, you will be required to publish new architecture patterns, key decisions, design deviations, and technical risks and issues where appropriate.
Significant experience and proven technical depth within application security -
- Hands-on experience securing modern application architectures (microservices, cloud-native, containerized environments).
- Knowledge of SCA tools and methodologies (e.g., dependency analysis, open-source license compliance, vulnerability triage, supply-chain risk management).
- Deep experience implementing and optimising AST capabilities, including SAST, DAST, IAST, MAST and container/K8s security scanning.
- Demonstrated success designing and integrating security testing pipelines within CI/CD environments (GitHub Actions, GitLab, Jenkins, Azure DevOps, etc.).
- Strong background in threat modelling, secure SDLC design, and establishing risk-based security policies for code, dependencies, and build systems.
- Ability to evaluate, select, and architect AppSec technologies, including enterprise SCA/AST platforms, SBOM solutions, and vulnerability management workflows.
- Experience collaborating with engineering teams to prioritize and remediate vulnerabilities, provide secure coding guidance, and enable developer-centric security practices.
- Familiarity with industry frameworks and standards (OWASP SAMM, ASVS, CSA, NIST SSDF, supply-chain security frameworks such as SLSA).
- Experience across vulnerability and exposure management including detection, analysis, management and resolution activities.
Experience within network security -
- Segmentation and Micro-Segmentation and itโs effects on vulnerability scanning.
- Defining and enforcing policies for secure network operations and appropriate access for vulnerability scanning.
- Establishing appropriate logging for the monitoring and analysis of network traffic to detect and respond to threats.
Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level
Experience and understanding of both the roles and interlock between enterprise & solution architecture
Experience in both operational and transformation cybersecurity roles or a clear working understanding of both perspectives
Experience working in large-scale IT transformation programmes
Ability to manage separation of control from technical design authority responsibilities - represent Cyber Services at technical and security design authorities to ensure that solutions are secure.
Experience ensuring compliance with security controls to identify control gaps, develop remediation plans and determine residual risk across both local and national programmes.
Platform & Technology
- Experience with Checkmarx, Invicti, Snyk, BlackDuck, Tenable, or other related Application Security
- BizzDesign, Archi, or generic UML visualisation experience for high-level designs
- High proficiency and expertise in Jira for project & tasks management
- Working proficiency in Confluence for documentation
Architecture & Design
- Provide assurance, support and oversight of solutions designs and support the engineering teams in delivering and executing strategic technology deployments.
- Ensure solution designs align to published reference architecture.
- Provide technical expertise & consultation to transformative programmes of work within their security domain.
- Clear understanding of both the motivations of the business and technical security.
- Promote strong documentation and clerkship.
Governance
- Willingness and ability to present reference architecture to design authorities and articulate deep technical concepts to a broad range of stakeholders in both large forums and smaller deep-dive sessions.
- Ensures all reference architecture, high-level designs, architecture patterns, decision records, deviation requests, and technical risks or issue records undergo architectural and project governance processes.
- Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation.
- Present publications at technical design authorities for input, feedback, and approval.
Risk and Dependency Management
- Effectively manages and escalates both technical and project risks or issues.
- Articulates solutions and remediation steps to technical risks & issues.
- Ability to map design decisions to resultant technical risks & issues to articulate the cause and rationale which leads to any negatively impacting change.
Security Design Engineers will work with stakeholders including the relevant enterprise architect to ensure design decisions in delivery align to strategic direction.
Security Design Engineers should be comfortable presenting and sharing solutions at design authorities and senior leadership & stakeholders.
Provide technical thought leadership and direction to their aligned projects and may stand in as subject matter experts and consultants related programmes.
Contract will be inside IR35. Role will be hybrid, 3 days per week in the client office, any of Edinburgh/Sheffield/Birmingham/Manchester.
About the company
Company websiteโขFinancial Services
i-confidential delivers expert-led cyber security services to help your organisation reduce risk.
With tailored solutions, a dedicated talent pool, and hands-on experience, we'll help you achieve long-term resilience.
๐ฆ๐ฒ๐ฐ๐๐ฟ๐ฒ ๐ถ๐ป ๐ผ๐๐ฟ ๐ธ๐ป๐ผ๐๐น๐ฒ๐ฑ๐ด๐ฒ.
We deliver cyber security and technology risk services that empower organisations to strengthen security, reduce risk and build lasting resilience.
With deep industry knowledge, decades of hands-on experience and a relationship-driven approach, weโll ensure you achieve lasting security outcomes.
๐ข๐๐ฟ ๐ฎ๐ฝ๐ฝ๐ฟ๐ผ๐ฎ๐ฐ๐ต.
Unlocking value, reducing risk and building resilience across your business. We help organisations like yours navigate todayโs complex cyber risk landscape with confidence.
Our services are designed to assess, strengthen, execute and optimise your risk management capabilities so you can focus on what matters most โ growing your business securely.
๐๐ผ๐ ๐๐ฒ ๐ฑ๐ฒ๐น๐ถ๐๐ฒ๐ฟ.
๐ข๐๐ฟ ๐ฐ๐ผ๐ป๐๐๐น๐๐ฎ๐ป๐ฐ๐ ๐ฝ๐ฟ๐ผ๐ณ๐ฒ๐๐๐ถ๐ผ๐ป๐ฎ๐น๐ ๐ต๐ฎ๐๐ฒ ๐ฑ๐ฒ๐ฐ๐ฎ๐ฑ๐ฒ๐ ๐ผ๐ณ ๐ฒ๐
๐ฝ๐ฒ๐ฟ๐ถ๐ฒ๐ป๐ฐ๐ฒ ๐ฏ๐ฒ๐๐๐ฒ๐ฒ๐ป ๐๐ต๐ฒ๐บ.
They will work closely with your organisation to deliver tailored solutions that align with your business objectives. With deep expertise in cyber security, IT, technology risk, and regulatory compliance, our consultants guide you through every step, from strategy and planning to implementation and optimisation, ensuring practical outcomes and sustainable success.
๐ง๐ต๐ฟ๐ผ๐๐ด๐ต ๐ผ๐๐ฟ ๐๐ฟ๐๐๐๐ฒ๐ฑ ๐๐ฎ๐น๐ฒ๐ป๐ ๐ป๐ฒ๐๐๐ผ๐ฟ๐ธ, ๐๐ฒ ๐ฝ๐ฟ๐ผ๐๐ถ๐ฑ๐ฒ ๐ฎ๐ฐ๐ฐ๐ฒ๐๐ ๐๐ผ ๐ต๐ถ๐ด๐ต๐น๐ ๐๐ธ๐ถ๐น๐น๐ฒ๐ฑ ๐ฐ๐ผ๐ป๐๐๐น๐๐ฎ๐ป๐๐ ๐๐ต๐ผ ๐ถ๐ป๐๐ฒ๐ด๐ฟ๐ฎ๐๐ฒ ๐ถ๐ป๐๐ผ ๐๐ผ๐๐ฟ ๐๐ฒ๐ฎ๐บ๐.
Whether you need short-term specialists or long-term support, our talent solutions ensure you have the right expertise to meet your evolving business needs and drive projects forward without delay.
Please reach out if you would like to learn more:
[email protected]
[email protected]