Security Architect L1
Listed on 2026-02-06
-
IT/Tech
Cybersecurity, Systems Engineer
Overview
Job Title:
SECURITY ARCHITECT L1(CONTRACT)
City:
Coventry
State/Province:
West Midlands
Posting
Start Date:
2/2/26
Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients' most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world.
For additional information, visit us at
Senior IDAM Architect - Identity Pillar (Lot
1)
Location:
Coventry - Hybrid
The Senior IDAM Architect is the end to end technical authority for all Identity Pillar scope under Lot 1, accountable for Initiate, Discovery, Design, and Implementation across Identity Governance & Administration (IGA), Active Directory/Entra , RBAC/ABAC, PKI, Conditional Access, Identity Lifecycle, CIEM, and identity threat protection capabilities.
This role acts as the single technical point of contact for all identity related decisions, integrations, designs, and technical escalations, ensuring adherence to Zero Trust principles, Client Delivery & Cyber frameworks, and the architectural governance process.
Key Responsibilities- Serve as the lead architect for all identity capabilities: IGA, directories (AD/OT AD/Entra ), RBAC/ABAC, Conditional Access, PKI, CIEM, machine identity, identity lifecycle automation.
- Own the architectural strategy and roadmap for the Identity Pillar across Year 1 (I&D) and influence Year 2 planning.
- Act as the single technical authority across all identity work streams, ensuring coherence, interoperability, and alignment with Zero Trust Identity outcomes.
- Lead technical governance engagement:
Information Security TAG, PESA approvals, Design Authority reviews, and cross pillar integration sessions.
- Lead comprehensive DAAS discovery for identity components: identity stores and directories; AD forests/domains and OT AD footprint; application identity models; entitlements, access patterns, privileged roles; IGA process and connector readiness; non human / service identities.
- Conduct identity specific discovery across: JML processes, access request flows, attestation cycles; directory security posture (CIS benchmarks, Microsoft best practices); account discovery (human, service, machine) across IT, OT, cloud, SaaS, air gapped systems.
- Evaluate and document: identity risks; excessive privileges; identity lifecycle issues; unmanaged accounts; access policy gaps.
- Produce: discovery logs; dependency registers; technical constraints; discovery outputs traceable to future designs.
- IGA Architecture:
Produce HL/ML/LLD for the IGA platform (SailPoint/Saviynt/etc.). - Define architecture for lifecycle automation (Joiner/Mover/Leaver); access request & approval workflows; entitlements management; attestation & certification; role mining & identity analytics.
- Define integration patterns with HR (authoritative source); AD/OT AD/Entra ;
Service Now; SIEM for identity related detections; PAM/PIM for privileged identities. - Directory Services & Identity Core:
Produce architecture for AD, Entra , and OT AD identity capabilities: secure configuration baselines; naming conventions, OU design, GPO strategy; trust boundaries, domain/forest design; identity lifecycle & sync patterns; directory-tiering strategy (Tier
0). - RBAC / ABAC:
Define enterprise RBAC/ABAC models: business roles, application roles, segregation of duties, governance and lifecycle of roles; ensure alignment with HR data models and IGA role mining outputs. - Conditional Access & Authentication:
Architect conditional access policies (CA rules, sign in risk, device trust, session controls);
Define MFA strategy:
Authenticator App, FIDO2, passwordless, biometrics;
Define Zero Trust authentication patterns for privileged identities, third parties, mobile/remote users, OT identities where applicable. - PKI & Certificate Lifecycle:
Produce architecture for PKI, certificate issuance, renewal, and lifecycle governance;
Define trust anchors and certificate policies for user identities, device identities, service principals, OT and cloud workloads. - CIEM (Cloud Infrastructure Entitlement Management):
Define cloud identity entitlement patterns (Azure/AWS);
Establish least privilege, JIT/JEA patterns for cloud workloads.
- Provide hands on architectural oversight to ensure implementations follow approved designs.
- Oversee rollout and validation of: IGA connectors, workflows, lifecycle processes; AD/Entra updates and hardening;
Conditional…
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: