Job Description
Job Title:  APPLICATION ARCHITECT L2(CONTRACT)
City:  London, Heathrow
State/Province:  Greater London
Posting Start Date:  1/6/26
Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com.
Job Description: 

͏

London/Sheffield

WAAP / API Security Solution Designer / Enterprise Architect aligned to etc above
Security Solution Designers manage end-to-end solution design and are responsible for delivering architecture design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. Alongside the creation of high-level designs, Security Solution Architects will be required to publish new architecture patterns, key decisions, design deviations, and technical risks and issues where appropriate.
Security Solution Designers should be comfortable presenting and sharing solutions at design authorities and senior leadership & stakeholders. Additionally, the Security Solution Architect will provide technical thought leadership and direction to their aligned projects and may stand in as subject matter experts and consultants related programmes.
Principal Preferred Requirements
Cybersecurity Expertise:
•    Significant experience and proven technical depth within the following domains network security, network segmentation, network access control.
•    Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level.
•    Experience working in large-scale IT transformation programmes.
•    Excellent documentation skills justifying and explaining security design decisions against threats/mitigation/risk appetite and cost within the solution design document.
•    Significant experience and proven technical depth within network security, including:
o    Traditional Data Centre technologies, network segmentation with physical and virtual firewalls and other technologies used in network segmentation, like MPLS/eVPN.
o    Software Defined Networking and segmentation within private cloud environments
o    Segmentation within Public cloud environments
o    Segmentation within containerized environments
o    Macro- and micro-segmentation
•    Experience in the followings:
o    Security assessment and threat modelling as an input to security design.
o    Understanding and interpreting regulatory requirements 
Qualifications & Certifications:
•    Bachelors or masters degree in cybersecurity, computer science, software engineering, or related field
•    CISSP/CISM certification or other broad cybersecurity industry-recognised certificate
•    Networking and Infrastructure related industry-recognised certificate(s)hnology as a cybersecurity SME

͏

Platform & Technology:
•    BizzDesign, Archi, or generic UML visualisation experience for high-level designs
•    Working proficiency in Jira for project & tasks management
•    Working proficiency in Confluence for documentation
Principal Accountabilities and Responsibilities
Architecture & Design:
•    Collaborate extensively and align directly with Security Architecture colleagues and produce high quality detailed artefacts
•    Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements
•    Articulate and publish key design decision records and options to ensure all solutions follow a logical, transparent decision-making process
•    Articulate, publish, and ensure approval of any design deviations resulting in technical debt
•    Ensure any technical risks or issues arising from a solution design are recorded and mitigated.
•    Produces, manages and translates the requirements into the architecture for that solution, ensuring technology and services meet the customer needs and expected business outcomes
•    Ensures the design of the solutions are efficient, timely and cost effective throughout the project lifecycle
•    Clear understanding of both the motivations of the business and technical security
•    Promote strong documentation and clerkship
•    Conduct multi-layered assessments to identify segmentation opportunities and control gaps at network, platform, and application level.
•    Document solution designs in line with regulatory expectations (e.g. DORA), ensuring traceability from policy to control execution, and evidencing control effectiveness.
•    Support implementation of the Network Segmentation Target Operating Model, including the definition and improvement of supporting processes related to the Architecture Control.
•    Engaging with platform and application owners to:
o    Update or create architectural design documents
o    Align patterns and standards with actual implementations
o    Embed controls into product roadmaps
o    Support teams beyond security, acting as a reference point across engineering, architecture, and service operations to ensure cohesive design and implementation.
•    Contributing to security governance and assurance by embedding traceable, repeatable, and documented design decisions and other architectural artefacts into the solution delivery lifecycles.
Governance:
•    Ensures all high-level designs, architecture patterns, decision records, deviation requests, and technical risks or issue records undergo architectural and project governance processes
•    Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation
•    Present publications at technical design authorities for input, feedback, and approval
Risk and Dependency Management:
•    Effectively manages and escalates both technical and project risks or issues
•    Articulates solutions and remediation steps to technical risks & issues
•    Ability to map design decisions to resultant technical risks & issues to articulate the cause and rationale which leads to any negatively impacting change
Leadership & Teamwork
•    Provides technical thought leadership in their domain of expertise
•    Willingness and ability to work across information technology as a cybersecurity SME

Mandatory Skills: Proxy .

 

Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention.
Information at a Glance

Get Job Alerts

Receive notifications when we have open roles and get other relevant career news


Register >
 

Join Us

Explore open roles that match your interests and skills


Search Jobs >
 

If you encounter any suspicious mail, advertisements, or persons who offer jobs at Wipro, please email us at helpdesk.recruitment@wipro.com. Do not email your resume to this ID as it is not monitored for resumes and career applications.

Any complaints or concerns regarding unethical/unfair hiring practices should be directed to our Ombuds Group at ombuds.person@wipro.com.

We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, caste, creed, religion, gender, marital status, age, ethnic and national origin, gender identity, gender expression, sexual orientation, political orientation, disability status, protected veteran status, or any other characteristic protected by law.

Wipro is committed to creating an accessible, supportive, and inclusive workplace. Reasonable accommodation will be provided to all applicants including persons with disabilities, throughout the recruitment and selection process. Accommodations must be communicated in advance of the application, where possible, and will be reviewed on an individual basis. Wipro provides equal opportunities to all and values diversity.