Job Description
Job Title:  SECURITY ARCHITECT L1(CONTRACT)
City:  Warwick
State/Province:  Warwickshire
Posting Start Date:  1/8/26
Wipro Limited (NYSE: WIT, BSE: 507685, NSE: WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com.
Job Description: 

Job Description

Warwick

SC cleared/SC eligible candidates only

Key Responsibilities
•    Architecture & Design
o    Support high-level and detailed architecture for CyberArk PAM Self Hosted (Vault, PVWA, CPM, PSM, PSMP, PTA, DR) and CyberArk Conjur/Secrets Manager, ensuring resilience, scalability, and compliance with CNI standards. 
o    Develop reference architectures, design patterns, and standards for seamless integration into infrastructure, applications, DevOps pipelines, containers, and multi cloud environments. 
•    Integration & Cross Team Collaboration
o    Integrate CyberArk with corporate systems: AD/LDAP, SAML/OIDC, MFA providers, SIEM platforms (e.g., Splunk), and ITSM tools. 
o    Collaborate with security, infrastructure, IAM, DevOps, and application teams to ensure alignment with CNI policies and controls.
•    CNI-Specific Security & Compliance
o    Apply CNI security frameworks (e.g., NCSC, NIST, ISO27001, FCA/Financial) in threat modeling, control selection, and architecture decisions. 
o    Perform assessments, audits, and vulnerability analyses to maintain compliance with critical infrastructure regulations.
•    Migration & Transition
o    Lead migration from self hosted or legacy PAM systems to CyberArk Privilege Cloud or modern on prem/cloud infrastructure. Develop migration roadmaps, runbooks, cutover strategies, and success metrics. 
o    Execute migration tasks: safe/platform migration, account and platform mapping, connector replacement, policy transformation, key rotation, and integration cut over. 
•    Implementation & Handover
o    Manage installation, configuration, testing, and deployment of solution components; then transition them to operational “monitor and maintain” teams. 
o    Document HLDs/LLDs, runbooks, operational procedures, and deliver training to internal teams.
•    Operational Support & Upgrades
o    Provide expert-level L2/L3 support, incident response, troubleshooting (e.g., rotation issues, connector failures), troubleshooting root causes, and recommending issue resolution. 
o    Oversee platform health, patching, upgrades, and system hardening for CNI-level resilience.

͏

Do

1. Design and develop enterprise cyber security strategy and architecture

a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses

b. Identify risks associated with business processes, operations,

information security programs and technology projects

c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge

d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements

e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations

f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc.

g. Provide support during technical deployment, configuration, integration and administration of security technologies

h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc.

i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity

j. Provide solution of RFP’s received from clients and ensure overall design assurance

͏

i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives

ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture

iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs

iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology

v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions

vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps

vii. Evaluate and recommend solutions to integrate with overall technology ecosystem

viii. Tracks industry and application trends and relates these to planning current and future IT needs

͏

2. Stakeholder coordination & audit assistance

a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations

b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security

c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements

d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers

e. Provide training to employees on issues such as spam and unwanted or malicious emails

͏

Deliver 

No Performance Parameter Measure
1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers.
2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led

 

Mandatory Skills: Privilege Password Management CyberArk .

 

Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention.
Information at a Glance

Get Job Alerts

Receive notifications when we have open roles and get other relevant career news


Register >
 

Join Us

Explore open roles that match your interests and skills


Search Jobs >
 

If you encounter any suspicious mail, advertisements, or persons who offer jobs at Wipro, please email us at helpdesk.recruitment@wipro.com. Do not email your resume to this ID as it is not monitored for resumes and career applications.

Any complaints or concerns regarding unethical/unfair hiring practices should be directed to our Ombuds Group at ombuds.person@wipro.com.

We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, caste, creed, religion, gender, marital status, age, ethnic and national origin, gender identity, gender expression, sexual orientation, political orientation, disability status, protected veteran status, or any other characteristic protected by law.

Wipro is committed to creating an accessible, supportive, and inclusive workplace. Reasonable accommodation will be provided to all applicants including persons with disabilities, throughout the recruitment and selection process. Accommodations must be communicated in advance of the application, where possible, and will be reviewed on an individual basis. Wipro provides equal opportunities to all and values diversity.