KBC Technologies Group

API Security Architect

⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for an API Security Architect on a contract basis, requiring deep expertise in network security and segmentation, WAAP/API technologies, and architecture design. Pay rate is "unknown," and remote work is allowed. Certifications like CISSP or CISM are expected.
🌎 - Country
United Kingdom
💱 - Currency
£ GBP
-
💰 - Day rate
Unknown
-
🗓️ - Date
January 7, 2026
🕒 - Duration
Unknown
-
🏝️ - Location
Unknown
-
📄 - Contract
Unknown
-
🔒 - Security
Unknown
-
📍 - Location detailed
London
-
🧠 - Skills detailed
#Cloud #GCP (Google Cloud Platform) #Computer Science #Jira #Project Management #API (Application Programming Interface) #Public Cloud #Kubernetes #Documentation #AWS (Amazon Web Services) #"ETL (Extract #Transform #Load)" #Cybersecurity #Network Security #Leadership #Security #UML (Unified Modeling Language) #Azure #WAF (Web Application Firewall) #Firewalls
Role description
looking for a senior (GCB3-equivalent) Security Solution Designer / Enterprise Architect with deep network & segmentation expertise, specifically aligned to WAAP / API security in large, regulated environments. 1. Core Mandatory Technical Skills (Non-negotiable) Network Security & Segmentation (Primary Focus) • Deep, hands-on design experience with: • Network security architectures • Network segmentation (macro & micro) • Network Access Control • Proven experience across all environments: • Traditional data centres (physical & virtual firewalls) • Private cloud (SDN-based segmentation) • Public cloud (AWS/Azure/GCP native controls) • Container & Kubernetes environments • Strong understanding of: • MPLS / EVPN • Zero Trust principles • East-west traffic control WAAP / API / Proxy Technologies • Experience designing or securing: • Web Application Firewalls (WAF) • API gateways & API security controls • Reverse proxies / ingress controllers • Ability to place WAAP controls correctly within segmented network architectures • Understanding how proxies integrate with: • Cloud platforms • Container platforms • Application delivery pipelines2. Architecture & Design Authority Experience (Critical) • End-to-end security solution design ownership • Producing: • High-level and detailed architecture designs • Architecture Decision Records (ADRs) • Design deviations & technical debt justifications • Risk & issue documentation • Comfortable presenting to design authorities, senior stakeholders, and leadership • Experience aligning solutions to: • Enterprise reference architectures • Security principles, standards, and patterns3. Governance, Risk & Regulatory Alignment • Strong experience in: • Threat modelling • Security assessments feeding into design • Ability to map: • Policy control implementation evidence • Experience designing solutions aligned to regulatory frameworks (explicitly mentions DORA) • Comfortable evidencing control effectiveness for audits4. Enterprise & Transformation Experience • Experience working in large-scale IT transformation programmes • Able to work across: • Security • Infrastructure • Platforms • Application teams • Acts as a security SME and consultant, not just a designer5. Tooling & Documentation (Mandatory but Supporting) • Architecture modelling tools: • BizzDesign, Archi, UML (at least one) • Delivery tooling: • Jira (task & project management) • Confluence (formal documentation) • Excellent written documentation skills (this is strongly emphasised)6. Certifications & Background (Expected) • Degree in: • Cybersecurity, Computer Science, Software Engineering (or equivalent experience) • CISSP or CISM (or equivalent senior-level certs) • Networking/infrastructure certifications are a strong plus