

KBC Technologies Group
API Security Architect
⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for an API Security Architect on a contract basis, requiring deep expertise in network security and segmentation, WAAP/API technologies, and architecture design. Pay rate is "unknown," and remote work is allowed. Certifications like CISSP or CISM are expected.
🌎 - Country
United Kingdom
💱 - Currency
£ GBP
-
💰 - Day rate
Unknown
-
🗓️ - Date
January 7, 2026
🕒 - Duration
Unknown
-
🏝️ - Location
Unknown
-
📄 - Contract
Unknown
-
🔒 - Security
Unknown
-
📍 - Location detailed
London
-
🧠 - Skills detailed
#Cloud #GCP (Google Cloud Platform) #Computer Science #Jira #Project Management #API (Application Programming Interface) #Public Cloud #Kubernetes #Documentation #AWS (Amazon Web Services) #"ETL (Extract #Transform #Load)" #Cybersecurity #Network Security #Leadership #Security #UML (Unified Modeling Language) #Azure #WAF (Web Application Firewall) #Firewalls
Role description
looking for a senior (GCB3-equivalent) Security Solution Designer / Enterprise Architect with deep network & segmentation expertise, specifically aligned to WAAP / API security in large, regulated environments.
1. Core Mandatory Technical Skills (Non-negotiable)
Network Security & Segmentation (Primary Focus)
• Deep, hands-on design experience with:
• Network security architectures
• Network segmentation (macro & micro)
• Network Access Control
• Proven experience across all environments:
• Traditional data centres (physical & virtual firewalls)
• Private cloud (SDN-based segmentation)
• Public cloud (AWS/Azure/GCP native controls)
• Container & Kubernetes environments
• Strong understanding of:
• MPLS / EVPN
• Zero Trust principles
• East-west traffic control
WAAP / API / Proxy Technologies
• Experience designing or securing:
• Web Application Firewalls (WAF)
• API gateways & API security controls
• Reverse proxies / ingress controllers
• Ability to place WAAP controls correctly within segmented network architectures
• Understanding how proxies integrate with:
• Cloud platforms
• Container platforms
• Application delivery pipelines2. Architecture & Design Authority Experience (Critical)
• End-to-end security solution design ownership
• Producing:
• High-level and detailed architecture designs
• Architecture Decision Records (ADRs)
• Design deviations & technical debt justifications
• Risk & issue documentation
• Comfortable presenting to design authorities, senior stakeholders, and leadership
• Experience aligning solutions to:
• Enterprise reference architectures
• Security principles, standards, and patterns3. Governance, Risk & Regulatory Alignment
• Strong experience in:
• Threat modelling
• Security assessments feeding into design
• Ability to map:
• Policy control implementation evidence
• Experience designing solutions aligned to regulatory frameworks (explicitly mentions DORA)
• Comfortable evidencing control effectiveness for audits4. Enterprise & Transformation Experience
• Experience working in large-scale IT transformation programmes
• Able to work across:
• Security
• Infrastructure
• Platforms
• Application teams
• Acts as a security SME and consultant, not just a designer5. Tooling & Documentation (Mandatory but Supporting)
• Architecture modelling tools:
• BizzDesign, Archi, UML (at least one)
• Delivery tooling:
• Jira (task & project management)
• Confluence (formal documentation)
• Excellent written documentation skills (this is strongly emphasised)6. Certifications & Background (Expected)
• Degree in:
• Cybersecurity, Computer Science, Software Engineering (or equivalent experience)
• CISSP or CISM (or equivalent senior-level certs)
• Networking/infrastructure certifications are a strong plus
looking for a senior (GCB3-equivalent) Security Solution Designer / Enterprise Architect with deep network & segmentation expertise, specifically aligned to WAAP / API security in large, regulated environments.
1. Core Mandatory Technical Skills (Non-negotiable)
Network Security & Segmentation (Primary Focus)
• Deep, hands-on design experience with:
• Network security architectures
• Network segmentation (macro & micro)
• Network Access Control
• Proven experience across all environments:
• Traditional data centres (physical & virtual firewalls)
• Private cloud (SDN-based segmentation)
• Public cloud (AWS/Azure/GCP native controls)
• Container & Kubernetes environments
• Strong understanding of:
• MPLS / EVPN
• Zero Trust principles
• East-west traffic control
WAAP / API / Proxy Technologies
• Experience designing or securing:
• Web Application Firewalls (WAF)
• API gateways & API security controls
• Reverse proxies / ingress controllers
• Ability to place WAAP controls correctly within segmented network architectures
• Understanding how proxies integrate with:
• Cloud platforms
• Container platforms
• Application delivery pipelines2. Architecture & Design Authority Experience (Critical)
• End-to-end security solution design ownership
• Producing:
• High-level and detailed architecture designs
• Architecture Decision Records (ADRs)
• Design deviations & technical debt justifications
• Risk & issue documentation
• Comfortable presenting to design authorities, senior stakeholders, and leadership
• Experience aligning solutions to:
• Enterprise reference architectures
• Security principles, standards, and patterns3. Governance, Risk & Regulatory Alignment
• Strong experience in:
• Threat modelling
• Security assessments feeding into design
• Ability to map:
• Policy control implementation evidence
• Experience designing solutions aligned to regulatory frameworks (explicitly mentions DORA)
• Comfortable evidencing control effectiveness for audits4. Enterprise & Transformation Experience
• Experience working in large-scale IT transformation programmes
• Able to work across:
• Security
• Infrastructure
• Platforms
• Application teams
• Acts as a security SME and consultant, not just a designer5. Tooling & Documentation (Mandatory but Supporting)
• Architecture modelling tools:
• BizzDesign, Archi, UML (at least one)
• Delivery tooling:
• Jira (task & project management)
• Confluence (formal documentation)
• Excellent written documentation skills (this is strongly emphasised)6. Certifications & Background (Expected)
• Degree in:
• Cybersecurity, Computer Science, Software Engineering (or equivalent experience)
• CISSP or CISM (or equivalent senior-level certs)
• Networking/infrastructure certifications are a strong plus






