Menu

Design Engineer

Job details
Posting date: 22 September 2025
Hours: Full time
Closing date: 29 September 2025
Location: Sheffield, South Yorkshire, S1 4PA
Company: Experis
Job type: Contract
Job reference: BBBH423419_1758559425

Apply for this job

Summary

Role Title: Design Engineer
Duration: TBC
Location: Sheffield, Hybrid 3 days per week onsite
Rate: up to £552 p/d Umbrella inside IR35

Role purpose / summary

Design Engineer to manage end-to-end solution design and are responsible for delivering architecture design documents in line with functional and non-functional business requirements, strategies, principles, standards, and patterns. Alongside the creation of high-level designs, Design Engineer will be required to publish new architecture patterns, key decisions, design deviations, and technical risks and issues where appropriate.
Design Engineer should be comfortable presenting and sharing solutions at design authorities and senior leadership & stakeholders. Additionally, the Design Engineer will provide technical thought leadership and direction to their aligned projects and may stand in as subject matter experts and consultants related programmes.

Principal Preferred Requirements:

Cybersecurity Expertise:

  • Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud
  • Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at a comfortable level
  • Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies
  • Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity
  • Experience and understanding of both the roles and interlock between enterprise & solution architecture
  • Experience in both operational and transformation cybersecurity roles or a clear working understanding of both perspectives
  • Experience working in large-scale IT transformation programmes


Identity & Access Management:

  • Secrets Management: Experience of designing solutions using SM tools such as HashiCorp Vault
  • Experience of developing secrets management patterns and championing designs through architecture governance forums
  • Experience of designing or implementing Workload Identity Frameworks within large scale enterprises
  • Capable of defining secrets management strategy and influencing the future direction of secrets management within the bank
  • Federated Identity Management: Enabling identity sharing and single sign-on across different organisations or domains.
  • Privileged Access Management (PAM): Securing, controlling, and monitoring access to critical systems by privileged users.
  • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML.
  • Privileged Access Management (PAM): Securing, controlling, and monitoring access to critical systems by privileged users.
  • Authentication Protocols: Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML.


Qualifications & Certifications:

  • Masters or Doctorate degree in cybersecurity, computer science, software engineering, or related field
  • CISSP/CISM certification or other broad cybersecurity industry-recognised certificate
  • SABSA or TOGAF certified preferred


Platform & Technology:

  • BizzDesign, Archi, or generic UML visualisation experience for high-level designs
  • High proficiency and expertise in Jira for project & tasks management
  • Working proficiency in Confluence for documentation and JIRA for task management


Principal Accountabilities and Responsibilities:
Architecture & Design:

  • Produce, manage, and update end-to-end solution designs in line with reference architecture & business requirements
  • Articulate and publish key design decision records and options to ensure all solutions follow a logical, transparent decision-making process
  • Articulate, publish, and ensure approval of any design deviations resulting in technical debt
  • Ensure any technical risks or issues arising from a solution design are recorded and mitigated.
  • Produces, manages and translates the requirements into the architecture for that solution, ensuring technology and services meet the customer needs and expected business outcomes
  • Ensures the design of the solutions are efficient, timely and cost effective throughout the project lifecycle
  • Clear understanding of both the motivations of the business and technical security
  • Promote strong documentation and clerkship

Governance:

  • Ensures all high-level designs, architecture patterns, decision records, deviation requests, and technical risks or issue records undergo architectural and project governance processes
  • Ensure all architecture artefacts undergo appropriate peer review prior to design authority presentation
  • Present publications at technical design authorities for input, feedback, and approval


Risk and Dependency Management:

  • Effectively manages and escalates both technical and project risks or issues
  • Articulates solutions and remediation steps to technical risks & issues
  • Ability to map design decisions to resultant technical risks & issues to articulate the cause and rationale which leads to any negatively impacting change


Leadership & Teamwork:

  • Provides technical thought leadership in their domain of expertise
  • Willingness and ability to work across information technology as a cybersecurity SME
  • Ability to manage a project team of technical architects, engineers, and/or analysts
  • Ability to take a deputised role in programme management-related tasks where necessary


All profiles will be reviewed against the required skills and experience. Due to the high number of applications we will only be able to respond to successful applicants in the first instance. We thank you for your interest and the time taken to apply!

Apply for this job