Jobs
My ads
My job alerts
Sign in
Find a job Career Tips Companies
Find

Architect gezocht!

Coventry
Adroit People Ltd
Architect
€350,000 a year
Posted: 3 February
Offer description

.
Learn more about the general tasks related to this opportunity below, as well as required skills.
What is application security design, and why is it important? Answer: Application security design focuses on building security into the architecture before code is written.
It helps prevent systemic vulnerabilities that cannot be fixed by tools later, such as broken trust boundaries, weak authentication flows, or insecure data handling.
Fixing design flaws early is significantly cheaper and reduces long-term risk compared to relying only on SAST/DAST after development.
2.
How do you approach a secure design review? Answer: I follow a structured approach: Understand business goals and data sensitivity Review architecture diagrams and data flows Identify trust boundaries and entry points Perform threat modeling (STRIDE/OWASP) Validate authentication, authorization, and data protection Recommend design controls and document risks The goal is risk reduction, not perfection.
3.
What is threat modeling, and how do you apply it? Answer: Threat modeling is a structured method to identify how an attacker could abuse a system.
I typically use STRIDE for technical threats and PASTA when business impact is important.
I focus on: Entry points (UI, APIs, integrations) Trust boundaries High-impact abuse cases 4.
How do you identify trust boundaries in an application? Answer: A trust boundary exists wherever data or control moves between components with different trust levelsfor example: Browser ? API API ? Database Microservice ? Microservice 5.How do you design secure authentication? Answer: OAuth 2.0 OIDC for modern apps SAML for enterprise SSO Key design principles: Centralized identity provider Short-lived tokens Secure token storage MFA for privileged access 6.OAuth2 vs OIDC vs SAML when do you use each? Answer: OIDC: Modern web/mobile apps (authentication identity) OAuth2: Authorization between services SAML: Enterprise legacy SSO 7.How do you prevent broken access control at design time? Answer: Server-side authorization checks Centralized authorization logic Default-deny policies Role/attribute validation per request 8.RBAC vs ABAC which do you prefer? Answer: RBAC is simple and works well for stable roles. xkybehq
ABAC scales better for dynamic, data-driven decisions.
9.What are the top API security risks you design for? Answer: Broken Object Level Authorization (BOLA) Broken Function Level Authorization (BFLA) Excessive data exposure Lack of rate limiting Injection via APIs

Apply
Create E-mail Alert
Job alert activated
Saved
Save
Similar job
Iam architect
Coventry
Adroit People Ltd
Architect
£350 a day
Similar job
Dynamics 365 architect
Birmingham (West Midlands)
Bright Purple Resourcing
Architect
£90,000 a year
Similar job
Security (siem) architect - sc cleared
Warwick
Sanderson Government and Defence
Architect
€700 - €750 a day
See more jobs
Similar jobs
Architecture jobs in Coventry
jobs Coventry
jobs West Midlands
jobs England
Home > Jobs > Architecture jobs > Architect jobs > Architect jobs in Coventry > Architect gezocht!

About Jobijoba

  • Career Advice
  • Company Reviews

Search for jobs

  • Jobs by Job Title
  • Jobs by Industry
  • Jobs by Company
  • Jobs by Location
  • Jobs by Keywords

Contact / Partnership

  • Contact
  • Publish your job offers on Jobijoba

Legal notice - Terms of Service - Privacy Policy - Manage my cookies - Accessibility: Not compliant

© 2026 Jobijoba - All Rights Reserved

Apply
Create E-mail Alert
Job alert activated
Saved
Save