Technical Security Architect – Application Security (RBAC / ABAC)
Duration: 6 months
Location: Bristol
We are seeking a Technical Security Architect with strong expertise in Application Security, RBAC, ABAC and Policy Management to assess and modernise a predominantly legacy application estate, including platforms built on SQL Server.
This role will focus on evaluating the current security posture, reviewing how access and security policies are defined and enforced, and creating a clear roadmap to future-proof applications in line with client, regulatory and business requirements.
Key Responsibilities
* Assess the existing application, data and access control landscape, including legacy SQL Server-based platforms
* Review and rationalise security and access policies, ensuring they are consistent, enforceable and scalable
* Evaluate and design RBAC and ABAC models, aligned to business and client needs
* Define how policies are authored, managed, versioned and enforced across applications
* Identify security gaps, technical debt and policy inconsistencies within legacy systems
* Design target-state application security architectures that balance modern security principles with platform constraints
* Produce a pragmatic roadmap for modernising access control and policy management
* Provide architectural guidance to engineering teams to embed policy-driven security controls
* Act as a trusted security advisor to technical and non-technical stakeholders
Required Experience
* Proven experience as a Technical Security Architect or Application Security Architect
* Deep understanding of RBAC, ABAC and policy-based access control
* Experience defining and governing security and access policies across complex platforms
* Ability to translate business, regulatory and client requirements into practical security designs
* Strong stakeholder engagement and communication skills
* Experience integrating legacy applications with modern IAM and policy engines
* Exposure to cloud or hybrid environments (Azure, AWS or GCP)
* Knowledge of Zero Trust and identity-centric security models
#J-18808-Ljbffr