Equity Bank Limited – Security Solutions Architect.

Get a free C.V. review by sending your C.V. to or click the following link. Submit C.V.! use the subject heading REVIEW.

IMPORTANT: Read the application instructions keenly, Never pay for a job interview or application.

Click the Links Below to Get Job Updates.

Security Solutions Architect   ()

Job Purpose: 

The Senior Security Solutions Architect’s primary responsibility will be to interpret business requirements into a technical security solutions framework and to provide technology roadmaps governed by strategic direction, business requirements as well as resourcing and financial constraints. They will specify and design more complex solutions based on their technical expertise across multiple domains.

The Senior Security Solutions Architect’s security solution are optimally implemented to meet desire objectives as well as supervise the team function to archive team deliverables

Job Responsibilities/ Accountabilities:


  • Design security solution for delivery
  • Design the security controls plan for cloud and hybrid security
  • Design and optimized use cases for cloud security broker
  • Design cloud data access control, SaaS control and implement
  • Design the process for tracking operating systems like Windows, Linux, and UNIX on cloud hybrid environment
  • Implement External Attack Surface Management Solution
  • Design and implement cloud workload security management
  • Design Critical Public Infrastructures (PKIs), such as Digital Signatures and Certification Authorities (CA) Operation
  • Optimized the security of the container and serverless environment e.g. Kubernetes security
  • Create and operationalized notification for Kubernetes Secret and Key vaulting
  • Design security framework for organization Internet of Things (IOT), 5G control
  • Design security framework and reference architecture for organization blockchain
  • Researching and implementing new security controls
  • Ensure DevOps security is standardized and monitored
  • Ensure DevOps roles and privileges are maintained
  • Proficiency in reading, writing, and auditing programming languages such as Java, Python, C, C#, Scala and the ability to pick up new languages/technologies
  • Provide security reviews for the acquisition, installation, fielding, training, and operation of various products to include hardware, software, and licenses


  • Understand information security trends
  • Document and communicate security solution roadmap to Head of department and the business
 Knowledge and Experience
  • A Degree or its equivalent in Information Technology, Network Security, Enterprise Network Management, Information Security, Management Information System Computing, Engineering or similar area of study
  • Relevant industry certifications in information security program and governance as well as PMP will be an added advantage
  • Minimum of two (2) years of computer information technology experience.
  • Minimum of Four (2) years of experience engineering and designing IT security solutions
  • Minimum of 1 year working as a business analyst in technical security and IT
  • Good understanding all the information security domains
  • Experience of identifying and managing technology security risk
  • Certification like CISSP, CISA, CCISO, SABSA will be of advantage

Key Critical Competencies

  • Ability to know when to implement solutions with consideration to the wider impacts i.e. risk, cost, customer impact, timescales, etc.
  • Excellent negotiation, and written and verbal presentation skills
  • Ability to handle high pressure situations with key stakeholders
  • Good Analytical skills, Problem solving and Interpersonal skills
  • Deep knowledge of enterprise application development security controls
  • Good knowledge of Telco convergence business, FinTech network traffic consumption and OpenAPI


Closing Date

Jun 13, 2022




Success! You're on the list.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Create a website or blog at

%d bloggers like this: