Sr App Security Architect
Qualification:
BE, BTech graduate- MCA graduate.
Responsibility:
Requirements Gathering:
- Work with customer on refining business requirements.
- Ensure that the business requirements covers functional and non functional requriements.
- Ensure that the business requirements covers user volumetric growth projection and business expansion roadmap.
- Support customers to define the requirements roadmap building business case.
Design & Analysis:
- Resposible for Architecture and Infrastructure Design.
- Coordniate team members for POC execution to realize Architecture implementation.
- Responsible for security system design.
- Responsible for Capacity planning and Sizing.
- Participate Architecture review with customer and product vendors.
- Design reusable components/frameworks.
- Perform usage analysis of existing reusable design components / frameworks.
- Internal Technical audit for IAM/Data Security projects.
Coding:
- Code Review and Recommendations.
Testing:
- Oversee Unit Integration and performance testing.
- Review test results.
Documentation:
- Technical and SDLC documentation review is expected.
Change Management:
- Adopt enforce ensure adherence of change management process within projects.
Deployment:
- Setup & own software engineering processes such as build processes source control systems development practices to ensure high quality delivery.
- Design automated deployment scripts Data Migration tools.
Defect Management:
- Participate in Defect triage process and drive resolution process.
Coaching & Facilitating:
- Mentor the team on translating requirements to design.
- Provide guidance and share best practices for design and implementation.
- Provide guidance on technology selection and solution fitment approach for security requirements.
- Participate in recruitment drives.
Project Estimation:
- Define standard estimation templates.
- Define generic IAM Data security questionnaire for RFP/RFI/Assessment.
- Do Project estimation (resource timeline cost) for RFP/RFI and Customer projects.
Resource/ Efforts Estimation and Monitoring:
- 'Review Effort estimation of large size projects.
Process Improvements and Adherence:
- Architecture review Performance improvement Optimization suggestions.
- Technical audit review Suggest service improvement areas.
Ensure that the developed system is consistent with the defined architecture:
review design and code to meet architecture requirements- Adopts /refines best practices based on project requirements.
Knowledge Management:
- Contribution to IAM internal competency Reusable assets consolidation Provide technology POV Share project implementation best practices Conduct on demand technical training and explore new products/new services.
- Contribution to Data Security internal competency Share project implementation best practices Explore new products and technologies on Data protection.
People management:
- 'Manage a sizeable project team with 15~30 memebers.
- Responsible for people recognizitions appraisals and feedback.
Business Development:
- Contribution to Business pre sales (RFP RFP Customer visit).
- Attend customer visit.
Thought Leadership / Process Improvements / Delivery Excellence:
- Contribute to the initiatives triggered by the ERSS DE team.
Technology Advisory & Consulting (for clients):
- Provide technical POV on IAM Data security requirements.
- Support and contribute to creating technology road maps.
- Recommend optimal technology solutions to the client using knowledge of technology and tools.
Technology Review for Projects:
- Contribute to cross project technical audits and review.
- Recommend optimal technology solutions to the client using knowledge of technology and tools.
Capability Development:
- Conduct POCs in lab environment.
- Work with Product vendors and acquire knowledge on new emerging areas.
- Attend Product vendor training.
Must Have Skills
- Privileged Access Management
- One Identity PAM
Good To Have Skills
- Thycotic/Delinia Secret Server
- Thycotic Privilege Manager
- DeliniaSecretServer for Cloud
- CyberArkEndpointPrivilegeMgr
- CyberArk Privileged Cloud
- CyberArk
- CA/Broadcom Priv Access Mgr
- Beyond Trust PAM