Job Description
Sr App Security Architect Qualification : BE, BTech graduate. MCA graduate. Responsibility : Requirements Gathering : Work with customer on refining business requirements. Ensure that the business requirements covers functional and non-functional requirements. Ensure that the business requirements covers user volumetric growth projection and business expansion roadmap. Support customers to define the requirements roadmap building business case. Design&Analysis : Responsible for Architecture and Infrastructure Design. Coordinate team members for POC execution to realize Architecture implementation. Responsible for security system design. Responsible for Capacity planning and Sizing. Participate in Architecture review with customer and product vendors. Design reusable components/frameworks. Perform usage analysis of existing reusable design components/frameworks. Internal Technical audit for IAM/Data Security projects. Coding : Code Review and Recommendations. Testing : Oversee Unit Integration and performance testing. Review test results. Documentation : Technical and SDLC documentation review is expected. Change Management : Adopt, enforce, and ensure adherence to the change management process within projects. Deployment : Setup&own software engineering processes such as build processes, source control systems, and development practices to ensure high-quality delivery. Design automated deployment scripts and Data Migration tools. Defect Management : Participate in Defect triage process and drive resolution process. Coaching&Facilitating : Mentor the team on translating requirements to design. Provide guidance and share best practices for design and implementation. Provide guidance on technology selection and solution fitment approach for security requirements. Participate in recruitment drives. Project Estimation : Define standard estimation templates. Define generic IAM Data security questionnaire for RFP/RFI/Assessment. Do Project estimation (resource timeline cost) for RFP/RFI and Customer projects. Resource/ Efforts Estimation and Monitoring : Review Effort estimation of large size projects. Process Improvements and Adherence : Architecture review, Performance improvement, and Optimization suggestions. Technical audit review and Suggest service improvement areas. Ensure that the developed system is consistent with the defined architecture : Review design and code to meet architecture requirements. Adopt/refine best practices based on project requirements. Knowledge Management : Contribution to IAM internal competency, Reusable assets consolidation, Provide technology POV, Share project implementation best practices, Conduct on-demand technical training, and explore new products/new services. Contribution to Data Security internal competency, Share project implementation best practices, Explore new products and technologies on Data protection. People management : Manage a sizeable project team with 15-30 members. Responsible for people recognitions, appraisals, and feedback. Business Development : Contribution to Business pre-sales (RFP, Customer visit). Attend customer visits. Thought Leadership / Process Improvements / Delivery Excellence : Contribute to the initiatives triggered by the ERSS DE team. Technology Advisory&Consulting (for clients) : Provide technical POV on IAM Data security requirements. Support and contribute to creating technology road maps. Recommend optimal technology solutions to the client using knowledge of technology and tools. Technology Review for Projects : Contribute to cross project technical audits and reviews. Recommend optimal technology solutions to the client using knowledge of technology and tools. Capability Development : Conduct POCs in lab environment. Work with Product vendors and acquire knowledge on new emerging areas. Attend Product vendor training. Must Have Skills : CyberArk Endpoint Privilege Manager CyberArk Privileged Cloud CyberArk Good To Have Skills : Thycotic/Delinia Secret Server Thycotic Privilege Manager Privileged Access Management One Identity PAM Delinia Secret Server for Cloud CA/Broadcom Priv Access Manager Beyond Trust PAM J-18808-Ljbffr