Sr App Security Architect
Qualification:BE, BTech graduate
MCA graduate.
Responsibility:
Requirements Gathering:
Work with customer on refining business requirements.
Ensure that the business requirements covers functional and non functional requriements.
Ensure that the business requirements covers user volumetric growth projection and business expansion roadmap.
Support customers to define the requirements roadmap building business case.
Design & Analysis: Resposible for Architecture and Infrastructure Design.
Coordniate team members for POC execution to realize Architecture implementation.
Responsible for security system design.
Responsible for Capacity planning and Sizing.
Participate Architecture review with customer and product vendors.
Design reusable components/frameworks.
Perform usage analysis of existing reusable design components / frameworks.
Internal Technical audit for IAM/Data Security projects.
Coding: Code Review and Recommendations.
Testing: Oversee Unit Integration and performance testing.
Review test results.
Documentation: Technical and SDLC documentation review is expected.
Change Management: Adopt enforce ensure adherence of change management process within projects.
Deployment: Setup & own software engineering processes such as build processes source control systems development practices to ensure high quality delivery.
Design automated deployment scripts Data Migration tools.
Defect Management: Participate in Defect triage process and drive resolution process.
Coaching & Facilitating: Mentor the team on translating requirements to design.
Provide guidance and share best practices for design and implementation.
Provide guidance on technology selection and solution fitment approach for security requirements.
Participate in recruitment drives.
Project Estimation: Define standard estimation templates.
Define generic IAM Data security questionnaire for RFP/RFI/Assessment.
Do Project estimation (resource timeline cost) for RFP/RFI and Customer projects.
Resource/ Efforts Estimation and Monitoring: ‘Review Effort estimation of large projects.
Process Improvements and Adherence: Architecture review Performance improvement Optimization suggestions.
Technical audit review Suggest service improvement areas.
Ensure that the developed system is consistent with the defined architecture:review design and code to meet architecture requirements
Adopts /refines best practices based on project requirements.
Knowledge Management: Contribution to IAM internal competency Reusable assets consolidation Provide technology POV Share project implementation best practices Conduct on demand technical training and explore new products/new services.
Contribution to Data Security internal competency Share project implementation best practices Explore new products and technologies on Data protection.
People management: ‘Manage a able project team with 1530 memebers.
Responsible for people recognizitions appraisals and feedback.
Business Development: Contribution to Business pre sales (RFP RFP Customer visit).
Attend customer visit.
Thought Leadership / Process Improvements / Delivery Excellence: Contribute to the initiatives triggered by the ERSS DE team.
Technology Advisory & Consulting (for clients): Provide technical POV on IAM Data security requirements.
Support and contribute to creating technology road maps.
Recommend optimal technology solutions to the client using knowledge of technology and tools.
Technology Review for Projects: Contribute to cross project technical audits and review.
Recommend optimal technology solutions to the client using knowledge of technology and tools.
Capability Development: Conduct POCs in lab environment.
Work with Product vendors and acquire knowledge on new emerging areas.
Attend Product vendor training.
Source link