Translates customer needs into technical systems solutions and leads projects at the architecture level.
Determines and develops architectural approaches for solutions and conducts business reviews
Key Accountabilities: 8-10 years experience with strong technical experience in system / applications solution architecture design and Experience in designing solutions using appropriate platforms and system technologies.
Degree in Computer Science and EngineeringPreferred Experience and Qualification:
Analyze the clients needs, translates these needs into system and architecture requirements to ensure the client s needs and requirements can be met by the architecture design
Evaluate clients system specifications, work practices and the nature of business
Develop a solution concept design in alignment with the enterprise architecture and the business requirements
Analyze impact of solutions on client s overall business processes and systems to mitigate business risks
18 + years of IT experience and 10 Years of Cybersecurity Project Experience
1. Proven experience of at least 8 Years in Cybersecurity architecture, focusing on Threat Hunting, Threat Adversaries , Offensive Security activities, and the Mitre ATT&CK framework .
2. Must have expertise in delivering the enterprise-level defensible security architecture and industry-specific cyber architecture framework for at least 3 or 4 customer projects and in-depth knowledge of cybersecurity principles, practices, technologies, and methodologies.
3. Must work currently with hands-on experience with Cybersecurity tools and technologies, such as SIEM platforms, threat intelligence platforms, endpoint detection and response (EDR) solutions, etc., in the past five years.
4. Strong understanding of offensive security techniques, including penetration testing, Red Teaming, and Ethical Hacking.
5. Must have expertise with the security compliance team and develop adequate and auditable security controls that adhere to security frameworks and agile practices for a leading global organization.
Must have one or multiple of the following advanced security