Solution Architect CyberSecurity
Job DescriptionJob Description
Areas of Aptitude:
- Strong communication and interpersonal skills.
- Strategic thinking, problem-solving, and decision-making.
- Proactive engagement with all tasks, and excellent time management.
- Ability to collaborate with and guide technical teams through complex projects.
- Ability to embed in Scrum teams including daily standups, ceremonies, and provide architectural direction.
Top Skills:
- Architect solutions and create detailed Solution Architecture Documents (covering the Experience areas listed below).
- Create comparison matrices, enterprise patterns, strategy documents, cloud blueprints, technical specifications, and other architecture artifacts.
- Application, Cloud, Data and Cyber architecture.
- Evaluate and recommend the use of specific tools, platforms, and frameworks that meet the project's needs.
- Partner with portfolio teams and other IT groups, create and present architectural guidance, incorporate feedback.
- Create designs that meet performance, security, scalability, and other non-functional requirements.
- Architect and design for best practices such as least privilege and data protection.
- Promote modular design to enable independent development and testing of components and modules.
- Be able to manually audit code via spot reviews, lead code quality reviews including creating reports, and create metrics to support automated code review.
- Control costs by creating high-level quick estimates of various architecture and design options.
- Review high availability and disaster recovery architecture and remediate, as necessary.
- Design and implement scalable, secure, and high-performing systems.
Qualifications:
- Bachelor's or Master's degree in Computer Science, Information Technology, or a related field.
- 10+ years of IT experience, with at least 3 years as a developer and 3 years as a solution architect.
- AWS Certified Solution Architect certification strongly .
- TOGAF certification is a plus.
Experience:
- Application
- Programming such as Java, Python, .NET, or similar. Java .
- JavaScript frameworks such as Angular, React for building user interfaces.
- RESTful APIs, GraphQL, and SOAP for interaction between applications and services.
- Event streaming and messaging brokers like Apache Kafka, AWS Kinesis, AWS SNS and SQS, or ActiveMQ.
- Batch Processing (e.g. ETL and Spring Batch)
- Microservices architecture
- Serverless including AWS Lambda
- Containerization including Docker and Kubernetes
- Design patterns like MVC (Model-View-Controller), Strangler and SOA (Service-Oriented Architecture)
- API gateway and management tools like Apigee and Amazon API Gateway
- Domain Driven Design
- Integration platforms like Spring Integration for connecting diverse systems.
- Mobile app development frameworks (e.g., Ionic, Capacitor, React , Flutter, or Swift)
- Workflow and process engines such as AWS Step Functions, Camunda, Flowable, and Pega.
- Document management systems like Hyland Alfresco.
- Content management platforms like Adobe AEM and general eCommerce experience.
- Testing tools like Selenium, JUnit, or TestNG for creating automated unit, integration, and performance tests.
- Cloud and DevOps
- Architecture and detailed design of solutions using cloud platforms like AWS, Microsoft Azure, or Google Cloud.
- DevOps including CI/CD pipelines (e.g., GitHub Actions)
- Infrastructure as Code (e.g. Terraform and OpenTofu)
- Data
- SQL databases such as Oracle, PostgreSQL, or Microsoft SQL Server for structured data storage.
- NoSQL databases like DynamoDB for handling unstructured or semi-structured data.
- Normalizing data models and understand the trade-offs of denormalization in large-scale systems.
- Enterprise data architecture including operational data stores, data replication, data lakes and data warehousing.
- Cyber and Privacy
- Security frameworks like ISO 27001, NIST, or GDPR compliance.
- Compliance standards like CCPA, GDPR particularly when dealing with sensitive business data.
- Secure coding practices and principles such as OWASP, encryption techniques, and management.
- Authentication protocols (OAuth, JWT) and management solutions (e.g. Azure AD, ForgeRock, SailPoint).