Overseas Contractor
Apply NowCompany: Futran Tech Solutions Pvt. Ltd.
Location: Charlotte, NC 28269
Description:
Job Title Enterprise Application Architect
Job Description
Highly skilled Application Architect with extensive experience in understanding and designing the application architecture understand the Wealth landscape with IAM touchpoints and integration with other applications particularly of Commercial OffTheShelf COTS software thirdparty hosted applications The candidate should be capable of creating detailed architecture documents that cover various aspects of the system
Responsibilities
1Conceptual Data View
oDevelop and document the conceptual data model that outlines the highlevel data entities and relationships
2Logical Architecture
oDesign and document the logical architecture including the systems components their interactions and data flow
3Reference Functional Requirements
oIdentify and document reference functional requirements wherever available
4Technological Physical Architecture
oDeployment Architecture DR and Backup
Design and document the deployment architecture including disaster recovery DR and backup strategies
oTechnological Architecture
Define and document the technological architecture including the technology stack and infrastructure components
oPhysical Architecture and Component Decomposition
Develop and document the physical architecture including the decomposition of components and their physical deployment
5Identity Access Management IAM
oAuthentication and Authorization
Design and document the authentication and authorization mechanisms
oUser Authorization Model Role Privileged Role based mapping
Define and document the user authorization model including rolebased and privileged rolebased mappings
oIAM Lifecycle Onboarding Offboarding use cases
Document the IAM lifecycle including onboarding and offboarding use cases
oPrivileged Accounts and Usage Scenarios
Identify and document privileged accounts and their usage scenarios
6Encryption
oEncryption protocols and key management specified
Define and document the encryption protocols and key management strategies
7Vulnerability Scanning
oScan schedule defined results and applicable remediation efforts documented
Develop and document the vulnerability scanning schedule results and applicable remediation efforts
8Cyber Threat Monitoring
oSIEM Monitoring
Design and document the Security Information and Event Management SIEM monitoring processes
Qualifications
Proven experience in application architecture with min 15 years of experience
Strong understanding of banking applications and their integration
Excellent documentation skills with the ability to create comprehensive architecture documents
Experience with IAM encryption vulnerability scanning and cyber threat monitoring
Strong analytical and problemsolving skills
Excellent communication and collaboration skills
Job Description
Highly skilled Application Architect with extensive experience in understanding and designing the application architecture understand the Wealth landscape with IAM touchpoints and integration with other applications particularly of Commercial OffTheShelf COTS software thirdparty hosted applications The candidate should be capable of creating detailed architecture documents that cover various aspects of the system
Responsibilities
1Conceptual Data View
oDevelop and document the conceptual data model that outlines the highlevel data entities and relationships
2Logical Architecture
oDesign and document the logical architecture including the systems components their interactions and data flow
3Reference Functional Requirements
oIdentify and document reference functional requirements wherever available
4Technological Physical Architecture
oDeployment Architecture DR and Backup
Design and document the deployment architecture including disaster recovery DR and backup strategies
oTechnological Architecture
Define and document the technological architecture including the technology stack and infrastructure components
oPhysical Architecture and Component Decomposition
Develop and document the physical architecture including the decomposition of components and their physical deployment
5Identity Access Management IAM
oAuthentication and Authorization
Design and document the authentication and authorization mechanisms
oUser Authorization Model Role Privileged Role based mapping
Define and document the user authorization model including rolebased and privileged rolebased mappings
oIAM Lifecycle Onboarding Offboarding use cases
Document the IAM lifecycle including onboarding and offboarding use cases
oPrivileged Accounts and Usage Scenarios
Identify and document privileged accounts and their usage scenarios
6Encryption
oEncryption protocols and key management specified
Define and document the encryption protocols and key management strategies
7Vulnerability Scanning
oScan schedule defined results and applicable remediation efforts documented
Develop and document the vulnerability scanning schedule results and applicable remediation efforts
8Cyber Threat Monitoring
oSIEM Monitoring
Design and document the Security Information and Event Management SIEM monitoring processes
Qualifications
Proven experience in application architecture with min 15 years of experience
Strong understanding of banking applications and their integration
Excellent documentation skills with the ability to create comprehensive architecture documents
Experience with IAM encryption vulnerability scanning and cyber threat monitoring
Strong analytical and problemsolving skills
Excellent communication and collaboration skills