Security Architect
Infosys Limited
3d ago


  • Proven success in performing risk assessments / audits, managing readiness engagements, establishing global SOX compliance programs, managing audits and compliance against regulatory / standards / leading practices (i.
  • e. SOX, GLBA, Clause 49, FFIEC, etc.) and establishing control environments,

  • Work closely with CSO & Security director to define Security Strategy and build and nurture positive working relationships with clients,
  • Consulted and provided solutions in the areas of enterprise business / technology strategy, Identity & Access Management, Data Security, business process optimization / re-
  • engineering, enterprise infrastructure security design & optimization,

  • Designed and implemented solutions for enterprise security infrastructure, security, identity management / entitlement, disaster recovery, business continuity strategy and planning, fault tolerant infrastructure, contingency planning, crisis management, application / infrastructure integrity.,
  • The Architect / Consultant is a senior technologist that plays an important client facing consulting. The ideal candidate for the role will be required to deliver great solution.,
  • Is capable of making and keeping commitments to a variety of requests from.,
  • Listen to customer business problems and requirements and articulate how solutions can be structured to address them and follow this through the sales pursuit process;,
  • Work closely with business strategists and other enterprise architects to deliver direction setting engagements helping our client's define strategies, road maps and implementation plans in security space.,
  • Create multiple views of a solution architecture designs (e.g. Conceptual, Logical, Process, Physical, Security, etc.) based on the framework being leveraged for the solution;,
  • Deliver detailed design and implementation phases;,
  • Contribute to working groups creating Thought Leadership including Best Practices, Analysis & Design Patterns, Reference Architectures and White Papers.,
  • Participate in business development efforts, "add-on" sales to client ,
  • Work with targeted key accounts and assist account teams in positioning service offering
  • Technical and Professional Requirements- 10 Years,Areas of specialization ,

  • Governance, Risk & Compliance : Enterprise Security Strategy, Security policy development, Security audit and assessments, Implementation and Compliance of controls, Risk Assessment,
  • Identity And Access Management Strategy : Consulting, Product Evaluation, Business Case definition, ROI, Roadmap Definition, Architecture, Design & Implementation, Federated Identity Management,
  • Threat Management & Application Security : Secure SDLC process definition, Application Security, Penetration Testing, Vulnerability assessment ,
  • Business Continuity Planning : Site and System Planning along with Recovery, Periodic Test Administration, Risk Assessment and Analysis, Business Impact Analysis, Business Continuity Strategies, Crisis Communication,
  • Cyber Security : SIEM, Firewalls, Intrusion Detection and Protection, Proxy servers, Anti-Virus implementations, VPN, PKI, IPSEC, Digital certificates, SSH, SSL, Vulnerability assessments, Server hardening, Application hardening, Implementation of Access Control and Monitoring.,
  • Data Privacy & Security Solutions : Encryption, Database Security, PKI solutions, Transaction Security, Mobile Security,
  • Advance Protection & Security : IP Protection, Big Data Security, Cloud / Data Center Security, Mobile Security
  • Educational Requirements : BE

    Service Line : Unit-IL-Cyber Security

    Add to favorites
    Remove from favorites
    My Email
    By clicking on "Continue", I give neuvoo consent to process my data and to send me email alerts, as detailed in neuvoo's Privacy Policy . I may withdraw my consent or unsubscribe at any time.
    Application form