Technology Architects

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

SAP Technology Architect

Job Description:

Support and enable the comprehensive architecture, functionality,


economics, and architecture compliance of a suite of applications solution
options for Cargill’s Technology area. Develop technology and integration
architecture at both an enterprise and project level, in collaboration with
various other members of the IT organization including Solution Architects,
Application Architects, and Solution Integrity teams as well as subject matter
experts from Cargill Global IT and business units for assigned solutions. Work
closely with Solution Architects, Application Architects, Regional Application
Portfolio Managers, Enterprise Architecture, and other key stakeholders to
determine requirements for effective planning and development of high-
powered software solutions. Perform technical architecture planning and
development. Drive business partnerships to shape and optimize Cargill
Global IT solutions. Manage and drive architecture assurance for Cargill IT
solutions. Facilitate IT innovation and delivery within the Cargill business.
Handle projects across multiple technologies and functional areas to ensure
that solution and development teams are properly equipped to meet business
requirements, design objectives, and understand infrastructure impacts. Up to
20% domestic and 20% international travel required.

Qualifications
Required Education and experience: Master’s degree in Software Engineering,
Computer Science, Electronics Engineering, Telecommunication Engineering
or closely related and 2 years of experience in job offered or alternate
occupation of (all levels accepted): SAP Developer, SAP Administrator,
Systems Analyst, System Administrator, Software Developer, or closely
related occupation. Employer will accept foreign equivalent degree.

Employer will accept alternate combination of education and experience:


Bachelor's degree in Software Engineering, Computer Science, Electronics
Engineering, Telecommunication Engineering or closely related and five (5)
years of progressive, post-baccalaureate experience in job offered or
alternate occupation of (all levels accepted): SAP Developer, SAP
Administrator, Systems Analyst, System Administrator, Software Developer,
or closely related occupation.

Required Skills:
2 years of experience in:

 SAP HANA database;


 SAP FIORI and any cloud deployment;
 Full life cycle SAP implementation;
 SAP in most or all of the following: Basis, HANA, cloud, server, storage,
database, network, security, virtualization, monitoring, software
development;
 Leading technology or deployment projects;
 Collaborating with regional and global project teams to define business
requirements and deliver solutions that meet business goals; and
 Developing integrated solutions involving process, data, and
technology.

Employer will accept any suitable combination of education, training, and/or


experience

Information Security Architect


The information security architect will drive information security practices and
processes throughout the organization. The position balances business priorities,
information security risks, emerging threats, and best practice security
architecture to ensure the confidentiality, integrity and availability of the
company’s networks and applications. In addition, this role is responsible for
securing enterprise information by determining security requirements; planning,
implementing, and testing security systems; and working with leadership to
develop security standards, policies, and procedures; mentoring team members.

Responsibilities

 Enhances security team accomplishments and competence by planning


delivery of solutions; answering technical and procedural questions for less
experienced team members; teaching improved processes; mentoring team
members
 Determines security requirements by evaluating business strategies and
requirements; researching information security standards; conducting
system security and vulnerability analyses and risk assessments; studying
architecture/platform; identifying integration issues; preparing cost
estimates
 Plans security systems by evaluating network and security technologies;
developing requirements for local area networks (LANs), wide area
networks (WANs), virtual private networks (VPNs), routers, firewalls, and
related security and network devices
 Maintains security by monitoring and ensuring compliance to standards,
policies, and procedures; conducting incident response analyses
 Upgrades security systems by monitoring security environment; identifying
security gaps; evaluating and implementing enhancements
 Prepares system security reports by collecting, analyzing, and summarizing
data and trends
 Updates job knowledge by tracking and understanding emerging security
practices and standards; participating in educational opportunities; reading
professional publications; maintaining personal networks and participating
in professional organizations
 Act as SME and provide third-level support and analysis during and after
security events
 Act in an advisory role in application development and acquisition to
assess security requirements and controls and to ensure that security
controls are implemented as planned
 Enhances department and organization reputation by accepting ownership
for accomplishing new and different requests; exploring opportunities to
add value to job accomplishments
 Serve as the security expert in providing solution designs and technical
consulting services in support of maintaining compliance with all
applicable requirements including internal policy, PCI-DSS, FERPA, SOX,
state data privacy laws and ISO 27001 controls

Education

4-year degree or equivalent experience

Work Experience

 Minimum 10 years of industry experience and minimum 6 years’ experience


working on security architecture
 Demonstrated security architecture and hardening experience in the
following environments:
 Windows Services (e.g. Windows 2008+ AD, LDAP)
 Operating Systems (e.g. Linux, Windows)
 Internet Protocols (e.g. IP, DNS, HTTP, SMTP, SSL, SFTP, IPSEC)
 Experience working with Cisco firewall/VPN/IDS configuration and
troubleshooting
 Experience working with F5 – LTM/APM/ASM
 Experience with different network types (i.e. LAN, WAN)
 Working with business owners and 3rd party vendor to implement proper
security controls into new on premise and cloud base applications
 Conducting legal and HR investigations

Skills

 Strong analytical and technical skills with the ability to parse requirements
and relate them to appropriate security controls
 Cisco and Ironport Security Solutions
 Splunk
 F5
 Linux (RHEL)
 IDS/IPS
 Vulnerability Management
 Able to work in a fast paced complex and dynamic environment
 Poise under pressure and comfort with ambiguity
 Excellent verbal and written communication skills

You might also like