Computer and IT | ENGINEERING

JOB POST: Mobile Application Security Architect at Cognizant, Bangalore: Applications Open

JOB POST: Mobile Application Security Architect at Cognizant, Bangalore: Applications Open

Cognizant job
Cognizant job

Cognizant is an American multinational corporation that provides IT services, including digital, technology, consulting, and operations services. It is headquartered in Teaneck, New Jersey, United States. Cognizant is part of the NASDAQ-100 and trades under CTSH.
Applications are invited for the post of Mobile Application Security Architect at Cognizant, Bangalore.

Qualification
  • BE, BTech graduate
  • MCA graduate.
Responsibility

Requirements Gathering

  • Work with customer on refining business requirements.
  • Ensure that the business requirements cover functional and non-functional requirements.
  • Ensure that the business requirements cover user volumetric growth projection and business expansion roadmap.
  • Support customers to define the requirements roadmap building business case.

Design & Analysis

  • Responsible for Architecture and Infrastructure Design.
  • Coordinate team members for POC execution to realize Architecture implementation.
  • Responsible for security system design.
  • Responsible for Capacity planning and Sizing.
  • Participate in Architecture review with customer and product vendors.
  • Design reusable components/frameworks.
  • Perform usage analysis of existing reusable design components/frameworks.
  • Internal Technical audit for IAM/Data Security projects.

Coding

  • Code Review and Recommendations.

Testing

  • Oversee Unit Integration and performance testing.
  • Review test results.

Documentation

  • Technical and SDLC documentation review is expected.

Change Management

  • Adopt enforce ensure adherence of change management process within projects.

Deployment

  • Setup & own software engineering processes such as build processes source control systems development practices to ensure high-quality delivery.
  • Design automated deployment scripts Data Migration tools.

Defect Management

  • Participate in Defect triage process and drive resolution process.

Coaching & Facilitating

  • Mentor the team on translating requirements to design.
  • Provide guidance and share best practices for design and implementation.
  • Provide guidance on technology selection and solution fitment approach for security requirements.
  • Participate in recruitment drives.

Project Estimation

  • Define standard estimation templates.
  • Define generic IAM Data security questionnaire for RFP/RFI/Assessment.
  • Do Project estimation (resource timeline cost) for RFP/RFI and Customer projects.

Resource/ Efforts Estimation and Monitoring

  • ‘Review Effort estimation of large size projects.

Process Improvements and Adherence

  • Architecture review Performance improvement Optimization suggestions.
  • Technical audit review Suggest service improvement areas.

Ensure that the developed system is consistent with the defined architecture

  • review design and code to meet architecture requirements
  • Adopts /refines best practices based on project requirements.

Knowledge Management

  • Contribution to IAM internal competency Reusable assets consolidation Provide technology POV Share project implementation best practices Conduct on-demand technical training and explore new products/new services.
  • Contribution to Data Security internal competency Share project implementation best practices Explore new products and technologies on Data protection.

People management

  • ‘Manage a sizeable project team with 15~30 members.
  • Responsible for people recognition appraisals and feedback.

Business Development

  • Contribution to Business pre-sales (RFP RFP Customer visit).
  • Attend customer visit.

Thought Leadership / Process Improvements / Delivery Excellence

  • Contribute to the initiatives triggered by the ERSS DE team.

Technology Advisory & Consulting (for clients)

  • Provide technical POV on IAM Data security requirements.
  • Support and contribute to creating technology road maps.
  • Recommend optimal technology solutions to the client using knowledge of technology and tools.

Technology Review for Projects

  • Contribute to cross-project technical audits and review.
  • Recommend optimal technology solutions to the client using knowledge of technology and tools.

Capability Development

  • Conduct POCs in lab environment.
  • Work with Product vendors and acquire knowledge on new emerging areas.
  • Attend Product vendor training.
Must-Have Skills
  • Qualys Vulnerability Mgmt
  • Vulnerability Assessment
How to Apply?

Interested applicants can apply for the post through this link.
For more details, click the link below.

Mobile Application Security Architect at Cognizant, Bangalore

 

Subscribe to our newsletter


Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *