0% found this document useful (0 votes)
21 views3 pages

Presales Solution Architect

The document outlines the responsibilities and requirements for a Presales Solution Architect specializing in Data Centre and IT Network Security. Key tasks include designing and building security solutions, creating techno-commercial proposals, and defending them to clients, with a strong emphasis on various security technologies. Candidates should have extensive experience in enterprise perimeter protection, cloud security, and familiarity with security architecture methodologies.

Uploaded by

SAPTARSHI GHOSH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views3 pages

Presales Solution Architect

The document outlines the responsibilities and requirements for a Presales Solution Architect specializing in Data Centre and IT Network Security. Key tasks include designing and building security solutions, creating techno-commercial proposals, and defending them to clients, with a strong emphasis on various security technologies. Candidates should have extensive experience in enterprise perimeter protection, cloud security, and familiarity with security architecture methodologies.

Uploaded by

SAPTARSHI GHOSH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Presales Solution Architect – Data Centre and IT Network Security

• Design, architect solutions in Physical, Virtualised and Cloud environment


• The role expects the resource to be able to design, build security solutions to protect
customer assets across data center or private / public cloud environment
• Build techno-commercial proposals
• Defend the proposal to TechM Global customers in person
• Strong understanding of following technologies

A. Perimeter Network Security platforms

• Anti-DDoS - F5, Radware, Cisco, Imperva, Barracuda, Arber


• Unified Threat Management (UTM) – Cisco, Palo Alto, Fortinet, F5
• Advanced Persistent Threat (APT) Mngt – FortiGate, Cisco, Palo Alto
• Web Security Gateways (Proxy) - ZScalar, Symantec (BlueCoat), Cisco, ForcePoint,
McAfee
• Email Security Gateways - Cisco, Symantec, Trend Micro, Digital Guardian, ForcePoint
• Web Application Firewalls (WAF) – F5, Imperva, Akamai, Citrix, Fortinet, Barracuda
• Network Load Balancer (NLB) – Radware, F5, Imperva, Citrix, Juniper
• Application Load Balancers (ALB) – Citrix, F5, Radware, Barracuda
• IDS / IPS - Cisco, McAfee, Tipping Point, IBM, Symantec, Radware, Palo Alto, Juniper
• Perimeter Firewall – Cisco, Check Point, Fortinet, Palo Alto, Sophos, Juniper
• Network Data Loss Prevention – Trend Micro, Kaspersky, Symantec, Sophos, McAfee
• SSL VPN – Check Point, Cisco, Fortinet, Sophos
• Network Access Control (NAC) – Cisco ISE, ForceScout, Pulse Secure, Aruba
• Network Vulnerability Scanners (VM) – Nessus, Rapid7, Qyalys
• Software Defined Networking (SDN) – Cisco, Juniper, VMWare NSX, Arista
• Network Micro-segmentation – Cisco TrustSec, VMWare, Aruba

B. End Point Security Solutions

• Anti-Virus, Anti-Malware – McAfee, Symantec, Trend Micro, Cisco AMP


• Email Security (Anti-Phishing, Anti-Spoofing) – Cisco IronPort, Trend Micro, Symantec,
• Host IPS, Host Firewall – Symantec, Trend Micros, FireEye
• Desktop Protection, End Point DLP – Trend Micro, Sophos, KasperSky, Symantec
• Disk Encryption - Tipping Point, Intel, Kaspersky, Symantec, Sophos, Thalas
• Data Masking – Microsoft, IBM, Imperva, Delfix, Oracle, Informatica
• ETDR – Symantec, FireEye, McAfee, Trend Micro
• Data Privacy & Protection Technologies and Solutions
******************************
Cisco Security Architect.
Solution Architect – IT Security
Essential Requirements:
 Resource with minimum 4-5 years of Enterprise Perimeter protection technologies from
planning, design, implementation and manage / operate perspective. The platforms can be
around
Perimeter, Internal, web application firewalls, NextGen Firewalls
Network Intrusion Detection / prevention platforms
Web Security Gateway / Proxy
DNS / DHCP / IP Management (IPAM) solutions
Unified Threat Protection
Advanced Persistent Threat Protection (Sandboxing) solutions
Network Behaviour Analytics (NBA) – Network packet Capture, Deep Packet Inspection,
Network Anomaly Detection Systems
Anti-Phishing, Anti-SPAM, Anti-Spoofing platforms
Content Inspection / Content Filtering platforms
Anti-Malware Protection, Anti-SPY, Anti-BOT platforms
Network Access Control – TACCACs+ / RADIUS, 802.1x
Software Defining Networking – L4-L7 Integration
Load Balancers (Network / Server)
SD-WAN, NFV/NSO/Virtual Network Functions – vFW, vIDS, vSD-WAN
Software Define Network Access… SDA
Security Information Event Management & Analytics Platforms integration
Orchestration Tools – REST APIs, Perl, Python
Firewall Analysers / Network Device Management platforms (Firepower, AlgoSec, Tuffin
networks etc.)
Cloud Access Service Broker
Data Loss Prevention, Data Masking, Data Encryption Methods tools
IPsec, PKI, SSH tools
 Strong understanding of at least 3 of following technologies – network security, endpoint
security, SOC, IDAM etc.
 Knowledge of security and compliance regulatory standards.
 In depth hands on experience on Cloud security.
 Should have implemented, Site to Site and Client to Site VPN, High availability, Load
Balancing, Antivirus and Content Filtering, Certificate management, WAF, IDAM, DLP.
 Deep knowledge of security architecture methodologies, Industry best practices and
generally accepted information security principles for cloud.
 Highly skilled in Vulnerability assessment, signature developing and escalation processes
 Knowledge of security architecture methodologies Like TOGAF, SABSA, and ISO 27001,
COBIT, ITIL Industry standards
 The role expects the resource to be able to design, build security solutions to protect
customer assets across data centre or private / public cloud environment
 Build techno-commercial proposals and proposal defence
 Candidates with deep understanding of SIEM platforms and SOC Operations will be
preferred
Incident Response Management Process Automation / Workflow Orchestration tools
Big Data Analytics – Security Data Lake Design
User Entity Behaviour Analytics
Manage, Threat, Detect, Response (MTDR)
 Extensive experience in information security and/or IT risk management with a focus on
security, performance and reliability
 Solid understanding on Network Security, Network Hardware Configuration, Network
Protocols, Networking Standards, Supervision, Conceptual Skills, Decision Making,
Informing Others, Functional and Technical Skills, Dependability, Information Security
Policies
 Good working knowledge of current IT risks and experience implementing security
solutions
 Experience implementing multi-factor authentication, single sign-on, identity management
or related technologies
 Reviewing current system security measures and recommending and implementing
enhancements
 Conducting regular system tests and ensuring continuous monitoring of network security
 Developing project timelines for ongoing system upgrades
 Ensuring all personnel have access to the IT system limited by need and role
 Establishing disaster recovery procedures and conducting breach of security drills
 Prepares system security reports by collecting, analysing, and summarizing data and
trends.
 Updates job knowledge by tracking and understanding emerging security practices and
standards; participating in educational opportunities; reading professional publications;
maintaining personal networks; participating in professional organizations.

You might also like