Presales Solution Architect – Data Centre and IT Network Security
• Design, architect solutions in Physical, Virtualised and Cloud environment
• The role expects the resource to be able to design, build security solutions to protect
customer assets across data center or private / public cloud environment
• Build techno-commercial proposals
• Defend the proposal to TechM Global customers in person
• Strong understanding of following technologies
A. Perimeter Network Security platforms
• Anti-DDoS - F5, Radware, Cisco, Imperva, Barracuda, Arber
• Unified Threat Management (UTM) – Cisco, Palo Alto, Fortinet, F5
• Advanced Persistent Threat (APT) Mngt – FortiGate, Cisco, Palo Alto
• Web Security Gateways (Proxy) - ZScalar, Symantec (BlueCoat), Cisco, ForcePoint,
McAfee
• Email Security Gateways - Cisco, Symantec, Trend Micro, Digital Guardian, ForcePoint
• Web Application Firewalls (WAF) – F5, Imperva, Akamai, Citrix, Fortinet, Barracuda
• Network Load Balancer (NLB) – Radware, F5, Imperva, Citrix, Juniper
• Application Load Balancers (ALB) – Citrix, F5, Radware, Barracuda
• IDS / IPS - Cisco, McAfee, Tipping Point, IBM, Symantec, Radware, Palo Alto, Juniper
• Perimeter Firewall – Cisco, Check Point, Fortinet, Palo Alto, Sophos, Juniper
• Network Data Loss Prevention – Trend Micro, Kaspersky, Symantec, Sophos, McAfee
• SSL VPN – Check Point, Cisco, Fortinet, Sophos
• Network Access Control (NAC) – Cisco ISE, ForceScout, Pulse Secure, Aruba
• Network Vulnerability Scanners (VM) – Nessus, Rapid7, Qyalys
• Software Defined Networking (SDN) – Cisco, Juniper, VMWare NSX, Arista
• Network Micro-segmentation – Cisco TrustSec, VMWare, Aruba
B. End Point Security Solutions
• Anti-Virus, Anti-Malware – McAfee, Symantec, Trend Micro, Cisco AMP
• Email Security (Anti-Phishing, Anti-Spoofing) – Cisco IronPort, Trend Micro, Symantec,
• Host IPS, Host Firewall – Symantec, Trend Micros, FireEye
• Desktop Protection, End Point DLP – Trend Micro, Sophos, KasperSky, Symantec
• Disk Encryption - Tipping Point, Intel, Kaspersky, Symantec, Sophos, Thalas
• Data Masking – Microsoft, IBM, Imperva, Delfix, Oracle, Informatica
• ETDR – Symantec, FireEye, McAfee, Trend Micro
• Data Privacy & Protection Technologies and Solutions
******************************
Cisco Security Architect.
Solution Architect – IT Security
Essential Requirements:
Resource with minimum 4-5 years of Enterprise Perimeter protection technologies from
planning, design, implementation and manage / operate perspective. The platforms can be
around
Perimeter, Internal, web application firewalls, NextGen Firewalls
Network Intrusion Detection / prevention platforms
Web Security Gateway / Proxy
DNS / DHCP / IP Management (IPAM) solutions
Unified Threat Protection
Advanced Persistent Threat Protection (Sandboxing) solutions
Network Behaviour Analytics (NBA) – Network packet Capture, Deep Packet Inspection,
Network Anomaly Detection Systems
Anti-Phishing, Anti-SPAM, Anti-Spoofing platforms
Content Inspection / Content Filtering platforms
Anti-Malware Protection, Anti-SPY, Anti-BOT platforms
Network Access Control – TACCACs+ / RADIUS, 802.1x
Software Defining Networking – L4-L7 Integration
Load Balancers (Network / Server)
SD-WAN, NFV/NSO/Virtual Network Functions – vFW, vIDS, vSD-WAN
Software Define Network Access… SDA
Security Information Event Management & Analytics Platforms integration
Orchestration Tools – REST APIs, Perl, Python
Firewall Analysers / Network Device Management platforms (Firepower, AlgoSec, Tuffin
networks etc.)
Cloud Access Service Broker
Data Loss Prevention, Data Masking, Data Encryption Methods tools
IPsec, PKI, SSH tools
Strong understanding of at least 3 of following technologies – network security, endpoint
security, SOC, IDAM etc.
Knowledge of security and compliance regulatory standards.
In depth hands on experience on Cloud security.
Should have implemented, Site to Site and Client to Site VPN, High availability, Load
Balancing, Antivirus and Content Filtering, Certificate management, WAF, IDAM, DLP.
Deep knowledge of security architecture methodologies, Industry best practices and
generally accepted information security principles for cloud.
Highly skilled in Vulnerability assessment, signature developing and escalation processes
Knowledge of security architecture methodologies Like TOGAF, SABSA, and ISO 27001,
COBIT, ITIL Industry standards
The role expects the resource to be able to design, build security solutions to protect
customer assets across data centre or private / public cloud environment
Build techno-commercial proposals and proposal defence
Candidates with deep understanding of SIEM platforms and SOC Operations will be
preferred
Incident Response Management Process Automation / Workflow Orchestration tools
Big Data Analytics – Security Data Lake Design
User Entity Behaviour Analytics
Manage, Threat, Detect, Response (MTDR)
Extensive experience in information security and/or IT risk management with a focus on
security, performance and reliability
Solid understanding on Network Security, Network Hardware Configuration, Network
Protocols, Networking Standards, Supervision, Conceptual Skills, Decision Making,
Informing Others, Functional and Technical Skills, Dependability, Information Security
Policies
Good working knowledge of current IT risks and experience implementing security
solutions
Experience implementing multi-factor authentication, single sign-on, identity management
or related technologies
Reviewing current system security measures and recommending and implementing
enhancements
Conducting regular system tests and ensuring continuous monitoring of network security
Developing project timelines for ongoing system upgrades
Ensuring all personnel have access to the IT system limited by need and role
Establishing disaster recovery procedures and conducting breach of security drills
Prepares system security reports by collecting, analysing, and summarizing data and
trends.
Updates job knowledge by tracking and understanding emerging security practices and
standards; participating in educational opportunities; reading professional publications;
maintaining personal networks; participating in professional organizations.