Description of the Skillsets Required:
- Identification of Application Objects Inventory Conduct an exhaustive inventory of all application objects across the organization.
- Document the inventory in detail including application components interfaces dependencies and relationships.
- Utilize the inventory data to inform the development of enterprise architecture artifacts.
Development of Data Architectures
- Develop comprehensive data architectures for the major product lines including Core TWC and BCC.
- Define data models schemas data flows and storage requirements.
- Ensure alignment with industry best practices and organizational data governance policies.
Identification of Security Architecture Requirements
- Identify highlevel security architecture requirements based on industry standards such as NIST PCI and SOC2.
- Review current security architecture and update it to incorporate necessary controls and compliance measures.
- Ensure that security architecture aligns with business objectives and regulatory requirements.
Generation of Candidate Security Architecture
- Develop a candidate security architecture that models security controls within the business domain application domain and infrastructure domain.
- Design security architecture to mitigate identified risks and vulnerabilities.
- Consider factors such as data protection access control encryption authentication and monitoring.
Generation of Security and Architecture Gap Analysis
- Identify gaps in the existing security architecture and overall enterprise architecture.
- Document gaps related to security controls architecture components standards compliance and best practices.
- Prioritize identified gaps based on severity and impact on business operations.
Remote Work :
No