- Ufficio in Kolkata
Introduction
A career in IBM Consulting is built on long-term client relationships and close collaboration worldwide. You’ll work with leading companies across industries, helping them shape their hybrid cloud and AI journeys. With support from our strategic partners, robust IBM technology, and Red Hat, you’ll have the tools to drive meaningful change and accelerate client impact. At IBM Consulting, curiosity fuels success. You’ll be encouraged to challenge the norm, explore new ideas, and create innovative solutions that deliver real results. Our culture of growth and empathy focuses on your long-term career development while valuing your unique skills and experiences.
Your role and responsibilities
As an Application Architect specializing in SAP HANA Application Security, you will design and implement SAP HANA application security designs, configurations, and related policies and procedures in support of large SAP implementations. You will work closely with cross-functional teams to deliver high-quality, secure, and compliant SAP HANA solutions that meet business requirements and exceed customer expectations. Your primary responsibilities will include: • Lead Client-Facing Architecture: Perform as a lead architect in client-facing roles, providing expert guidance on SAP HANA application security best practices and delivering the overall design and approach to security across complex SAP environments. • Conduct Security Assessments: Conduct security assessments and risk analyses for SAP HANA applications, identifying potential vulnerabilities and recommending mitigation strategies to ensure the security and integrity of sensitive data. • Design Secure Architectures: Design and implement secure SAP HANA architectures, including data encryption and access controls, to protect against unauthorized access and ensure compliance with regulatory requirements. • Implement Security Features: Design and implement SAP HANA security features, including authentication, authorization, and auditing, to ensure the confidentiality, integrity, and availability of sensitive data. • Collaborate with Clients: Collaborate with clients to gather security requirements and provide expert guidance on SAP HANA application security best practices, ensuring that solutions meet business needs and exceed customer expectations.
Required technical and professional expertise
• SAP HANA Security Design: Experience with designing and implementing SAP HANA application security designs, configurations, and related policies and procedures in support of large SAP implementations. • Security Risk Management: Experience in conducting security assessments and risk analyses for SAP HANA applications, identifying potential vulnerabilities and recommending mitigation strategies. • Secure Architecture Implementation: Experience with designing and implementing secure SAP HANA architectures, including data encryption and access controls, to protect against unauthorized access and ensure compliance with regulatory requirements. • SAP Security Features: Experience with designing and implementing SAP HANA security features, including authentication, authorization, and auditing, to ensure the confidentiality, integrity, and availability of sensitive data. • Cross-Functional Collaboration: Experience working closely with cross-functional teams to deliver high-quality, secure, and compliant SAP HANA solutions that meet business requirements and exceed customer expectations.
Preferred technical and professional experience
• SAP HANA Security Trends: Experience with staying up-to-date with the latest SAP HANA security features, trends, and best practices, applying this knowledge to continuously improve the security posture of SAP HANA applications. • Data Masking Techniques: Experience with implementing data masking and anonymization techniques to protect sensitive data in SAP HANA applications, ensuring the confidentiality and integrity of sensitive information. • SAP Security Best Practices: Experience with providing expert guidance on SAP HANA application security best practices, collaborating with clients to gather security requirements and deliver secure solutions that meet business needs.
IBM is committed to creating a diverse environment and is proud to be an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, caste, genetics, pregnancy, disability, neurodivergence, age, veteran status, or other characteristics. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
Candidarsi ora