Job Description :
- 12+ years of related experience in a professional role with a Bachelor's degree; or 8+ years with a Master's degree in computer science, MIS, Cybersecurity or a related field of study ; or 5+ years with a PhD; or equivalent experience., 5+ years of experience in Integration technologies.
- Minimum 5+ years of related experience, specifically in Engineering/IT Operations, Security Operations, Vulnerability Management, and/or Incident
- CISSP, CRISC, CISM or similar certifications advantageous.
Essential Requirements:
- Advanced knowledge of Integration tools and technologies, prior experience in few of the following integration and DATA technologies - Oracle, Informatica, Terradata, Greenplum, Hadoop, SOA, Messaging, API and API Gateways, B2B Integration,Cloud Integration tools, Microservices and Cloud Architecture.
- Expertise in HTML, HTML5, CSS3, JavaScript, JQuery, Typescript, Angular6,8, Bootstrap Components
- Should have experience in creating angular Modules, Components, Templates, Services.
- Good understanding on routing, data binding, creating custom filters/pipes, angular observables etc.
- Good understanding on Jasmine/Karma unit testing framework.
- Proficiency in Full Stack Java Spring Boot with Angular.
- Should have sound knowledge of Java, J2EE architecture and Enterprise Integration patterns.
- Sound knowledge of Messaging System Architecture and Event driven architecture.
- Experience with level 3 support on critical issues and problem resolution
- Expertise in XML, JSON, Spring Core, Spring Web Services, Spring batch, Spring integration.
- Expertise in Rest and SOAP webservices implementation.
- Should have knowledge of Rabbit MQ, KAFKA Messaging system.
- Should have knowledge of Git and CI/CD.
- Enterprise Integration Platforms (ESB or EAI platforms)
- Practicing TDD using Junit, Mockito, Easy Mock or equivalent frameworks.
- Database Experience and Hibernate (ORM), or MyBatis.
- Strong understanding of GoF Design Patterns, Enterprise Application Patterns and/or Sun's J2EE Patterns and anti-patterns
- Solid understanding and knowledge of OWASP tools and methodologies and security attack vectors.
- Hands on experience with Vulnerability Scanning & Management tools (Nexpose, Tenable, Kenna Security)
- Excellent problem-solving skills with the ability to diagnose and troubleshoot technical issues.
- Ability to drive complex, cross-organizational initiatives through the influencing of and negotiation with stakeholders who at times may hold competing priorities
- CISSP, CRISC, CISM or similar certifications advantageous.