Network Architect

10 - 17 years

25 - 35 Lacs

Posted:17 hours ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

Preferred candidate profile

Choosing GreatzedTec means choosing a company where you will be empowered to shape your career in the way you'd like, where you'll be supported and inspired by a collaborative community of colleagues around the world, and where you'll be able to reimagine what's possible. Join us and help the world's leading organizations unlock the value of technology and build a more sustainable, more inclusive world.

You will be responsible for managing, configuring, and maintaining enterprise firewalls, including Fortinet, Palo Alto, Checkpoint, and Cisco ASA firewalls. Your role will involve designing, deploying, and managing enterprise firewalls such as Palo Alto Networks (PAN-OS, Panorama), Fortinet FortiGate (FortiOS, FortiManager, FortiAnalyzer). Additionally, you will design and implement secure network architectures comprising firewalls, VPNs, IDS/IPS, and segmentation.Good understanding of SIEM tools, IAM - access management ,Dataencryption(Rest and intransit),Implement DLP Solutions for dataloss protection in BPO environment.

A strong understanding of network hardware, routing protocols (BGP, OSPF), firewall configuration, VPNs, and LAN/WAN technologies is essential for this role. You will also deploy and support F5 Load Balancers for application delivery and high availability, ensuring network security best practices and compliance with organizational policies. Conducting firewall audits, log analysis, and threat monitoring to mitigate security risks will be part of your responsibilities.

Must Have skills

Firewall & Network security - Cloud based firewall implementation, configuration,management.

IAM - Access Management

Data encryption- Data in rest and Data in-transit

Logging and Monitoring : SIEM Tools

Data Loss prevention: Implementing DLP to prevent data leak in bpo infrastructure.

Industry experience : BPO/KPO (Minimum 5 years as infra architect)

Certifications like CCNA, Azure/AWS are must.

Communication skills need to be excellent.

In addition to the primary skills, familiarity with firewall clustering, high availability, and failover configurations, as well as cloud security (AWS/Azure firewalls, cloud-native security tools) would be advantageous. A deep understanding of TCP/IP, routing, NAT, VPNs, and network protocols is also desired for this position.

GreatzedTec is a global business and technology transformation partner that helps organizations accelerate their transition to a digital and sustainable world. GreatzedTec leverages its strong heritage and market-leading capabilities in AI, cloud, and data to deliver end-to-end services and solutions tailored to clients" business needs.,"

Role & responsibilities

1. Strategic Planning and Design BPO Infrastruce End to End.

  • Blueprint Creation:

    Create a comprehensive architectural blueprint for the BPO's infrastructure, ensuring it aligns with business goals and supports operational efficiency.
  • Technology Selection:

    Evaluate and select the appropriate technologies and vendors for all infrastructure components, including servers, storage, networking, and security systems.
  • Scalability and Resilience:

    Design the infrastructure for high availability and scalability to accommodate fluctuating workloads and client growth. This includes planning for disaster recovery (DR) and business continuity (BC) to ensure uninterrupted service delivery.

2. Implementation and Deployment Oversight

  • Project Management:

    Lead and guide technical teams through the implementation of the infrastructure design. This includes creating project timelines, managing resources, and ensuring projects are completed on schedule and within budget.
  • Security Integration:

    Oversee the integration of all security components into the core infrastructure. This includes setting up and configuring

    firewalls

    ,

    Intrusion Detection/Prevention Systems (IDPS)

    , and

    Data Loss Prevention (DLP)

    systems to protect sensitive data.
  • Policy Enforcement:

    Ensure all infrastructure changes and deployments adhere to established security and compliance policies.

3. Security Architecture and Data Protection

  • Firewall and Network Security:

    Design a robust network security architecture that includes the strategic placement and configuration of firewalls to control traffic and prevent unauthorized access.
  • Threat Detection and Prevention:

    Implement and manage IDPS to monitor network traffic for malicious activity and unauthorized intrusions.
  • Data Loss Prevention (DLP):

    Architect and deploy DLP solutions to monitor and prevent sensitive data from leaving the network or being mishandled. This is crucial in a BPO context where large volumes of client data are processed.
  • Identity and Access Management (IAM):

    Design and implement a strong IAM framework to manage user identities and access privileges. This ensures that employees only have access to the data and systems required for their specific roles, minimizing the risk of internal breaches.
  • Data Encryption:

    Establish policies and technologies for

    data encryption

    both at rest (e.g., on servers and databases) and in transit (e.g., during data transfers), ensuring client data remains confidential and secure.

4. Compliance and Governance

  • Audit and Compliance:

    Ensure the infrastructure design meets all relevant regulatory and client-specific compliance standards (e.g., GDPR, HIPAA, PCI-DSS). The architect is often the key point of contact during audits.
  • Documentation:

    Maintain comprehensive and up-to-date documentation of the infrastructure architecture, security policies, and standard operating procedures. This documentation is vital for audits, troubleshooting, and future enhancements.

5.Vendor and Stakeholder Management

This role involves working with various internal and external groups to deliver infrastructure projects successfully.

  • Vendor Selection:

    The architect evaluates and selects hardware, software, and cloud service providers. They negotiate contracts and manage relationships to ensure services meet the BPOs needs and budget.
  • Project Leadership:

    They lead infrastructure projects, collaborating with project managers, engineers, and support teams to ensure designs are implemented correctly and on time.
  • Cross-Functional Collaboration:

    They work closely with other departments, such as security, operations, and business development, to understand their needs and align the infrastructure with their strategies

6. Client Management.

  • Establish a Single Point of Contact (SPOC):

    A dedicated point of contact, even if it's a team or an automated system, ensures clients know exactly where to go for help.
  • Practice Proactive Communication:

    Don't wait for a client to ask for an update. Send out regular, automated notifications about ticket status, planned maintenance, or system outages. This builds trust and reduces inbound inquiries.
  • Set Clear Expectations (SLAs):

    Service Level Agreements (SLAs) are vital. They define the expected response and resolution times for different types of issues. This helps manage client expectations and provides a clear framework for your team's performance.
  • Offer Multiple Communication Channels:

    Clients should be able to reach you through their preferred method, whether it's a self-service portal, email, phone, or live chat.
  • Maintain Transparency:

    Be honest and transparent about challenges, delays, and resolutions. Acknowledge when a mistake has been made and communicate how it will be fixed.
  • Solicit and Act on Feedback:

    Use surveys and feedback forms to understand client satisfaction. This data is invaluable for identifying pain points and continuously improving your service.

7. ITIL Practices and Resolution Framework.

Core ITIL Processes Supported by Ticketing Tools:

A. Incident Management

Restoring normal service operations as quickly as possible and minimizing the adverse impact on business operations. The ticketing tool is essential here.

  • How the Tool Helps:

    • Ticket Creation and Categorization:

      Incidents (e.g., "my computer is not turning on") are automatically logged, categorized, and prioritized based on urgency and impact.
    • Automated Routing:

      Tickets are automatically assigned to the most appropriate agent or team based on their skills and availability.
    • SLA Tracking:

      The tool monitors tickets against predefined SLAs and sends alerts to agents and managers when a breach is imminent.
    • Communication:

      It provides a central place for all communication related to the incident, including internal notes and client updates.

B. Problem Management

identify the root cause of an incident to prevent it from happening again.

  • How the Tool Helps:

    • Root Cause Analysis (RCA):

      The ticketing system allows agents to link multiple incidents to a single "problem" record. This helps them analyze recurring issues to find the underlying cause.
    • Known Error Database (KEDB):

      Once a root cause is found and a workaround or permanent fix is identified, the information is stored in a KEDB. This resource is invaluable for agents to quickly resolve future incidents.
    • Proactive Management:

      By analyzing data on recurring incidents, a service desk can be proactive in addressing problems before they cause widespread disruption.

C. Change Management

ensure that all changes to IT services are introduced in a controlled, coordinated, and documented manner to minimize risk.

  • How the Tool Helps:

    • Change Requests:

      The tool provides a structured way to submit, review, and approve change requests (e.g., "installing new software on all company computers").
    • Workflow Automation:

      It automates the change approval process, routing requests to the appropriate stakeholders for review and sign-off.
    • Change Calendar:

      A change calendar within the tool allows the team to see planned changes and identify any potential conflicts.
    • Risk and Impact Analysis:

      The system helps to document and assess the potential risks and impact of a change before it is implemented.

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You

hyderabad, pune, bengaluru

hyderabad, telangana, india

hyderabad, telangana, india

hyderabad, pune, bengaluru