Secure your tomorrow with Unisys: A great place to learn and grow your career! At Unisys, every associate makes a difference. Here, you have the opportunity to learn new skills, apply your expertise, explore local and global challenges, and solve complex technology issues with creative solutions and diverse teams. You are part of a team that drives change and delivers results on a daily basis. Our success is a direct result of our people.
We are hiring for a Cybersecurity Presales Architect, who will be working closely with Unisys clients to design and implement solutions related Unisys portfolio offerings.
Unisys is a global information technology company that builds high-performance, security-centric solutions for the most digitally demanding businesses and governments on Earth. Unisys offerings include security software and services, digital transformation and workplace services, industry applications and services, and innovative software operating environments for high-intensity enterprise computing.
About the role
As Subject Matter Expert for the Unisys Data Protection Solutions, the Cyber Security Presales Architect will directly interface with clients/prospects on both a pre-sales and post-sales basis. You will need to quickly become an expert on the Data Protection solutions (Stealth) in order to assist the field sales organization capture Stealth technology and services contracts.
You will be working on cutting-edge projects in a highly technical space. With exceptional communication and presentation skills, you will present the Stealth Solutions, guide the client to identify potential use-cases, qualify the opportunity, and consult with the sales team to determine strategies and tactical next steps. Working with the Unisys Services organization, you may also be required to assist in the design/architecture of the client solution or response to an RFI/RFP. Your ability to translate technical attribute to business benefits will ensure your success.
The candidate will require significant domain knowledge and documented experience designing and or/managing secure Networks. This position requires the candidate to demonstrate a proficiency and/or knowledge of advanced security concepts including functional knowledge of common network fabric such as Routers, Firewalls, and Connectivity & Monitoring assets.
Your client management expertise will be matched by your people skills, with particular strengths in client customer service and building strong relationships. With excellent outcome orientated skills, you will have the ability to problem-solve and be highly technical with the ability to address security challenges inherent to virtualization and “cloud” based service offerings.
Responsibilities :Present Solutions in an attractive and confident manner to clients/prospects
Function as subject matter expert on Network usage of the Stealth Suite of Solutions
Ability to demonstrate Stealth in a pre-sales environment
Respond effectively to RFP and RFI requests
Lead client/prospect discovery engagements to determine opportunities/use-cases for Stealth Solutions
Partner with services architects to produce detailed conceptual and logical architectures that meet business and technical requirements
Understand functionality and capability of a core set of infrastructure security tools
Provide expertise and guidance on the configuration and deployment of network security tools
Investigate and validate new infrastructure security tools as directed by offering architects and business requirements
Address security challenges inherent to virtualization and “cloud” based service offerings
Qualifications :10+ years of work experience in IT security or Network Operations
Strong knowledge Network Engineering; Router, Switches, VPN and Firewall rules
Strong knowledge of Data Center and network operations, server administration processes, and network and communication protocols
Ability to create detailed conceptual, logical and physical architectures using Stealth
Ability to be concise, articulate, and assertive in all forms of communication
Strong knowledge of multiple infrastructure security tools
Conversant in published security architectures, approaches, methodologies, and standards
Excellent analytical and troubleshooting skills
Ability to deal with partners and peers
Strong self-starting, self-managing work habits