Security Architect

Accenture logo


View Salaries, Reviews, and more  

Job Summary

โ‚น113,131 - โ‚น147,776 / Monthly EST

Job Type


Years of Experience
Information not provided

Tech Stacks
Azure IAM Microsoft LDAP

Job Description

Project Role : Security Architect

Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations.

Must have skills : Identity Access Management (IAM), Microsoft Active Directory

Good to have skills : NA

Minimum 3 Year(s) Of Experience Is Required

Educational Qualification : Bachelor or college degree in related field or equivalent work experience

Summary: As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve working with Identity Access Management (IAM) and Microsoft Active Directory (AD) to implement and manage cloud security controls. Roles & Responsibilities: - Design and implement cloud security controls using IAM and Microsoft Active Directory (AD) to ensure the confidentiality, integrity, and availability of cloud-based systems. - Develop and maintain cloud security policies, standards, and procedures to ensure compliance with regulatory requirements and industry best practices. - Collaborate with cross-functional teams to identify and mitigate security risks, including conducting security assessments and penetration testing. - Provide technical guidance and support to project teams on cloud security-related issues, including security architecture, design, and implementation. - Stay updated with the latest advancements in cloud security technologies and integrate innovative approaches for sustained competitive advantage. Professional & Technical Skills: Active Directory and LDAP Architecture: Lead the design, planning, and architecture of Active Directory domains, forests, and LDAP directory services to meet the organization's requirements for scalability, performance, and interoperability. Define directory schema, object classes, attributes, and access controls to support identity and access management needs. Domain and Forest Configuration: Install, configure, and manage Active Directory domain controllers and LDAP servers to provide directory services and authentication mechanisms for users and applications. Implement replication topologies, site configurations, and trust relationships to ensure high availability and fault tolerance. User and Group Management: Define and enforce user provisioning, de-provisioning, and group membership processes within Active Directory and LDAP directories. Implement access controls, group policies, and attribute-based access control (ABAC) policies to enforce least privilege principles and ensure data security. Directory Integration and Federation: Configure and manage identity federation services, such as Active Directory Federation Services (ADFS), to enable single sign-on (SSO) and identity synchronization with cloud-based applications and services. Implement federated trust relationships, claims-based authentication, and identity mapping to facilitate seamless user access across heterogeneous IT environments. Group Policy Management: Develop, implement, and manage group policies within Active Directory to enforce security settings, desktop configurations, and application restrictions across organizational units (OUs) and group memberships. Configure Group Policy Objects (GPOs), security templates, and administrative templates to standardize system configurations and enforce compliance with security policies. Security and Compliance: Implement security best practices, controls, and auditing mechanisms to protect Active Directory and LDAP environments from unauthorized access, data breaches, and insider threats. Monitor directory logs, events, and access attempts to detect and respond to security incidents promptly. Ensure compliance with regulatory requirements related to identity and access management. Backup and Recovery: Develop and implement backup and recovery strategies for Active Directory databases, LDAP directories, and system state data. Perform regular backups, test restoration procedures, and maintain backup copies off-site to ensure data integrity and availability in the event of system failures or disasters. Performance Monitoring and Optimization: Monitor Active Directory and LDAP performance metrics, such as CPU usage, memory utilization, directory search times, and replication latency. Identify performance bottlenecks, scalability issues, and resource constraints. Optimize directory configurations, replication settings, and infrastructure components to improve performance and reliability. Documentation and Training: Maintain accurate documentation of Active Directory and LDAP configurations, policies, procedures, and troubleshooting guidelines. Provide training, guidance, and support to IT teams, system administrators, and helpdesk staff on Active Directory and LDAP best practices, troubleshooting techniques, and security protocols. Continuous Improvement: Continuously assess and improve the effectiveness and efficiency of Active Directory and LDAP management processes, tools, and workflows. Implement process improvements, technology enhancements, and best practices to streamline directory management activities and enhance the organization's security posture. Good to know Azure AD and Azure SSO Additional Information: - The candidate should have a minimum of 3 years of experience in Identity Access Management (IAM) and Microsoft Active Directory (AD). - The ideal candidate will possess a strong educational background in computer science, information technology, or a related field, along with a proven track record of delivering impactful cloud security solutions. - This position is based at our Gurugram office.

Bachelor or college degree in related field or equivalent work experience

Interview Questions of Security Architect at Accenture

Interview questions from Accenture that are similar to Security Architect
View more interview questions from Accenture โ†’
Unlock Your Interview Potential
The only end-to-end front end interview preparation platform by FAANG ex-interviewers and Staff Engineers.
Get hired at FAANG
Users now work at:

Achieve your dream job with our top-notch tools!

Resume Checker Illustration

Resume Checker

Our free resume checker analyzes the job description and identifies important keywords and skills missing from your resume in just a minute!

Check Now
Interview Preparation Illustration

AI InterviewPrep

Utilizing advanced AI, our tool generates tailored interview questions based on your industry, role, and experience. Practice and receive feedback on your answers in real time!

Check Now
Resume Builder Illustration

Resume Builder

Let us show you the differences between a bad, good, and great resume, and guide you in building a resume that helps you stand out to employers, ensuring you land your next position faster!

Check Now