What are the responsibilities and job description for the Solutions Architect position at Fedtec?
Statement of Work
Senior Technical Analyst Position
Position Overview : This position requires an exceptional individual to serve as a Senior Technical Analyst, working directly with technical leadership to drive innovation and transformation across enterprise systems and processes. The role demands a versatile professional who can seamlessly integrate multiple technical disciplines while maintaining strategic alignment with business objectives.
Primary Responsibilities :
1. Technical Integration & Analysis
Synthesize solutions across network infrastructure, software development, and enterprise architecture
Analyze complex technical challenges and propose comprehensive solutions
Bridge gaps between technical implementation and business requirements
Evaluate and optimize existing technical processes and systems
2. Strategic Planning & Execution
Support the development and implementation of technical strategies
Execute tactical plans under strategic guidance
Assess project requirements and determine optimal execution paths
Identify and mitigate technical roadblocks
3. Cross-functional Collaboration
Work directly with OIT and agency stakeholders
Interface with various technical teams and business units
Translate complex technical concepts for diverse audiences
Build and maintain relationships with key stakeholders
Required Qualifications
1. Cognitive & Analytical Capabilities
Exceptional analytical and problem-solving abilities
Demonstrated capacity for complex systems thinking
Superior pattern recognition and synthesis skills 1 of 3
Ability to quickly grasp and apply new concepts
2. Technical Expertise
Broad knowledge across multiple technical domains :
Network infrastructure and architecture
Software development and engineering
Enterprise architecture
System integration
Understanding of enterprise IT operations
Experience with technical decision-making processes
3. Strategic Competencies
Clear understanding of strategic vs. tactical approaches
Ability to identify and prioritize critical path items
Experience in solution architecture and design
Capacity to balance immediate needs with long-term objectives
Professional Attributes
Exceptional learning agility and intellectual curiosity
Strong attention to detail while maintaining big-picture perspective
Ability to work under guidance while developing autonomous capabilities
Excellent communication skills across technical and non-technical audiences
Success Criteria
1. Demonstrated ability to :
Quickly grasp complex technical concepts
Execute within established strategic framework
Provide innovative solutions to technical challenges
Build effective working relationships across the organization
2. Progressive development in :
Strategic decision-making capabilities
Technical leadership skills
Enterprise-wide perspective 2 of 3
Autonomous problem-solving
Working Environment
Fast-paced, innovative technical environment
Exposure to enterprise-level systems and processes
Collaborative team structure with clear leadership guidance
Opportunity for significant impact on organizational success
This position requires an individual who can thrive in a complex technical environment while developing the skills and understanding necessary for enterprise-level technical leadership. The successful candidate will demonstrate exceptional intellectual capabilities, broad technical understanding and the ability to align tactical execution with strategic objectives.
Location Requirements
Candidate must be local or willing to commute or relocate.
No preference
Additional Location Details (City, State) :
Information Security Training
Information on Security Training
NOTICE : If you are hired as vendor staff who will have access to state systems or data or as a contractor for one of the state executive branch consolidated agencies, in adherence to Colorado Revised Statute 24-37.5-401, 403, 404, 405, and 406, and Colorado Information Security Policy (CISP) 002, you will be required to self-register and complete information security training, including but not limited to review and acknowledgement of the Acceptable Use of State Data and IT Resource Policy (AUP) (CISP-018), through the consolidated agency contractor information security training site within 30 days of your contract start date and annually thereafter. Should you be awarded this contract, the state agency will provide the contractor information security training site information to you.
Background Verification
Minimum Verification Requirements
Please complete the following verifications with Info Cubic upon candidate's selection. Additional verifications may be identified by the agency.
State Criminal Record verification (past 7 years covering each State in which the candidate has resided)
- County Criminal Records (past 7 Year Address History)
Federal Criminal Records Verification (past 7 years)
SSN Name Search
Global Monitor Check (formerly Patriot / OFAC / Terrorist)
Suppliers Only)
To order, click on the link to the right :
Order the OIT Background Verification
Qualification
Required