What are the responsibilities and job description for the Solutions Architect position at Keyfactor, Inc.?
Title: Solutions Architect
Location: United States; Remote, EST or CST
Experience: IC3
Job Function: Professional Services
Employment Type: Full-Time
Industry: Computer & Network Security
Travel Requirements: <25%
About The Position
The Solutions Architect role will guide Keyfactor’s enterprise customers through implementing and integrating Keyfactor’s solutions into their infrastructure and applications. The position will involve working directly with customers to install the software components and troubleshoot issues when they arise. This role will work with other stakeholders in the business to provide input into the product’s strategic roadmap and support the managed services area of the business.
The position is based in the United States and can be performed remotely. Applicants must hold US citizenship or US permanent resident status.
Responsibilities
- Assist our customers in designing, implementing and taking full advantage of Keyfactor solutions by:
- Partnering with Keyfactor Sales to ensure the customer is delivered the best solution possible
- Leading design workshops with customers and documenting solution designs for customer approval
- Ensuring customers prepare their personnel, systems and processes to take full advantage of Keyfactor solutions
- Act as the primary technical point of contact to deliver Keyfactor solutions efficiently and effectively by:
- Implementing Keyfactor solutions using a collaborative approach that improves adoption with our customers
- Ensuring that our customer’s requests are addressed quickly and to our customers’ satisfaction
- Identifying and mitigating risks related to technical solution design and/or client sentiment
- Partner with cross-functional internal teams to promote continuous improvement by:
- Working with Keyfactor Product teams to identify new feature requests and report bugs
- Actively contributing to the improvement of service delivery processes and methodologies by raising pain points, proposing solutions, and championing new initiatives
- Mentoring and coaching junior team members and providing technical guidance
- Ensuring knowledge gained while implementing customer solutions is relayed across Professional Services
- Increasing team efficiency by documenting common architectures and solutions
Skills & Qualifications
- Minimum 5 – 7 years of experience in customer-facing technical roles within large enterprise IT environments (via services delivery, consulting, or employment)
- Strong and effective communication skills with the ability to communicate at both a technical and business level with technical staff and/or executives
- Flexibility and ability to thrive within a dynamic, rapidly growing company
- Advanced time management and prioritization skills, with experience managing competing priorities
- Proven ability to manage complex technical projects and resolve critical customer issues.
- Technical Competencies:
- Familiarity with Public-Key Infrastructure (PKI), digital certificates, and cryptography
- Experience deploying and configuring Enterprise Certificate Authorities
- Experience with DevOps and automation tools (Ansible, Bash, Jenkins, Puppet)
- Knowledge of Java Application Servers (JBoss, Wildfly) and Relational Database Servers (MySQL, MariaDB, MSSQL)
- Advanced knowledge of Linux operating systems, networking, and IT security principles.
- Advanced, methodical, and expedient technical troubleshooting and problem-solving skills
- Proficiency in containerization platforms (Kubernetes, Docker) with hands-on experience in deploying applications using YAML
- Willingness to learn new languages, technologies, and APIs as needed to meet customer requirements
- Bonus Points:
- Knowledge of EJBCA
- Advanced scripting development using various Microsoft tools (SQL, PowerShell, etc.)
- Proficiency with Windows Server operating systems
- Comprehensive knowledge of Active Directory Certificate Services & Active Directory Federation Services
- Knowledge of Kerberos protocol and other authentication protocols
- Relevant industry certifications
- Existing security clearance