Senior Solution Architect
UiPathFull Time
Senior (5 to 8 years), Expert & Leadership (9+ years)
Key technologies and capabilities for this role
Common questions about this position
NERM (Non-Employee Risk Management) design and deployment experience is required, along with 7+ years of professional work experience in an enterprise software company, systems integrator, or consulting firm, and 5+ years of software implementation experience. Candidates need experience in software development, implementation, and configuration, plus excellent communication skills for working with clients and partners.
Experience with XML, SPML/SOAP, web and application servers, Windows and Unix platforms, relational databases like Oracle and MySQL, NoSQL databases like MongoDB, directories like LDAP and AD, Java, BeanShell, JavaScript Node.js, ERP systems like SAP, and cloud IaaS platforms.
SailPoint offers a fun culture with smart people, innovative work, beautiful offices, and nice colleagues. It's described as the company where everyone wants to work, with awards to prove it, focused on outsmarting cybercriminals and making an impact.
This information is not specified in the job description.
This information is not specified in the job description.
Provides identity security solutions for enterprises
SailPoint provides identity security solutions that help organizations manage and protect digital identities. Its main products, including IdentityIQ, IdentityNow, and File Access Manager, assist businesses in ensuring compliance with regulations, reducing risks, and controlling access to sensitive information. These products work by giving organizations visibility into who has access to what data, allowing them to manage permissions effectively. SailPoint stands out from competitors by utilizing advanced technologies like artificial intelligence and machine learning to enhance its identity governance capabilities. The company's goal is to be a trusted partner for enterprises in navigating the complexities of identity security, ensuring that they can securely manage access to their critical information.