Recovery Solution Architect Post Sales

Company Name:
SunGard
# Description
__About the Position:__
The Recovery Solution Architect (RSA) is responsible for working with Sungard's customers in a collaborative and consultative manner to develop, document and implement complex DR solutions. The ideal candidate is skilled in virtualization technologies, managed hosting solution sets and industry trends in DR and Cloud computing.
The RSA is responsible for:
Developing and validating solution architectures that will enable Sungard's customers to recover their business applications in the appropriate RTO/RPO values.
Being the single point of ownership for the customer solution during transition and lifecycle.
Providing technical leadership to SME's and Sungard customers.
The RSA will conduct customer engagements in a collaborative manner.
The RSA will coordinate technical resources on the engagement.
Develop customer facing architecture and recovery strategy documentation.
Ensure a successful fail-over and fail-back of the customer's application during transition.
Provide thought leadership in the area of DR.
During customer engagements, the RSA leads client discovery toward development of comprehensive, application centric Solution Architectures, recovery strategies and with help of SME's detailed recovery procedure documentation (RPD) by a team of Procedure Documentation specialists.
Execution of RPD during recovery tests validates RSA solution design, while delivering a highly successful client recovery test experience.
This diverse and technically talented team of Recovery Solution Architects consists of experts across Multiple Platforms, Operating Systems, Storage Configurations, Backup Technologies, and Network Topologies and Protocols.
__Required Experience__
Do you have what it takes? We are looking for a solid blend of the following skills. At least 10 years of experience architecting enterprise solutions from concept to actual build out and operation.
_Required Technical Competencies_
Advanced knowledge Multi-Tier Application architecture design
Skilled at gather requirements for Solution Design
VMWare ESX and associated DR capabilities
Backup and Storage solutions to include physical and virtual environments. At least one of the following backup solutions:
CommVault, Netbackup, Tivoli Storage Manager, Networker and Data Domain
Specific knowledge of Applications and best practices related to backup/restore and
Specific knowledge of Databases and best practices related to backup/restore
Oracle and MS-SQL technologies
Must have the ability to analyze technical documentation and identify gaps/risks
Strong written skills to produce technical documentation is a MUST
Skilled in Visio, MS Word & Powerpoint
Ability to lead technical working sessions
Comfortable running workshops and presenting to customers
Strong knowledge of network and systems design principles including routers, switches, firewalls and load balancers
Infrastructure services recovery to include DNS, Active Directory and other Directory Services implementations
Proficient in on the following virtualization.
VMware ESX, Microsoft's Hyper-V, VMM, & Virtual Server, Xen, Solaris Zones, LDOMs or AIX LPAR/MPAR)
Proficient in one of the following:
RHEL/CentOS versions (4, 5, 6)
Windows 2003/2008
AIX
Solaris
__Additional Preferred Technical Competencies:__
RDBMS Recovery (MS SQL Server, Oracle)
At least one of the following backup technologies: CommVault, NetBackup, Tivoli Storage Manager (TSM), Networker , Data Domain
Proficient in at least one of the following replication technologies: EMC Avamar, Hitachi TrueCopy, EMC HomeBase, FalconStor , EMC RecoverPoint, IBM Global Mirror
__Education__
Bachelor''s degree in Engineering, Computer Science, or related technology discipline preferred, but not required
__Other:__

Willing to travel 25-40% of the time
Req Number: 4881812

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.