Software Architecture - Advisor
Role details
Job location
Tech stack
Job description
DUTIES: Collaborate on integrating employee data from the Workday system into the SAP Concur tool and resolve issues related to SAP Concur expense reports. Design batch jobs to extract credit card data from various bank vendors and upload this information into SAP S/4 HANA as well as the SAP Concur Employee Master Profiles. Conduct quarterly scans on each application and create real-time reconciliation reports to compare actual transactions against estimated obligations for ACH credit/debit files, incoming wires, and network credit/debit for the Treasury Business team. Engage in Disaster Recovery (DR) exercises, develop and support weekly and monthly HR Data Reports, and implement encryption methodologies for sensitive data in accordance with Fiserv's cybersecurity guidelines.
Requirements
REQUIREMENTS: Bachelor's degree in Computer Science, Information Systems or a related field and 4 years in any job title involving SAP Concur configuration and .Net experience. Prior experience must include: 4 years working in .NET Core, C#, Angular, TypeScript, SSIS, Power BI, and SQL Server; 4 years designing and implementing in Console Applications; 4 years working in SAP Concur Expense Reports and SAP Concur User Profiles; 4 years working with Restful APIs and API gateways; 4 years working in Harness, Gitlab and Nexus; 4 years working in containerization with applications deployed on Docker or Kubernetes; 4 years working in TFS and Git; 4 years working with Quality and Security scan tools including Sonar, Fortify and Web Inspect; 4 years working with CI/CD pipeline and related open-source tools including Jenkins, GitLab, or SonarQube; 4 years working with Agile or DevOps methodologies; 4 years of unit test using MS Test and N-Unit; 2 years working with any cloud providers including AWS or Azure; 2 years working with Sterling File Gateway (SFG) file transmission methodologies and cyber vulnerabilities; and 2 years working with Encryption methodologies including Voltage Encryption.