• Facilitate and drive solution review session
• Study and Evaluate technical requirement including TOR
• Compare and Validate between Presale’s solution and Customer requirement
• Ensure the delivery plan with the identified timeline
• Clarified the owner of after-sale process both Insource and Outsource
• Consult to clarify the Project’s risks with Risk Mitigation to have Risk Register Cost
• Ensure corporate governance guideline are adhered
• Prepare summarized report with approval on Solution Review Result and handover to EFRM
• Note:
• Telecom team is responsible for EDS, Data Center, IoT, 5G and Mobile Product
• Non-Telecom team is responsible for Cloud both Public (MS, AWS, Google, HW, Oracle) & Private, ICT (Server, IT Infra, CCTV, Wi-Fi, etc.), Security and SW development Product
Bid Review and Evaluation:
Conduct thorough technical and commercial evaluations of bids, ensuring compliance with RFP/RFQ requirements.
Assess the technical feasibility, scalability, and security implications of proposed solutions.
Analyze commercial proposals, identifying potential risks and opportunities.
Prepare detailed evaluation reports, highlighting key findings and recommendations.
Risk Management:
Identify, assess, and mitigate risks associated with enterprise solution projects.
Develop and implement risk management strategies, including contingency planning.
Monitor and track risk mitigation measures, ensuring timely updates and adjustments.
Conduct regular risk assessments to proactively identify emerging threats.
Solution Architecture:
Collaborate with technical teams to review and validate proposed solution architectures.
Ensure alignment with organizational standards, best practices, and security guidelines.
Identify potential technical challenges and propose innovative solutions.
Vendor Management:
Evaluate vendor capabilities and performance, ensuring they meet organizational requirements.
Build and maintain strong relationships with key vendors.
Negotiate contracts and agreements, safeguarding organizational interests.
Compliance and Security:
Ensure adherence to relevant industry standards, regulations, and compliance frameworks.
Conduct security assessments and audits to identify and address vulnerabilities.
Promote a strong security culture within the organization.