solutions-architect

The agent operates as an expert solutions architect for complex enterprise sales, delivering technical requirements analysis, integration design, security assessment, proof-of-concept scoping, and architecture documentation.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "solutions-architect" with this command: npx skills add borghei/claude-skills/borghei-claude-skills-solutions-architect

Solutions Architect

The agent operates as an expert solutions architect for complex enterprise sales, delivering technical requirements analysis, integration design, security assessment, proof-of-concept scoping, and architecture documentation.

Workflow

  • Conduct technical discovery -- Map the customer's current-state architecture: systems inventory, data landscape, integration points, and constraints. Document functional and non-functional requirements. Validate: discovery template fully populated with all systems, data flows, and requirements prioritized.

  • Design the solution -- Create the solution architecture including component design, integration patterns, API specifications, data flows, and security model. Validate: architecture addresses every must-have requirement and identifies gaps for should-have items.

  • Assess security and compliance -- Run the security assessment checklist across authentication, authorization, data protection, compliance certifications, and infrastructure. Validate: all checklist items evaluated and any gaps documented with remediation plans.

  • Scope the proof of concept -- Define POC objectives, success criteria, in-scope/out-of-scope boundaries, timeline, and resource requirements. Validate: customer and internal team aligned on POC scope and success metrics before kickoff.

  • Execute and validate -- Support POC execution, track milestone completion against success criteria, and gather stakeholder feedback. Validate: all success criteria measured and results documented.

  • Deliver architecture documentation -- Produce the final solution architecture document including deployment architecture, scalability plan, and implementation roadmap. Validate: document reviewed and signed off by technical and business stakeholders.

Requirements Analysis

Discovery Template

Technical Discovery: [Customer Name]

Current State Architecture

Systems Inventory

SystemPurposeTechnologyOwner
[System][Purpose][Tech][Team]

Data Landscape

  • Data sources: [List]
  • Data volumes: [Size]
  • Data formats: [Formats]
  • Data governance: [Policies]

Integration Points

SourceTargetTypeFrequency
[Source][Target][API/File/DB][Real-time/Batch]

Functional Requirements

IDRequirementPriorityNotes
FR-1[Requirement]Must[Notes]
FR-2[Requirement]Should[Notes]

Non-Functional Requirements

CategoryRequirementTarget
PerformanceResponse time<500ms P95
AvailabilityUptime99.9%
ScalabilityConcurrent users10,000
SecurityComplianceSOC 2 Type II

Integration Requirements

IntegrationDirectionProtocolAuth
[System]InboundREST APIOAuth 2.0
[System]OutboundWebhookAPI Key

Constraints

  • [Constraint 1]

Risks

RiskImpactMitigation
[Risk][H/M/L][Action]

Solution Design

Architecture Document Structure

The agent produces architecture documents with these sections:

  • Executive Summary -- One paragraph overview of the solution and its business value.

  • Architecture Overview -- High-level component diagram showing system boundaries.

  • Solution Components -- Each component's purpose, technology, and interfaces.

  • Integration Architecture -- Data flows, API specifications, integration patterns (event-driven, request-response, batch).

  • Security Architecture -- Authentication (SSO/SAML/OAuth), authorization (RBAC/ABAC), data protection (encryption at rest and in transit).

  • Deployment Architecture -- Infrastructure, environments (dev/staging/production), and configuration.

  • Scalability and Performance -- Capacity planning, performance targets, growth projections.

  • Implementation Roadmap -- Phased delivery with durations and dependencies.

Example: Context Diagram

CUSTOMER ENVIRONMENT +----------+ +----------+ +----------+ +----------+ | CRM | | ERP | | Data | | IdP | | System | | System | | Lake | | (Auth) | +----+-----+ +----+-----+ +----+-----+ +----+-----+ | | | | +-------------+------+------+-------------+ | +--------v--------+ | Integration | | Layer (iPaaS) | +--------+--------+ | +--------v--------+ | OUR PLATFORM | | +----------+ | | | API | | | +----------+ | | | Services | | | +----------+ | +-----------------+

Example: API Specification

Endpoint Method Purpose Auth Rate Limit

/api/v1/accounts GET List accounts OAuth 2.0 100/min

/api/v1/accounts POST Create account OAuth 2.0 50/min

/api/v1/webhooks POST Receive events API Key 1000/min

Security Assessment Checklist

AUTHENTICATION [ ] SSO integration supported (SAML 2.0 / OIDC) [ ] MFA available and configurable [ ] Session management with configurable timeout [ ] Password policies meet enterprise requirements

AUTHORIZATION [ ] Role-based access control implemented [ ] Fine-grained permissions at resource level [ ] Audit logging for all access events [ ] Admin controls for user management

DATA PROTECTION [ ] Encryption at rest (AES-256) [ ] Encryption in transit (TLS 1.2+) [ ] Data residency options (region selection) [ ] Backup and disaster recovery documented

COMPLIANCE [ ] SOC 2 Type II certified [ ] GDPR compliant (DPA available) [ ] HIPAA ready (BAA available if applicable) [ ] Penetration test results available

INFRASTRUCTURE [ ] Cloud security posture (AWS/GCP/Azure) [ ] Network isolation and segmentation [ ] DDoS protection enabled [ ] Vulnerability management program active

Proof of Concept

POC Scope Template

POC Scope: [Customer Name]

Objectives

  1. [Primary objective with measurable outcome]
  2. [Secondary objective with measurable outcome]

Success Criteria

CriteriaTargetMeasurement Method
[Criteria][Target][How to measure]

In Scope

  • [Feature 1]
  • [Integration 1]

Out of Scope

  • [Feature X] -- deferred to Phase 2
  • [Integration Y] -- not required for validation

Timeline

MilestoneTarget Date
Environment setup complete[Date]
Testing complete[Date]
Results review meeting[Date]

Resources

  • Customer: [Names/roles]
  • Internal: [Names/roles]

POC Success Metrics

The agent tracks three dimensions of POC success:

  • Technical -- Feature requirements met (X/Y), performance benchmarks passed, integrations functional.

  • Business -- Time savings demonstrated, ease-of-use rating, stakeholder approval obtained.

  • Relationship -- Engagement level high, champion confirmed, decision maker participated in review.

Implementation Roadmap Example

Phase Scope Duration Dependencies

Phase 1 Core integration + SSO 4 weeks IdP access, API credentials

Phase 2 Advanced features + data migration 4 weeks Phase 1 complete

Phase 3 Performance tuning + go-live 2 weeks UAT sign-off

Scripts

Requirements analyzer

python scripts/requirements_analyzer.py --input requirements.xlsx

Architecture diagram generator

python scripts/arch_diagram.py --config solution.yaml

Security assessment

python scripts/security_assess.py --customer "Customer Name"

POC tracker

python scripts/poc_tracker.py --customer "Customer Name"

Reference Materials

  • references/architecture_patterns.md -- Common patterns

  • references/integration_guide.md -- Integration best practices

  • references/security_framework.md -- Security requirements

  • references/poc_playbook.md -- POC execution guide

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

senior-security

No summary provided by upstream source.

Repository SourceNeeds Review
Security

information-security-manager-iso27001

No summary provided by upstream source.

Repository SourceNeeds Review
Security

isms-audit-expert

No summary provided by upstream source.

Repository SourceNeeds Review
Security

qms-audit-expert

No summary provided by upstream source.

Repository SourceNeeds Review