>
> Hi,
>>
>> Hope doing great…!!!
>>
>> I have an urgent requirement below, please go through it and  share your
>> updated profile ASAP at *a
>> <dee...@sysmind.com>m...@zenithtechsolutions.com
>> <m...@zenithtechsolutions.com>*
>>
>>
>>
>>
>> The Enterprise Security Architect will work as a member of the
>> Information Security team whose team is focused on improving
>> decision-making through collaboration with management, staff and customers
>> on technology strategy, enterprise architecture, and investments in
>> strategic technology.
>>
>> The individual provides overall direction, life cycle management and
>> leadership for all Information Security architecture and technology. The
>> individual performs the lead role in the identification, analysis,
>> evaluation, life-cycle management and adoption of security technologies.
>> The Security Architect is a key consultant regarding security features of
>> technologies in the corporate environment, working closely with other
>> security functions to ensure that there is coordination with their
>> activities in technology choices.?
>>
>> *Essential Job Function*
>>
>>    1. Provide strategic consultation to business customers in defining
>>    or designing business processes, functions and organizational structures,
>>    as well as in researching, identifying and internally marketing enabling
>>    technologies based on customer capability requirements. Facilitate
>>    development of enterprise business solutions that combine knowledge of
>>    particular business processes and issues, general technological options,
>>    and process facilitation techniques. Participate in enterprise strategy
>>    development, including environmental analysis, opportunity identification,
>>    value cases and business innovation portfolio development.
>>    2. Specifies and designs large or complex systems, solutions,
>>    networks, infrastructure elements, or processes. Selects appropriate 
>> design
>>    standards, methods and tools and ensures that they are applied 
>> effectively.
>>    Reviews others' system design to ensure selection of appropriate
>>    technology, efficient use of resources and integration of multiple systems
>>    and technology. Establishes policy for selection of architecture
>>    components. Evaluates and undertakes impact analysis on major design
>>    options. Ensures that the system architecture balances functional, service
>>    quality and systems management requirements.
>>    3. Uses appropriate tools, including models of components and
>>    interfaces, to contribute to the development of architectures. Produces
>>    detailed component requirements, specifications and translates these into
>>    detailed solutions/designs for implementation using selected products.
>>    Provides advice on technical aspects of system development, integration
>>    (including requests for changes, deviations from specifications, etc.) and
>>    processes. Ensures that relevant technical and business strategies,
>>    policies, standards and practices are applied correctly.
>>    4. Selects and uses tools and methods to establish, clarify, and
>>    communicate the functional and non-functional requirements of system 
>> users,
>>    their characteristics, and tasks. Identifies the technical, 
>> organizational,
>>    and physical environment in which complex products or systems will 
>> operate.
>>    Identifies, proposes, initiates, and leads significant improvement
>>    programs, taking responsibility for the quality and appropriateness of the
>>    work performed and the realization of measurable business benefits.
>>    Modifies existing process improvement approaches and/or develops new
>>    approaches to achieving improvement.
>>    5. Ensures the resolution of a variety of architecture and business
>>    problems and serves as a technical or business lead for highly complex
>>    project initiatives.
>>
>>
>>    - Communicates effectively will all levels of organization
>>    - Manages expectations of customers, partners and management
>>    - Participates in customer walkthroughs and plans; design and
>>    technical walkthroughs; and problem resolution and decision making
>>    - Interacts with departments across the organization as necessary,
>>    including the development and interpretation of highly complex 
>> requirements
>>    for peers and other staff.
>>
>> 6. Maintains an in-depth knowledge of specific technical aspects in area
>> of expertise and provides expert advice regarding their application. The
>> area of specific expertise may be any aspect of information or
>> communication technology, technique, method, process, product, or
>> application area.
>>
>> 7. Provides leadership and mentoring in the areas of expertise and
>> architecture to their peers, developers, management and business users
>> including technical expertise, coaching, and ad-hoc training by:
>>
>>    - Preparing presentations on complex issues on the area of expertise
>>    - Presenting to their peers to ensure consistency to Highmark's
>>    strategic direction.
>>
>> *Required Qualifications*
>>
>>    - Bachelor's Degree
>>    - At least six (6) years of experience architecting solutions with a
>>    concentrated focus on security, performance, scalability, and reliability.
>>    - At least three (3) years of experience with security technologies,
>>    such as intrusion detection/prevention, event correlation, firewall,
>>    antivirus, anti-spam, policy enforcement, patch/configuration management,
>>    audit, secure application development.
>>    - Expertise in data-protection mechanisms including an in
>>    understanding of cryptographic algorithms such as AES, 3DES, RSA, ECC, SHA
>>    etc.
>>
>> *Preferred Qualifications*
>>
>>    - Master's Degree
>>    - Expertise in data-protection software and hardware solutions
>>    including Application, Database, and File level encryption and 
>> tokenization
>>    solutions
>>    - Big Data Security including Hadoop security and emerging
>>    technologies such as im-memory and NoSQL
>>    - Strong experience in Threat Modeling of complex security systems
>>    - Experience in delivering comprehensive architecture specifications
>>    for complex security?.
>>    - Thorough understanding of the security controls provided in common
>>    platforms and applications in the corporate environment including, but not
>>    limited to, Unix, Linux, Windows, IBM Mainframe (zTPF, MVS), Oracle, MS 
>> SQL
>>    Server Microsoft Outlook, J2EE applications.
>>
>> Experience with applicable control frameworks and compliance mandates
>> like PCI, FISMA, HIPAA, and CoBIT is highly preferred
>>
>>
>>
>>
>>
>
>> *Amith*
>>
> *Sr. Recruitment Manager*
>>
>> *Zenith tech Solutions*
>> *Desk: **518-621-004* <518-621-0048>*6*
>> *Fax: **518-244-4977* <518-244-4977>
>> *3 park Hill*
>>
>> *Albany, NY 12204*
>> *zenithtechsolutions.com <a...@zenithtechsolutions.com>*
>>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"Citrix and Sap problems" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to citrix-and-sap-problems+unsubscr...@googlegroups.com.
To post to this group, send email to citrix-and-sap-problems@googlegroups.com.
Visit this group at https://groups.google.com/group/citrix-and-sap-problems.
For more options, visit https://groups.google.com/d/optout.

Reply via email to