*Hi All,*

*Please check and let me know*


*Kindly mail me at nik...@apetan.com <nik...@apetan.com>*


*Title: Information Security Architect*

*Location:  Denver, Colorado *



*Duration: 6 months (Contract)  Phone/ Skype *

An information security architect has all the same analysis, design, and
communication skills as a senior engineer and focuses on providing system
wide solutions. Where an engineer may identify one or two valid solutions
to a problem, an architect will identify a family of solutions and be able
to select the best technical approach for the situation. An architect must
be familiar with all the security technologies, solutions, and approaches
in common use, and know how to tailor the best approach uniquely. An
architect may be required to develop and implement a system wide approach
to securing an entire network or data center of information system that is
unique and goes beyond existing solutions. Architects develop detailed
security standards and procedures that ensure an agency meets security
requirements and policies. Architects have extensive industry knowledge and
experience with more than one technology. They understand the offerings of
all the major vendors in a particular field.



Architects will take on information security work that involves a high
level of management and communications skill as well as a high depth and
breadth of skill. They must be able to work effectively with broad
direction in situations that may not be well defined. People at this level
may work with technical, administrative and physical security controls or
investigations, or may be involved in developing and implementing security
projects, policies, standards or business processes.





*Senior Security Architect*



*Responsibilities:*

   - Designs Solution for integration of IT solutions with:
   - Applicable Federal or State Requirements, including IRS Publication
   1075 and USDOL
   - NIST and OIT standards
   - Other applicable CDLE business program security requirements
   - Maintains a mastery of IT theories, principles, concepts, standards,
   security requirements, security architecture and practices sufficient to
   develop new theories, concepts, principles, standards, security
   requirements, security architecture and methods in IT security; to advise
   other IT experts throughout Cybersecurity or in other MITS areas on a
   variety of situations and issues that involve applying or adapting new
   theories, concepts, principles, standards, methods, or practices.
   - Serves as senior expert to top management offering design solutions
   for integrating IT software solutions, security access and validating IRS
   security requirements.



*Qualifications:*

   - Individual should hold a Bachelor’s Degree in Information Assurance or
   a related major.
   - 10+ years of related experience is required.
   - Individual should hold one of the following certifications: Certified
   Information System Security Professional (CISSP); Certified Information
   Security Auditor (CISA); Certified Information Security Manager (CISM) or
   equivalent Information Assurance Certification.
   - Has a mastery of IT policy, security requirements, security
   architecture and planning concepts, methods, and practices; and/or IT
   security theories and concepts, practices and emerging issues; and/or
   software engineering theories, concepts, and practices; and/or state of the
   art Internet technologies, methods, standards, and issues (security,
   privacy, accessibility)
   - Project management methods and concepts sufficient to represent IRS on
   interagency work groups established to develop government wide IT policy
   initiatives.
   - Specialized experience shall include expertise in these areas:
   Auditing, Access controls, Requirements development, Requirements testing,
   Application code (C, JAVA, ALC, Oracle, etc.) Tier 2 (Linux, Solaris),
   penetration testing, security assessment and authorization (SA&A), security
   engineering, and security risk assessment.
   - Validate architect and support single signon and 2 factor
   authentication standards.
   - Skills with Guardium, ArcSight, Informatica or Rationale
   Tools/Software would be ideal, but not required.
   - FISMA experience is HIGHLY desired.
   - Work closely with the Engineering team at the technical level to
   ensure that all of the software is in compliance with the security
   architecture

Thanks

Nikhil Prasad

nik...@apetan.com

201-620-9700*130

Apetan Consulting LLC

-- 
You received this message because you are subscribed to the Google Groups 
"Citrix and Sap problems" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to citrix-and-sap-problems+unsubscr...@googlegroups.com.
To post to this group, send email to citrix-and-sap-problems@googlegroups.com.
Visit this group at https://groups.google.com/group/citrix-and-sap-problems.
For more options, visit https://groups.google.com/d/optout.

Reply via email to