*Hi Partners,*
**
*Greetings,*
**
*Hope you are doing Well!!!!!!!!!!!!!!!*
**
*Please forward a profiles to
**shan...@techconsultinc.com*<shan...@techconsultinc.com>
**
*Here are the requirement details*



Start Date:7/6/09

Location: Windsor, CT

Title: Network Security Architect

Description:

Own the long-term architecture of the Information Security Solution from the
Application perspective. Evolve a rolling 3 year technical strategy and
maintain corresponding Roadmaps. Promote Information Security solutions and
building blocks in all I relevant initiatives. Makes independent, creative
technical contributions related to implementing interface and infrastructure
designs from the security perspective, ensuring coherence across
applications and services. Analyzes business models and maps/integrates
security components into a unified infrastructure construct using a risk
management approach. Ensures that Information Security is embedded into the
IT services, applications and applications from the security architecture
perspective, works closely with Project Managers, Architecture, Application
Development, Risk Management, Security Monitoring, and Security Operations
teams.

Infrastructure

Network Communications

Application Design (including SaaS Security) XML Appliances (Schema
Validation, Authentication, etc) Operating Systems (Unix, Windows,
Mainframe) Authentication (Active Directory, LDAP, IWA, SSO, IDM, Kerberos)
Key Management Multifactor Authentication (Consumer, 802.1x, OTP)

Security Monitoring

Support tools (Cristal Reports, Share Point) Security Information and Event
Management (ArcSight, Symantec) Host Intrusion Prevention (Third Brigade,
ISS) Database Security Monitoring (Guardium, Access Control) Security
Operation Center (Balance Scorecard, Dashboard, KRI)

Development Tools

Database Security (Oracle, MSSQL, Sybase, UDB) Data Protection (DLP, Data
Masking, Data Obscuring) SAML 1.1 and 2.0 (Federation and Delegation) WS
Security

C++, JEE, VB, C# (Best practices OWASP, OASIS)

JAX-WS, EJB, AJAX

Integrate Fire-ID & Privilege Usage Control (Fortefi, Power Broker, Cyber

Ark)

Education: Bachelor's Degree in Computer Science, Engineering, or a directly
related field. Master Degree preferred.

Certifications: CISSP (Required), CISSP-ISSAP (Preferred), MSSD (Required),
CEH (Preferred) CISM (Desired), MSSE (Desired),

Location: CT Relocation offered: No

Does the incumbent in this job have direct accountability for staff
supervision/management? No Does the incumbent in this job have budget
accountability? No

Is travel expected to perform this job? Yes If so, what percentage of
time will be spent traveling? 25%

Thanks
Shankar
248-522-6879

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To post to this group, send email to SAP-ABAP@googlegroups.com
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/SAP-ABAP
-~----------~----~----~----~------~----~------~--~---

Reply via email to