*Hi Partners,* ** *Greetings,* ** *Hope you are doing Well!!!!!!!!!!!!!!!* ** *Please forward a profiles to **shan...@techconsultinc.com*<shan...@techconsultinc.com> ** *Here are the requirement details*
Start Date:7/6/09 Location: Windsor, CT Title: Network Security Architect Description: Own the long-term architecture of the Information Security Solution from the Application perspective. Evolve a rolling 3 year technical strategy and maintain corresponding Roadmaps. Promote Information Security solutions and building blocks in all I relevant initiatives. Makes independent, creative technical contributions related to implementing interface and infrastructure designs from the security perspective, ensuring coherence across applications and services. Analyzes business models and maps/integrates security components into a unified infrastructure construct using a risk management approach. Ensures that Information Security is embedded into the IT services, applications and applications from the security architecture perspective, works closely with Project Managers, Architecture, Application Development, Risk Management, Security Monitoring, and Security Operations teams. Infrastructure Network Communications Application Design (including SaaS Security) XML Appliances (Schema Validation, Authentication, etc) Operating Systems (Unix, Windows, Mainframe) Authentication (Active Directory, LDAP, IWA, SSO, IDM, Kerberos) Key Management Multifactor Authentication (Consumer, 802.1x, OTP) Security Monitoring Support tools (Cristal Reports, Share Point) Security Information and Event Management (ArcSight, Symantec) Host Intrusion Prevention (Third Brigade, ISS) Database Security Monitoring (Guardium, Access Control) Security Operation Center (Balance Scorecard, Dashboard, KRI) Development Tools Database Security (Oracle, MSSQL, Sybase, UDB) Data Protection (DLP, Data Masking, Data Obscuring) SAML 1.1 and 2.0 (Federation and Delegation) WS Security C++, JEE, VB, C# (Best practices OWASP, OASIS) JAX-WS, EJB, AJAX Integrate Fire-ID & Privilege Usage Control (Fortefi, Power Broker, Cyber Ark) Education: Bachelor's Degree in Computer Science, Engineering, or a directly related field. Master Degree preferred. Certifications: CISSP (Required), CISSP-ISSAP (Preferred), MSSD (Required), CEH (Preferred) CISM (Desired), MSSE (Desired), Location: CT Relocation offered: No Does the incumbent in this job have direct accountability for staff supervision/management? No Does the incumbent in this job have budget accountability? No Is travel expected to perform this job? Yes If so, what percentage of time will be spent traveling? 25% Thanks Shankar 248-522-6879 --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To post to this group, send email to SAP-ABAP@googlegroups.com To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/SAP-ABAP -~----------~----~----~----~------~----~------~--~---