Hi Friends,


If you have any suitable resources please respond to
r...@jeevantechnologies.com only

* *

* *

*McLean** VA***

*Information Security Architects*

project:                 Advantage Initiative - a set of nine companywide
initiatives fixing current business process and infrastructure problems
while providing options to meet a range of future business models.

                - Assess project requirements related to application
security, including correlation with corporate security policy and
standards.  To include authentication, authorization (what authorization
model is required), auditing of critical security related events,
administration (provisioning of access rights, recertification of access
rights), confidentiality (both at rest and in transit), integrity, and
availability.
                - For COTS scenarios, assess COTS application capability to
meet the stated requirements and ability to comply with vetted Freddie Mac
patterns for implementation.
                - For build scenarios, ensure the solution complies with
vetted Freddie Mac patterns for implementation.
                - Identify architectural and other security risks associated
with the solution, and compensating controls where necessary.
                - Define and document the application security architecture
for the project solution.
                - Identify any gaps in existing application security
infrastructure to meet project requirements, work with Senior Info Sec
architect to identify roadmap solutions.

skill:                 Subject Matter Expert
skills:

                - 4 or more years direct experience in the Information
Security Architecture field, with emphasis on application security
architecture
                - Experience with application authentication approaches
(e.g. LDAP directory based authentication)
                - Experience with application authorization approaches
(role-based access control, direct entitlements-based)
                - Experience with application encryption approaches (in
transit - SSL/TSL, payload, at rest)
                - Experience with Web Access Management (WAM)
infrastructure, preferably Tivoli Access Manager for eBusiness (TAM)
                - Strong communication skills, ability to translate and
communicate technical security requirements to a nontechnical community
                - CISSP Certification
                - Understanding of host security architecture best practices
                - Understanding of network security architecture best
practices

*Send resumes for consideration.***





*If you are interested with the above opening please send the below
information ASAP*



 *Email me a copy of your updated WORD formatted resume with the below
details….*



1.      Full Name (As per SSN):

2.      Email Id:

3.      Contact number:

4.      Availability:

5.      Current Location:

6.      Relocation:

7.      Visa Status (Citizen/G.C/H1B):

8.      Expected Rate (OR) Direct Employer details:

9.      Total IT Experience:

10.    Total US Experience:



*Profiles without contact information will not be considered for further
processing….*

* *





Regards,



*Rama *

*Jeevan Technologies Inc.,*

Tel: 732-917-4804

Email:  r...@jeevantechnologies.com

[image: Jeevan Technologies]
    Pledge To Perform



www.jeevantechnologies.com




-- 

♫ “A day without laughter is a day wasted” - Charlie Chaplin

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To post to this group, send email to sap-a...@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sap-abap?hl=en.

Reply via email to