Hi Friends,
If you have any suitable resources please respond to r...@jeevantechnologies.com only * * * * *McLean** VA*** *Information Security Architects* project: Advantage Initiative - a set of nine companywide initiatives fixing current business process and infrastructure problems while providing options to meet a range of future business models. - Assess project requirements related to application security, including correlation with corporate security policy and standards. To include authentication, authorization (what authorization model is required), auditing of critical security related events, administration (provisioning of access rights, recertification of access rights), confidentiality (both at rest and in transit), integrity, and availability. - For COTS scenarios, assess COTS application capability to meet the stated requirements and ability to comply with vetted Freddie Mac patterns for implementation. - For build scenarios, ensure the solution complies with vetted Freddie Mac patterns for implementation. - Identify architectural and other security risks associated with the solution, and compensating controls where necessary. - Define and document the application security architecture for the project solution. - Identify any gaps in existing application security infrastructure to meet project requirements, work with Senior Info Sec architect to identify roadmap solutions. skill: Subject Matter Expert skills: - 4 or more years direct experience in the Information Security Architecture field, with emphasis on application security architecture - Experience with application authentication approaches (e.g. LDAP directory based authentication) - Experience with application authorization approaches (role-based access control, direct entitlements-based) - Experience with application encryption approaches (in transit - SSL/TSL, payload, at rest) - Experience with Web Access Management (WAM) infrastructure, preferably Tivoli Access Manager for eBusiness (TAM) - Strong communication skills, ability to translate and communicate technical security requirements to a nontechnical community - CISSP Certification - Understanding of host security architecture best practices - Understanding of network security architecture best practices *Send resumes for consideration.*** *If you are interested with the above opening please send the below information ASAP* *Email me a copy of your updated WORD formatted resume with the below details….* 1. Full Name (As per SSN): 2. Email Id: 3. Contact number: 4. Availability: 5. Current Location: 6. Relocation: 7. Visa Status (Citizen/G.C/H1B): 8. Expected Rate (OR) Direct Employer details: 9. Total IT Experience: 10. Total US Experience: *Profiles without contact information will not be considered for further processing….* * * Regards, *Rama * *Jeevan Technologies Inc.,* Tel: 732-917-4804 Email: r...@jeevantechnologies.com [image: Jeevan Technologies] Pledge To Perform www.jeevantechnologies.com -- ♫ “A day without laughter is a day wasted” - Charlie Chaplin -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To post to this group, send email to sap-a...@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/sap-abap?hl=en.