URGENT NEED: Infrastructure Security Architect - El Segundo, CA - 1+ Year Contract
Hi folks, Hope all is well.. Please share your consultant resume to *kk...@ayrglobal.com <kk...@ayrglobal.com>* *Job Role: Infrastructure Security Architect* *Location: El Segundo, CA* *Duration: 1+ Year Contract* *Job Description:* Infra Security Consultant Wipro seeks Security Consultant to provide building solutions to address specific customer needs. In this position, you will be working with technology experts in a number of areas.The DirecTV Cyber security programme would encompass a number of work streams running to deliver capability improvements in all the major areas of services including threat intelligence, malware protection, vulnerability management, security monitoring, and compliance incident response. *Responsibilities: -* The ideal candidate should be self-driven and have a good experience in the Security aspects in the area of network design and planning. The candidate must have strong; Minimum 10-14 years' experience in Security. Extensive exposure on Service Provider environment Network Engineering and Design with a focus on network integration and transformation Risk and Compliance *Excellent communication skills* Candidate needs to work closely with Senior Director on defining strategy and evaluating new products and tools and implementing These work streams are defined to address outstanding requirements relating to regulatory, audit, risk and business obligations. *The work streams defined are as follows: * Security Perimeter Device Management Infrastructure and security Advertising CDN Cloud Monitoring Controls. Improve Discovery Maturity *Soft Skills Requirements:* Ability to present topics in a clear and concise manner to many levels of technical skill sets for varying audience Good Training skills. Good presentation Effective collaboration and teaming with multiple internal teams *Best Regards,* *Kaazmi Kahn - Recruiter* *AYR Global IT Solutions Inc.* *1431 Opus Pl, Suite 110, Downers Grove, IL - 60515* *Direct: (281) 670-9343 | Email: kk...@ayrglobal.com <kk...@ayrglobal.com>* -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Fwd: Very urgent:: Infrastructure Security Architect ::El Segundo, CA
Hi We have an urgent requirement from our client. Please share resume with us ASAP. You can even call upon 609-897-9670 Ext 5123 or share resume at maya...@sysmind.com *Role:: Infrastructure Security Architect* *Location : *El Segundo, CA *Job Description :* Security Consultant to provide building solutions to address specific customer needs. In this position, you will be working with technology experts in a number of areas. The DirecTV Cyber security programme would encompass a number of work streams running to deliver capability improvements in all the major areas of services including threat intelligence, malware protection, vulnerability management, security monitoring, and compliance incident response. Responsibilities: - The ideal candidate should be self-driven and have a good experience in the Security aspects in the area of network design and planning. The candidate *must* have strong; Minimum 10-14 years’ experience in Security. · Extensive exposure on Service Provider environment · Network Engineering and Design with a focus on network integration and transformation · Risk and Compliance · Excellent communication skills · Candidate needs to work closely with Senior Director on defining strategy and evaluating new products and tools and implementing These work streams are defined to address outstanding requirements relating to regulatory, audit, risk and business obligations. The work streams defined are as follows: - Security Perimeter Device Management - Infrastructure and security - Advertising - CDN - Cloud - Monitoring Controls. - Improve Discovery Maturity *Soft Skills Requirements:* · Ability to present topics in a clear and concise manner to many levels of technical skill sets for varying audience · Good Training skills. · Good presentation · Effective collaboration and teaming with multiple internal teams Mayank Gupta | SYSMIND, LLC [image: Description: Description: https://newoldstamp.com/editor/profilePictures/profile-b15c8fc3ea4630e2ca604f11e3e951c7-41898.png] Phone: 609-897-9670 x 5123 Email: maya...@sysmind.com Website: sysmind.com Address: 38 Washington Road, Princeton Junction, NJ 08550 -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Security Architect
Hi Please let me know your interest for this position Reply back with expected hourly rate Interview Mode-Phone/Skype Location: Columbia, SC Duration: 12+ months Rate: Open Job Description The Information Security Architect will report to the Office of Information Assurance and operate as an experienced consultant to client leadership, business units, business partners and vendors. Security Program Experience: Experience with CMS MARS-E or other FISMA Risk Management Framework (RMF) compliant programs is strongly desired and will be given the highest weight. Experience should include well documented success in the performance of security focused processes and procedures supportive of a secure, compliant enterprise architecture. Experience with development and integration of RMF tasks and artifacts into the System Development Life Cycle (SDLC) is ideal. Experience in security as related to multi-tenant, cloud services and vendor interface management would be considered desirable for this position. Technical Knowledge: Hands on experience with any or all of the following technologies would be considered a desirable for this position: · IBM System 390/zSeries · Linux and Windows servers · Network Firewalls, Intrusion Prevention Systems (IPS), Switching and Routing Infrastructure · Security Information and Event Management (SIEM) solutions · Identity and Access Management (IAM) solutions General Duties and Responsibilities: · Assist in the design, development, implementation and/or ongoing maturation of SCDHHS security and compliance solutions · Provide hands-on support of SCDHHS Systems and Software · Participate in audit and assessment of internal agency systems as well as business partner/service provider information systems. · Utilize Microsoft Office software suite, eGRC system, Bizagi, Atlassian and other products to document and report on information gathered during Audit and Assessment activities or other OIA efforts. · Participate in third-party audits and/or assessments of agency and business partner systems · Collaborate with agency leadership, business partners and other parties/stakeholders to provide recommendations for security and compliance risk mitigation efforts. Required Certification: ISC(2), ISACA, SANS GIAC, or other similar Information Security Certification is required. Education Preferred: Bachelor’s degree in computer science or similar discipline is preferred. Thanks Archit Archit Jain Software People Inc. <mailto:bhaskar.nain...@softwarepeople.us> archit.j...@softwarepeople.us Ph: 631-739-8782 © Fax: 631-574-3122 Gtalk: ajain0102 Certifications: NY MWBE, VA SWaM, DE OMWBE, MA MWBE -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Cloud Security Architect- Bellevue, WA
Hi *Sekhar* here from *METASIS INFORMATION SYSTEMS,* one of our client has an opening for *Cloud Security Architect* Below is the job description for your reference, do go through it and let me know your interest. *Title: Cloud Security Architect* *Location: Bellevue, WA* *Duration: Long-term OR Fulltime* *Security Architect: * · 5-8 years’ experience as Security Architect and/or Engineering. · 4+ years of hands-on experience architecting, designing and deploying scalable, multi-tenant public, private, or hybrid cloud solutions · Strong understanding of cloud computing architecture, technical design and implementations, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) delivery models · Practical knowledge of the end-to-end information technology (IT) process, including architecture, design & engineering, implementation, and operations in a secure development lifecycle waterfall, agile and continuous delivery model · Adeptness with information security standards (e.g., ISO 17799/27002, etc.), rules and regulations related to information security and data protection, and Cloud Security Alliance best practices and guidelines · Professional certifications include: IT security (e.g., CISSP) or Cloud Security-related certifications (e.g., vendor neutral (CCSK, Certified Cloud Professional/Architect, etc.) or Cloud vendor certification (VMware VCP, AWS Certified Solutions Architect, Google, IBM, etc.)) · Application of Vulnerability management, other detection, & response techniques while integrating security end-to-end in a fast-paced environment · Familiarity with PCI, SOX and other compliance standards. · Experience with Amazon Web Services, Microsoft Azure, or another related Cloud providers · Skill with migrating applications to Cloud environments · Experience working with cloud security and governance tools, cloud access security brokers (CASBs), and server and network virtualization technologies such as SDN. · Experience with enterprise applications (architecture, development, support, and troubleshooting). · Experience performing threat modeling and design reviews to assess security implications and requirements for introduction of new technologies. · Experience representing technical viewpoints to diverse audiences and in making timely and prudent technical risk decisions. · Experience with enterprise architecture and working as part of a cross-functional team to implement solutions. · Strong interpersonal and communication skills; ability to work in a team environment · Ability to work independently with minimal direction; self-starter/self-motivated Experience with assessment, development, implementation, optimization, and documentation of a comprehensive and broad set of security technologies and processes, data protection, cryptography, key management, identity and access management (IAM), network security within SaaS, IaaS, PaaS, and other cloud environments. · Working knowledge of common and industry standard cloud-native/cloud-friendly authentication mechanisms. Thanks & Regards, Sekhar Email : *sek...@metasisinfo.com* <sek...@metasisinfo.com> -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Looking for Siteminder Security Architect position in Atlanta, GA
Hi Partners, Please share profile at* naseer.ah...@nityo.com <naseer.ah...@nityo.com>* Title: Technology Architect | Server Products | Siteminder Location: Atlanta, GA Target Start Date: Oct 31 Job Details: Modification Comment: More slots are available for submittals. Need profiles of Security architect with skills in IPS , firewall , networking capabilities. *Must Haves – *Skills : *Security Architect position*, Identity access management, vulnerability management, encryption sme, any tools such as siteminder, cyberark Nice to Have/Skills: OOPS concept, customization experience How many years of experience? 9+ years -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Urgent Need // Security Architect // Washington, DC
Hi Business Partners, Hope you are doing great! Please find below mentioned job description and revert back with the updated resume to mahe...@systelinc.com Position: Security Architect Location: Washington, DC Duration: 6+ Months *Required Skills:* Candidate must have demonstrated architecture and control experience working with Amazon Web Services (AWS), to secure workloads. Candidate must have an understanding of OWASP Top 10 and SANS 25 vulnerabilities and how to mitigate these vulnerabilities and an architecture/coding standpoint. Mobile security architecture experience a plus Candidate must have an understanding of the Cloud Security Alliance (CSA), Cloud Controls Matrix and how it can be leveraged for reviews of cloud solutions. *Essential Job Functions:* The contractor will have responsibilities for specific individual tasks and for working as an integral part of the team in executing ITSSR’s work program. The primary responsibilities will include, but are not limited to, a combination of the following Work with project teams to define security requirements for new systems in line with the enterprise information security architecture Provide security design recommendations based on enterprise information security architecture and solution patterns. Provide guidance and assist in the development of security standards for IT platforms in line with the information security architecture Maintain an up-to-date understanding of emerging trends in information security architecture; apply new techniques and trends, in-line with overall information security objectives and risk tolerance of the WBG, to the WBG’s information security architecture Perform controls reviews and system assessments to develop risk profiles for IT systems and evaluate the efficiency and effectiveness of the IT control environment Maintain impartiality around IT systems to produce unbiased reports on information security risk Provide business units with recommendations to reduce information security risk within their areas Identify efficiencies to improve the performance and responsiveness of the ITSSR information security architecture function Prepare and present security design and architectural review reports to system owners, business units and other Evaluate WBG current software security posture and propose mitigation and remediation plans to meet software security assurance requirements Translate technical security deficiencies into business risks that are understandable by business stakeholders in order to get buy-in for security investments *Role Specific Experience: * Minimum two (2 or 2+) years of experience working in an information security, software development, and information risk management related field. *Certification Requirements:* *Required Skills/Abilities:* Demonstrated experience enterprise security architecture design and implementation for a financial services organization or other organizations with similar information security needs and requirements. Extensive knowledge of IT, enterprise architecture, software development life cycle, and information security platforms and applications Ability to work well under pressure and to meet tight deadlines. Demonstrates a high level of motivation, confidence, integrity and responsibility. Knowledge of best practices and standards for enterprise security architecture specifically in the field of Identity & Access Management, Enterprise Content Management, Collaboration Tools, Service-Oriented Architecture, Cloud, Mobility, Data Analytics, and Web 2.0 related services. Experience providing guidance for data protection based on data sensitivity and associated business risk. Practical knowledge of common Web vulnerabilities as per SANS 25 or OWASP Top 10 specifications, and experience guiding project team remediating such vulnerabilities. Industry certifications highly preferred including, but not limited to, Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Global Information Assurance Certification (GIAC), and Information Systems Security Management Professional (ISSMP). Demonstrate excellent interpersonal skills; including the ability to work independently, effectively in a team/task force as a team member or leader, and with senior staff and managers in the unit and elsewhere in the WBG. Ability to collaborate with senior management stakeholders to identify requirements and drive compliance with approved standards. Desired Skills/Abilities (not required but a plus) Level III - 7+ years of experience" Architecture Design and Propose various solution options to the customer for a problem statement. Capacity planning. Implement Security in SDLC. -- *Regards* *Mahesh Kumar* *Resourcing Specialist* *D: 678-261-5215* *mahe...@systelinc.com <mahe...@systelinc.com>* -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe
FOR ONLY GC AND USC :- Identity & Access Management Security Architect cum Consultant @ Bellevue,WA
*Dear Partner,* *Hope you are doing fine !!* *IT SCIENT is a highly recognized provider of professional IT Consulting services in the US.* *Here is our open requirement which can be filled immediately. If you find yourself comfortable ,Kindly respond to this requirement with your consultant resume, contact and current location info to speed up the interview process,Please find the requirement below with my contact and details 510-516-7899 // vi...@itscient.com <vi...@itscient.com> //vicky.kumaritsci...@gmail.com <vicky.kumaritsci...@gmail.com>* *Position: Identity & Access Management Security Architect -Technology Architect / Consultant,* *Work Location:- Bellevue, WA* *Duration :- 6+Months* *Exp : 6 years and above in relevant field* *only GC or US Citizen for this requirment.* *Detailed JD* : Identity & Access Management Security Architect: A candidate at this level will apply advanced subject matter knowledge to solve complex business issues and is regarded as a subject matter expert. Contributes to the development of new solutions, ideas and methodologies. Works on complex problems requires an in-depth evaluation of data, network traffics and configurations. Leads and/or provides expertise to functional project teams and may participate in cross-functional initiatives. Acts as an expert providing suggestions to solutions including process improvements and establishing policies. Exercises significant independent judgment within broadly defined requirements to determine best method for accomplishing tasks at hand. Professionals must work well within a team and be at ease with one or more Identity & Access Management products, including Oracle, CA, Sun, Tivoli and others. A professional with Identity & Access Management domain skills, Implementation and support of one or more of the following IAM tools: - · Hands-on experience with Oracle Identity Manager/Governance or equivalent including: o Provisioning Onboarding o RBAC Authorization models o Strong knowledge of workflows. · Hands-on experience with Oracle Access Manager/Federation SSO or equivalent · Experience in Oracle Access Manager WebGate deployment and Access Policy configuration · Experience in Oracle Federation deployment and Meta Data exchange · Hands-on experience working with Active Directory, Oracle Unified Directory, or any other LDAPs · Expert knowledge and understanding of LDAP concepts with at least few of the following directories: - o Active Directory o Oracle Unified Directory o Oracle Virtual Directory o Sun Directory · XML Gateway and multifactor authentication. · Experience in working on Microsoft Internet Information Server (IIS), Apache Web Servers, Application Servers (WebLogic, WebSphere etc.) · Experience on Custom Auth Schemes, Web Services, Federation/SAML, OAuth etc. *--* Vicky Kumar* | Technical Recruiter* *IT–SCIENT LLC, Fremont, CA, USA* *ll IT-SCIENT - Talent Management Group ll* *ll Phone USA : (510) 516-7899 ll Fax: 877.701.4872* *EMAIL : vi...@itscient.com <vi...@itscient.com> // vicky.kumaritsci...@gmail.com <vicky.kumaritsci...@gmail.com>* *Web: www.itscient.com <http://www.itscient.com/> * -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Network Security Architect
- *Title**:** Network Security Architect* *Location:** Pleasanton, CA* *Term:** Contract* *ONLY LOCALS* *Required Experience:* - Minimum of 10+ years related network engineering and customer support experience. - *Must have architecture, design and deployment experience with Palo Alto Network Firewall**.* - *Extensive hands-on Experience with Checkpoint firewall and Cisco ASA will be a plus.* - *Must have architecture, design and deployment experience with Cisco ISE and Network Admission Control (NAC)* - Must have Solid working knowledge with security tools such as NAC, Antivirus, Firewall, IDS/IPS - At least 5+ years of Data Center experience. - Extensive experience in securing PCI CDE environment · Project Management, Problem Solving, Expert LAN and WAN Knowledge, Complex Network Design and Implementation, Network Troubleshooting, Network Hardware Configuration, Network Performance Tuning, People Management. *Technical Skills* - Thorough understanding of networking technologies, including administration of enterprise routers, switches, firewalls and load-balancers (OSI layers 4-7) · Expertise with Cisco ACE, F5 and Citrix Load Balancers. · Strong OSI layer 2 knowledge and practical experience, including various flavors of STP, ARP, QOS, etc. · Comprehensive knowledge of OSI layer 3 networks and protocols, including broadcast, multicast, anycast concepts, routing, etc. · Expertise with various routing protocols (BGP, OSPF, EIGRP) · Understanding of network security methodologies as a whole, including but not limited to: ACLs, Stateful firewalls, VPNs (tunneling, IPsec, PPTP, etc.) · Fluency with common network admin and intrusion detection tools such as Rancid, OpenNMS, Nagios, Ethereal/Wireshark, Nmap, Nessus, Netflow, etc. · Administrative scripting skills (Perl, UNIX shell scripting) · In-depth knowledge of Cisco IOS, NX-OS, both Cisco Nexus 1K, 2K, 5K 7K and non-Nexus series switches, Cisco routers and other Cisco networking gear. · Solid understanding of data center related technology and collocation environment. · In-depth knowledge of MPLS network. *Professional Skills* · Ability to think and operate as a team player · Extremely strong communication skills, both written and verbal · Experience managing network service and similar support providers in a client/vendor relationship · Ability to operate as independently or as part of collaborative effort - Demonstrate strong project leadership and ability to develop strong working relationships with customer technical personnel. · Strong troubleshooting skills and ability to apply them during business impacting incidents. · Capable of mentor others and lead by example. *Qualifications and **Certifications**:* · *Palo Alto Networks Certified Network Security Engineer (PCNSE) certification is required.* · Bachelor’s degree in a technical field (e.g. Computer Science, IT, or similar disciplines). · Equivalent work experience implementing and operating enterprise level data center and/or office networks. - CCIE security certifications are a big plus. *Minimum Qualifications and **Certifications**:* · *Palo Alto Networks Certified Network Security Engineer (PCNSE) certification is required. * · *Architecture, design and deployment experience a Must!* · *Bachelor’s degree in a technical field (e.g. Computer Science, IT, or similar disciplines).* · *CCIE security certification and equivalent experience preferred!* *Thanks & Regards…* *RK* *Business Development Manager* *Email : r...@systematix-software.com <r...@systematix-software.com>* *Phone: 616-433-1771* -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Direct client Need for Information Security Architect Level 6 in NW, DC
Hello Dear *Information Security Architect Level 6* *Location: NW, DC* *Client: **Government* *Rates: very good* *Information Security Architect Level 6 - Consultant Level 6 13-15 Years* *Complete Description:* Enterprise Security Architect is responsible for developing blueprint for enterprise security architecture. Defines, plans, and applies architectural elements in the analysis, planning, design, implementation, documentation, assessment, and management of the enterprise security architecture that is aligned with IT strategy and agency mission, goals, structure, and processes. Develops security design requirements through sound design methodology, adequate security control application, and effective configuration practices. This role ensures secure architectural solutions are incorporated into every aspect of the enterprise architecture supporting an organization’s key business processes and organizational mission. Provides the interface between the Enterprise Architect and the Information System Security Engineering as detailed in NIST SP 800-37. Architects counter-measures to contain, control and recover from dynamic cybersecurity events. Uses knowledge about current threats to identify flaws and weaknesses in the composition of system designs and defenses for the mission and mission critical data. Specifies solutions and verifies solutions that have been implemented. Rapidly adjusts designs based on new defense, threat, and attack information. Specific Tasks Work involves the analysis, planning, design, implementation, documentation, assessment, and management of the enterprise structural framework to align IT strategy, plans, and systems with the mission, goals, structure, and processes of the organization. Skill Required / Desired Amount of Experience Expertise Rating Knowledge of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defense-in-depth Required 5 Years 3 - Expert Knowledge of defense-in-depth principles and network security architecture Required 8 Years 3 - Expert Knowledge of organization's enterprise information security architecture system. Required 5 Years 3 - Expert Knowledge of the enterprise IT architecture Required 13 Years 3 - Expert Knowledge of communication methods, principles, and concepts that support the network infrastructure Required 5 Years 3 - Expert Knowledge of the organization’s enterprise IT goals and objectives Desired 5 Years Skill in implementing the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise IT architecture Required 5 Years Knowledge of engineering concepts Required 5 Years Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools Required 8 Years Skill in integrating and supporting information system security architecture Required 8 Years CISSP, CISM or similar certification desired Desired Undergraduate degree in Computer Science, Information Technology, or related field Required -- Thank you, Pradeep Kumar Email: pkum...@okayainc.com Phone:631-267-4883 EXT 529 -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
IMMEDIATE INTERVIEW :- Identity & Access Management Security Architect ; Bellevue,WA
*Dear Partner,* *Hope you are doing fine !!* *IT SCIENT is a highly recognized provider of professional IT Consulting services in the US.* *Here is our open requirement which can be filled immediately. If you find yourself comfortable ,Kindly respond to this requirement with your consultant resume, contact and current location info to speed up the interview process,Please find the requirement below with my contact and details 510-516-7899 // vi...@itscient.com <vi...@itscient.com> // vicky.kumaritsci...@gmail.com <vicky.kumaritsci...@gmail.com>* *Position: Identity & Access Management Security Architect* *Work Location:- Bellevue,WA* *Duration: 6+ Months* *Job Description**:* *Identity & Access Management Security Architect: * *Professionals must work well within a team and be at ease with one or more Identity & Access Management products, including Oracle, CA, Sun, Tivoli and others. * *A professional with Identity & Access Management domain skills, Implementation and support of one or more of the following IAM tools: -* *· Hands-on experience with Oracle Identity Manager/Governance or equivalent including:* *o Provisioning Onboarding* *o RBAC Authorization models* *o Strong knowledge of workflows.* *· Hands-on experience with Oracle Access Manager/Federation SSO or equivalent* *· Experience in Oracle Access Manager WebGate deployment and Access Policy configuration* *· Experience in Oracle Federation deployment and Meta Data exchange* *· Hands-on experience working with Active Directory, Oracle Unified Directory, or any other LDAPs* *· Expert knowledge and understanding of LDAP concepts with at least few of the following directories: -* *o Active Directory* *o Oracle Unified Directory* *o Oracle Virtual Directory* *o Sun Directory* *· XML Gateway and multifactor authentication.* *· Experience in working on Microsoft Internet Information Server (IIS), Apache Web Servers, Application Servers (WebLogic, WebSphere etc.)* *· Experience on Custom Auth Schemes, Web Services, Federation/SAML, OAuth etc.* *--* *Thanks,* *Vicky Kumar|| IT-SCIENT || Phone USA : (510) 516-7899 || Fax: 877.701.4872 || Email: vi...@itscient.com <vi...@itscient.com> || Web: www.itscient.com <http://www.itscient.com/> ||* -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
security Architect || Miami, FL
*Hi all * *Job title : security Architect * *Location : Miami, FL * *Duration : 12+ Months Contract * *Manager Notes * *1. Expert experience in PCI (implementation)* *2. Network Segmentation experience* *3. Experience with tokenization * *4. ISA Certification * *-- * *Thanks & Regards* *Ranjith* *Ph:(925) 973- x 232(Off) * *Email: ranj...@allianceit.com <ranj...@allianceit.com>* -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
security Architect || Miami, FL
*Hi all * *Job title : security Architect * *Location : Miami, FL * *Duration : 12+ Months Contract * *Manager Notes * *1. Expert experience in PCI (implementation)* *2. Network Segmentation experience* *3. Experience with tokenization * *4. ISA Certification * *-- * *Thanks & Regards* *Ranjith* *Ph:(925) 973- x 232(Off) * *Email: ranj...@allianceit.com <ranj...@allianceit.com>* -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
PLACEMENT :- Salesforce SFDC security Architect, Owing Mill,MD
*Hello All,* *Hope you are doing fine !!* *Please find the requirement below ; If you find yourself comfortable with the requirement please reply back with your updated resume and I will get back to you or I would really appreciate if you can give me a call back at my contact 510-972-5241 // vi...@itscient.com <vi...@itscient.com> // vicky.kumaritsci...@gmail.com <vicky.kumaritsci...@gmail.com>* *Position: Salesforce SFDC security Architect* *Location: Owing Mill,MD* *Duration: 6+ Months* *Detailed JD :-* - *SFDC security Architect. Experience with SSO Setup and SAML 2.0 to integrate internal and third party applications. * - *Knowledge and experience in Salesforce Encryption and platform encryption. * - *Experience using the Gateway products like Cipher Cloud with Salesforce * - *Solid understanding of Security and sharing model, data structures, data modeling, & database schema is required. * - *Experience in authenticated web service callouts using Two-Way SSL * - *Working knowledge on data masking tools(Ex: Informatica Cloud Test data) * - *Experience in Set up Two-Factor Authentication Login Requirements for Single Sign-On. * - *Experience working with Apex and Visual Force (triggers, classes, test classes, extensions, components). * - *Experience using the Eclipse - Force.com IDE (or equivalent IDE * - - *Minimum five (5) years experience developing and implementing enterprise solutions * - *Minimum three (3) years of Salesforce experience including writing Apex and VF Pages, Triggers * - *Solid understanding of and detailed experience with Salesforce.com architecture and APIs* *· Proficiency in HTML, XML, JavaScript, ASP, SQL, Java or C++, SOAP or REST, and JSON* *· Demonstrated willingness and capability to learn new technologies quickly* *· Burning desire to build great experiences for our customers* *· Familiarity with security standards such as TLS and SSL is required.* *· Ability to analyze complex data or systems issues and to provide actionable recommendations* *· Experience with large enterprise development and release procedures is preferred* *Domain* Salesforce * *--* *Thanks and regards,Vicky Kumar Menon* *|| IT-SCIENT || Phone: 510-972-5241 || Fax: 877.701.4872 || Email:** vi...@itscient.com <vi...@itscient.com> **|| Web:* *www.itscient.com <http://www.itscient.com/>* *||* -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
FW: Job Opening :: .Net Security Architect || Effingham, IL || 6+ Months
*Dear Associate,* Hope you are doing well! We have an excellent opportunity of *.Net Security Architect *in *Effingham, IL* please share your interest at the earliest *Please share resume on an...@tresourceinc.com <an...@tresourceinc.com>* *For your review, Job Description is as follows:* *Position :: .Net Security Architect* *Location:: Effingham, IL* *Duration:: 6+ Months* For H1 candidate Need H1B copy at the time of submission *Required Skills:* Ø Design and implement architectural framework for Security Ø Strong experience of HIPAA compliance implementation Ø Experience with VeraCode Ø Architecture level knowledge of Data Handling which covers - At REST Security (Selected PHI data) , Mask Sensitive Data, In Transit Security, Secure Third Party Integration and Internal Integrations. Ø Architecture level understanding of Database Isolation - which includes - Multi-tennancy & Logical separation of Tenant data Anmol Sharma Technical Recruiter Phone no: 408-709-1760 <+14087091760> EXT: 9699 www.tech-resource.com 1700 Park St, Unit 212, Naperville IL, 60563 |an...@tresourceinc.com -- -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Required::: Security Architect || Austin, TX || 4+ Months...
Dear Associates, Hope you are doing great! *Please reply to **recruite...@exatechinc.com <recruite...@exatechinc.com> * This is Ali Ahmed from Exatech Inc. We have an immediate need for below mention requirement, if you feel that you are a perfect match to this requirement, please forward your most updated resume along with the best time and number to carry out further discussions. Looking forward to hear from you... *Role: Security Architect* *Location: Austin, TX* *Duration: 4+ Months* *Rate: Open* *Minimum Requirements:* *Years* *Skills/Experience* 7 Full-time experience working in the following (or closely related) fields: information security, programming, systems analysis, system design; security architecture; risk assessments, network administration 4 Experience conducting security assessments and/or audits of policies, standards, procedures and technical environment 4 Experience monitoring/analyzing logs, intrusion detection systems, and incident handling 4 Experience utilizing vulnerability and risk management software (i.e. Nessus, Metasploit, Splunk, AppScan, etc.) 4 Experience in business/technical requirements gathering, defining, reviewing and tracing 4 Experience completing systems security certification and accreditation process 4 Experience in governance, risk assurance, and compliance program implementation 4 Experience working with network security, routing protocols, and devices (i.e. routers, switches, firewalls, IPS) 4 Experience in managing Information security related projects to ensure that they meet business and security requirements in a timely and cost effective manner 4 Experience analyzing and defining enterprise, application, and functional roles 4 Experience in defining, reviewing, and analyzing access controls 4 Experience in Validation and Verification 4 Knowledge of information security principles and practices 4 Knowledge of application security support 4 Knowledge of network infrastructure security support 4 Knowledge of Identity Management principles 4 Knowledge of Access Management principles 4 Knowledge of provisioning principles 4 Knowledge of Directory Services principles, including Active Directory, LDAP, Virtual Directory and Proxy Directory 4 Knowledge of High Availability, Load Balancing, Local and Geographic Redundancy and Disaster Recovery Principles 4 Skill in handling multiple tasks, prioritizing, and meeting deadlines 4 Skill in effective oral and written communication 4 Skill in exercising sound judgment and effective decision making 4 Ability to receive and respond positively to constructive feedback 4 Ability to work cooperatively with others in a professional office environment 4 Ability to provide excellent customer service *Preferences:* *Years* *Skills/Experience* 4 Experience in advising, instructing, and documenting security best practices and risk mitigation plans 4 Experience in local, state, and federal standards, guidelines and regulations relating to information security and computer crime 4 Experience in encryption, digital certificates, statistical analysis processes, and risk management methodology 4 Knowledge in National Institute of Standards and Technology (NIST) frameworks and standards 4 Knowledge in hacking techniques and culture 4 Certification in Information Systems Security Professional (CISSP) 4 Certification in one or more of the following areas: · Certified Information Systems Auditor (CISA) · Certification and Analysis Professional (CAP) · Systems Security Certified Practitioner (SSCP) · Certified in the Governance of Enterprise Information Technology (CGEIT) · Certified Information Privacy Professional (4 different versions CIPP IT, CIPP Government and CIPP Canada and only CIPP) · NSA IAM / IEM Certification · SANS GIAC: "Intrusion Prevention", "Incident Handling", "Vulnerability Assessment", “Forensics”, "Risk Management", or "IT Auditor" · Project Management Regards *Ali Ahmed* *Exatech Inc* 4758 Forest Ridge Dr Mason OH 45040 Phone: 513-433-5531 Email: recruite...@exatechinc.com Web: www.exatechinc.com -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Urgent Opening - Data Security Architect - Omaha, NE
Hello, Hope you are doing great. Please review the requirement and if you find it matching your profile then send me your updated resume with best possible rate/HR ASAP. *Role: Data Security Architect * *Location: Omaha, NE* *Duration: 6 Months* Description – Skill Set · Strong knowledge on Data Security Concepts, Sensitive Data Analysis · 8 years in Information Security with at least 5 years is Data Security JD · Support the tokenization/Encryption process set up using Voltage · Strong knowledge of encryption algorithms like AES, SHA , PKCS standards · Strong knowledge of data security standards PCI-DSS, FFIEC etc · Sensitive Data Analysis for new applications that needs be protected · Work with Business users during analysis, design, implementation and issues if any · Monitor the functioning of Voltage Components · Work with the vendor during Tool Upgrade · Work with Voltage support team in case of any issues with the tool · Completely responsible for the Data Security Solution implemented using Voltage · Good knowledge of at least one programming language with the ability to build reusable frameworks · Design and implement data security solutions at multiple level including application, database, data level, field level etc · Deep understanding in Key Management · Experience working the Hardware Security Modules Regards Ashish Gupta 1351 McCarthy Boulevard, Suit 116, Milpitas, CA, USA, 95035 *Phone* : 408-668-9470 *Yahoo, Hangouts* : ashish.recruiter12 *Email* : ashish.gu...@idctechnologies.com *URL* : WWW.idctechnologies.com <http://www.idctechnologies.com/> -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
[Locals Only]REQ : Application Security architect,Detroit, MI[Locals Only]
Hi Folks, Hope you are doing great today!!! Please find the following Direct Client requirement and revert me back with suitable profiles. Revert me back on this mail or reach me at 732 982 5999. Position : *Application Security architect* Location : Detroit, MI Duration : Till 12/31/16 *[Locals Only]* •Strong hands on Platform, Network and Application security •Complete SDLC experience •Security Architecture •Security Assessment •Security Coding •Release management Thanks & Regards. Rocky Sr.Technical It Recruiter ro...@centraprise.com Centraprise Corp Edison , New Jersey. 3 Ethel Rd,Suite # 304. Direct: (732) 982 5999 Ex : 452 Fax :(732) 626 6289 Minority Owned (MBE) Certified -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Need Security Architect in Lansing MI for 12 months
Hi Partner, Please go through the below requirement if you have any consultant please send me the updated profile to *p...@innosoul.com <p...@innosoul.com>* or reach me at *518-504-0086* *Certified Information Systems Security Professional* (*CISSP*) *We are looking for 15+ Years resumes* *Position: Security Architect* *Location: Lansing MI* *Duration: 12 months* *Rate : $180/hr on C2C* Skills Required This position requires the understanding of the business context for enterprise application security technologies. An end-to-end knowledge and understanding of critical system(s) environments, customer business and applicable technologies. Knowledge of cyber security regulations and the cyber security regulatory environment. It requires a high degree of technical skill, initiative, creativity and broad-based understanding of technology areas. All activities require strict adherence to department policies and procedures as well as industry best practices. As a senior position it also involves mentoring, coaching and constant coordination and consultation with fellow architects and administrators within the team, vendors and other teams. This position requires the ability to analyze problems in the environment and provide solutions. This position requires a thorough understanding of peripheral technologies e.g., UNIX, Windows, IP networking, security and audit compliance, enterprise application security and interfaces into the network environment. This position must be able to present complex technical solutions in a business friendly manner, to stakeholders, executive management, vendors, etc. Skills Preferred Experience Required 5+ years as an IT Security Architect or Network Architect 5+ years working in government IT Security roles CISSP certification is required. Experience Preferred Education Required Bachelor’s degree in information systems or other relevant degree or equivalent industry experience. Position Description This position is responsible for the overall strategic, technical, architectural and administrative oversight of the enterprise application security environments throughout the State of Michigan. It is responsible for all functions required to plan, design, optimize, implement, manage, and troubleshoot escalated issues within the enterprise application security environment. This position is additionally responsible for advocating the use of application security technologies and practices, developing standards and procedures, conduct audits, promoting the usage of automated tools, consulting on current cyber security regulation changes, developing strategies, and aligning practices with strategic initiatives. The position provides critical oversight for infrastructure maintenance and improvements in this highly visible and critical “red-card” environment containing highly sensitive personal information; having internal and external interfaces with critical systems; and operating under strict architectural guidelines and oversight. This position requires an extremely high degree of technical skill, initiative and creativity and must stay current with new and emerging theories, standards, technologies, and practices in tools, software, cyber security operating systems and hardware in order to provide for the needs of the state. Responsibilities also include end-to-end facilitation, pilot implementation, validation, and roll out of new technologies for enterprise application security. As an enterprise architect position it also involves mentoring, coaching and coordination and consultation with fellow systems administrators and architects within the team, Enterprise Architecture, Michigan Cyber Security, vendors, and other teams that interface with the enterprise environments. Must be able to communicate in business friendly terminology, to all stakeholders. Best Regards *Paul* 518-504-0086 Email : p...@innosoul.com Linkedin : *https://www.linkedin.com/in/paul-lawson-177637b3 <https://www.linkedin.com/in/paul-lawson-177637b3>* www.innosoul.com innoSoul,Inc. (An IBM Partner Company) NY Minority and Woman Owned Business Enterprise (MWBE) 24 Fairfield Ave, Albany NY 12205 Fax: 206-666-1776 -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Urgent Opening - Infrastructure Security Architect - Minneapolis, MN
Hello, Hope you are doing great. Please review the requirement and if you find it matching your profile then send me your updated resume ASAP/IMMEDIATE *Title: Infrastructure Security Architect* *Location: Minneapolis, MN* *Duration: 6+ Months * Duties include: · Analyze Business Requirements · -Collaborate with the business to understand/refine/influence business requirements · -Ensure that the business opportunity is properly interpreted, well-understood and clearly documented · -Collaborate with the business to define an end-to-end operational vision · -Demonstrate understanding of cross-functional/cross-domain requirements and impact · -Ensure understanding of business capabilities/processes (current and future) · -Ensure quality of requirements for solutions development (e.g., VFQs) · Perform Options Analysis · -Maintain knowledge of current and emerging technologies/products related to architectural solutions · -Ensure alignment of solutions with business and IT goals/objectives · -Identify/quantify scope and impact of business changes on systems · -Identify commercially-available products that can enable the development and/or delivery of the solution · -Facilitate/lead/participate in identification of solution options and features · -Identify/select proper solutions based on defined criteria · -Analyze/identify applicable solution requirements · -Communicate solution options to business owners/stakeholders · -Utilize applicable standards, and provide/document rationale for variances from standards · -Develop/communicate options summary · Develop Conceptual Designs · -Develop/finalize/approve solution summary documentation (e.g., BACD, SSD, conceptual data model, process flows) · -Incorporate software and system architecture (e.g., infrastructure, network) into conceptual designs · -Ensure alignment of conceptual designs with enterprise, segment and functional roadmaps · -Review conceptual designs to ensure scalability/applicability/quality/comprehensiveness · -Ensure traceability between solution summary and applicable requirements (e.g., PRD, VFQ) · -Determine when resource, technology and/or application constraints warrant change to the solution design, and modify the · conceptual design accordingly · -Contribute to/review SOWs/RFPs and make recommendations for improvement to ensure applicability/comprehensiveness · Ensure Quality/Alignment of Conceptual Designs · -Provide oversight of conceptual designs to ensure alignment with enterprise architecture governance · -Ensure alignment with enterprise technology standards (e.g., solution patterns, technology roadmaps, capital plans) · -Review implementation to ensure alignment with conceptual design, and resolve any operational issues · -Ensure adherence to SDLC/UDP/RSA processes (e.g., ADR documentation requirements) · -Ensure alignment with IRM policies · -Ensure alignment with infrastructure policies and standards · -Identify gaps between established standards and proposed solutions, and follow the exception/waiver process as needed · -Participate in Architectural Assurance Reviews · -Ensure that approved solutions and artifacts are captured in applicable repository · Demonstrate and Apply Knowledge of Enterprise Architecture and Standards · -Maintain awareness of current technology assets, and the applicability and capability of each · -Understand and adhere to the Enterprise Architecture (EA) governance framework (e.g., principles, policies, standards, reference · architectures, data-driven designs) · -Seek opportunities for reuse of existing technology assets, and make appropriate recommendations · -Maintain awareness of current business and industry issues/trends, and incorporate into enterprise architecture designs as · appropriate · -Provide ad hoc consulting in applicable areas of expertise Required Qualifications: •Undergraduate degree •8+ years overall experience in IT Solution Delivery and architecture •5+ years of experience in secure Networking from architecture, managing, planning/analysis, design, configuration, implementation, administration, and monitoring •3+ years of experience leading complex security projects/programs for a large enterprise organization •5+ years of experience supporting network security incident response activities including detection, analysis, containment, response and prevention procedures •3+ years of experience writing Requirements, Acceptance Criteria, and drawing Network/Security schematics. · Preferred Qualifications
Urgent Requirement: Security Architect at Anaheim, CA
*Hi, **Hope you are doing great. Please go through the below mentioned requirement and share the profiles at **a...@tresourceinc.com <a...@tresourceinc.com>** ASAP.* *Job Title: Security Architect* *Location: Anaheim, CA* *Type of hire: 6+ months Contract* *Interview Mode: Telephonic and Skype/F2F* Local is preference with them, but we can arrange skype for right candidates *Job Summary: *The Security Architect is responsible for performing level 2/3 operational duties while providing architectural consultative services related to several transformative information technology initiatives. The role requires daily hands-on administration of key information security applications that support the cyber security and incident response programs. *Architectural Functions* · Expert level knowledge of security architectural designs, requirements development, and solutions definition · Strong working knowledge in cloud solutions including Azure, AWS, and O365 · Serve as the subject matter expert for messaging, email, SMTP, and encryption · Familiarity with Active Directory security policy settings, GPO, and identity best practices · Provides consulting support to projects during the planning, analysis, design, and build phases · Influence the strategic and technical decisions during all phases of a project · Grasps key client issues based on fact-gathering activities and develops appropriate analyses and hypotheses *Operational Functions * · Experience in SIEM and email/messaging security applications · Strong working knowledge of system and application logging, monitoring, and alerting · Identifies, evaluates, and implements process and systems improvement opportunities · Acts as an intermediary and facilitator to help expand the capabilities of information security network controls · Contribute to security risk identification, classification, and mitigation processes · Research and analyze incident trends. Recommend and implement technology, process, training or other changes to mitigate incident risks. *Knowledge / Skills / Abilities:* · Proactive and self-sufficient in working to fulfill the objectives of this role. · Ability to accomplish the objectives of this role by collaborating with others across the ministry and influencing them to take the appropriate actions. · Exhibits excellent verbal and written communication skills. Excellent interpersonal skills. · Have outstanding project management skills with the ability to prioritize multiple, diverse, and simultaneous requirements. · Strong analytical and problem solving skills · Exhibits excellent verbal and written communication skills. Excellent interpersonal skills. *Minimum Position Qualifications: * · CISSP certification and health care industry experience · Administrative experience of AD, Exchange, email encryption, and SIEM · McAfee Nitro SIEM, Proofpoint email encryption, McAfee email gateway experience required · http://www.mcafee.com/us/products/siem/index.aspx?eid=15Q3NASRSIE6561 *Regards,ali...@tresourceinc.com <a...@tresourceinc.com>408-709-1760 EXT 9859* -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Urgent need HANA Security Architect ---Santa Clara, CA
Hi Partner, Hope you are doing great … Please send resume to ma...@genuineitllc.com *Title**:** HANA Security Architect* *Location**: **Santa Clara, CA.* *Overview:* we know that with the right people on board, anything is possible. The quality, integrity, and commitment of our employees have been key factors in our company’s growth and market presence. By hiring the best people and helping them grow both professionally and personally, we ensure a bright future for client and for the people who work here. *Qualifications:* ü The candidate should be a strong team player and have the ability to work independently. The job description of the consultant is as follows. - Experience designing and implementing security for SAP HANA - Experience Creating customized roles in HANA DB for Developers, Modelers, Technical Admins, End Users, Power Users. - Design, Restrict and Control authorizations for HANA DB objects and Packages/Contents based on System Privileges, Objects Privileges and Analytic Privileges for various Schema Users - Define controls to restrict Create, Drop, Alter other DB Admin rights on HANA DB Schema and its objects - Design transportation of Security Objects/Roles within HANA Landscape - Define user creation and Role assignment processes - Set up password policies - Create Groups in BOBJ Server for different type of Users (Admins, Managers, Developers, End Users etc..) - Define and Control access to various Folders - Setup SSO with AD or LDAP for SAP, Enterprise and other types of Authentication - Define & Control access at Object level for different types of BOBJ Reports (Full control, View, Schedule, View on Demand) - Transportation of Security objects within BOBJ Landscape - Integration of BOBJ Security with HANA DB Security Roles This is pure hands on role --- *With Warm Regards * *Madhu Roy* GenuineIT LLC *Certified Women Owned Business* Making IT Happen… Ph: 832 539 3475 Fax: 281-605-5969 *E-Mail* :ma...@genuineitllc.com *Gmail *: *nandimadhu74 , madhu.genuineitllc* *YM *: madhu_recruiter Looking ahead to work with you for better Business prospects According to Bill S.1618 Title III passed by the 105th US Congress, this message is not considered as "Spam" as we have included the contact information. If you wish to be removed from our mailing list, please respond with "remove" in the subject field. We apologize for any inconvenience caused. Please consider the environment before printing this e-mail -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Need Security Architect in Columbia, SC for 5 months
*Please sent your consultants resume on p...@innosoul.com* *Position:Security Architect* *Location: Columbia, SC* *Duration: 5 months* Category Name Required Importance Level Last Used Experience Network Security information security principles and practices Yes 1 Lead Currently Using 6 + Years Network Security IT Security Yes 1 Lead Currently Using 6 + Years Network Security Security Information Architecture Yes 1 Lead Currently Using 6 + Years Network Security Application Security No 1 Expert Within 1 Year 6 + Years Network Security risk/vulnerability assessments No 1 Expert Within 10 Years 6 + Years Network Security Role Based Access Control (RBAC) No 1 Expert Within 1 Year 6 + Years Network Security Security Information Event Management (SIEM) systems development / configuration No 1 Expert Within 1 Year 6 + Years Networking & Directories Access control logging and reporting systems Yes 1 Lead Currently Using 6 + Years Networking & Directories Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web apps, databases, strong authentication, operating systems and network security protocols and procedures. Yes 1 Lead Currently Using 6 + Years Networking & Directories Information Security Yes 1 Lead Currently Using 6 + Years Networking & Directories Network security Yes 1 Lead Currently Using 6 + Years Networking & Directories data discovery and data loss prevention (DLP) No 1 Expert Within 1 Year 6 + Years Networking & Directories Identity Access Management (IAM) No 1 Expert Within 1 Year 6 + Years Networking & Directories privileged user management (PUM) No 1 Expert Within 1 Year 6 + Years Specialties Event Handling No 1 Expert Within 1 Year 6 + Years Specialties IBM No 1 Expert Within 1 Year 6 + Years *REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):* Cyber Awareness and understanding Expert understanding of information, computer and network security. Its operation, engineering, and architecture. Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web apps, databases, strong authentication, operating systems and network security protocols and procedures. Expert understanding of access control logging and reporting systems. *PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):* Identity Access Management (IAM) Role Based Access Controls (RBAC) Privileged User Management (PUM) Data Loss Prevention (DLP) Security Information Event Management (SIEM) systems Vulnerability Assessment (VA) Applications Security (AppSec) User metadata and Information Security event collection, logging and correlation McAfee e-Policy Orchestrator (ePO) / DoD HBSS Tenable Security Center / Nessus IBM AppScan *Background Checks* riminal Record – 7 Year History Candidate Confirmation Drug Screening – 10 Panel Candidate Confirmation Credit Report – 7 Year History Candidate Confirmation Driving Record – 7 Year history Candidate Confirmation Best Regards *Paul* *[image: http://www.telephoneart.com/animate/ringing.gif]* 518-504-0086 Email : p...@innosoul.com Linkedin :https://www.linkedin.com/pub/paul-k/49/a53/836 www.innosoul.com innoSoul,Inc. (An IBM Partner Company) NY Minority and Woman Owned Business Enterprise (MWBE) 24 Fairfield Ave, Albany NY 12205 Fax: 206-666-1776 -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Need Security Architect in Columbia for 5 months
*Please sent your consultant on p...@innosoul.com <p...@innosoul.com>* *Position: Security Architect * *Location: Columbia, SC Duration: 5 months* *Category Name Required Importance Level Last Used Experience* Network Security information security principles and practices Yes 1 Lead Currently Using 6 + Years Network Security IT Security Yes 1 Lead Currently Using 6 + Years Network Security Security Information Architecture Yes 1 Lead Currently Using 6 + Years Network Security Application Security No 1 Expert Within 1 Year 6 + Years Network Security risk/vulnerability assessments No 1 Expert Within 10 Years 6 + Years Network Security Role Based Access Control (RBAC) No 1 Expert Within 1 Year 6 + Years Network Security Security Information Event Management (SIEM) systems development / configuration No 1 Expert Within 1 Year 6 + Years Networking & Directories Access control logging and reporting systems Yes 1 Lead Currently Using 6 + Years Networking & Directories Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web apps, databases, strong authentication, operating systems and network security protocols and procedures. Yes 1 Lead Currently Using 6 + Years Networking & Directories Information Security Yes 1 Lead Currently Using 6 + Years Networking & Directories Network security Yes 1 Lead Currently Using 6 + Years Networking & Directories data discovery and data loss prevention (DLP) No 1 Expert Within 1 Year 6 + Years Networking & Directories Identity Access Management (IAM) No 1 Expert Within 1 Year 6 + Years Networking & Directories privileged user management (PUM) No 1 Expert Within 1 Year 6 + Years Specialties Event Handling No 1 Expert Within 1 Year 6 + Years Specialties IBM No 1 Expert Within 1 Year 6 + Years *REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):* Cyber Awareness and understanding Expert understanding of information, computer and network security. Its operation, engineering, and architecture. Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web apps, databases, strong authentication, operating systems and network security protocols and procedures. Expert understanding of access control logging and reporting systems. PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE): Identity Access Management (IAM) Role Based Access Controls (RBAC) Privileged User Management (PUM) Data Loss Prevention (DLP) Security Information Event Management (SIEM) systems Vulnerability Assessment (VA) Applications Security (AppSec) User metadata and Information Security event collection, logging and correlation McAfee e-Policy Orchestrator (ePO) / DoD HBSS Tenable Security Center / Nessus IBM AppScan *Background Checks* riminal Record – 7 Year History Candidate Confirmation Drug Screening – 10 Panel Candidate Confirmation Credit Report – 7 Year History Candidate Confirmation Driving Record – 7 Year history Candidate Confirmation Best Regards *Paul* 518-504-0086 Email : p...@innosoul.com Linkedin :https://www.linkedin.com/pub/paul-k/49/a53/836 www.innosoul.com innoSoul,Inc. (An IBM Partner Company) NY Minority and Woman Owned Business Enterprise (MWBE) 24 Fairfield Ave, Albany NY 12205 Fax: 206-666-1776 -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Urgent Requirement Need // HANA Security Architect // Santa Clara, CA
Hi , Hope you are doing good !! Please go though the requirement an let me know if you are Comfortable or not ASAP.. We have an urgent requirement as follows: Please respond with Update resume for vija...@avanitechsolutions.com *Job Title: HANA Security Architect* *Location: Santa Clara, California* *Duration: 6 months* *Job description* The candidate should be a strong team player and have the ability to work independently. The job description of the consultant is as follows. 1. Experience designing and implementing security for SAP HANA 2. Experience Creating customized roles in HANA DB for Developers, Modelers, Technical Admins, End Users, Power Users. 3. Design, Restrict and Control authorizations for HANA DB objects and Packages/Contents based on System Privileges, Objects Privileges and Analytic Privileges for various Schema Users 4. Define controls to restrict Create, Drop, Alter other DB Admin rights on HANA DB Schema and its objects 5. Design transportation of Security Objects/Roles within HANA Landscape 6. Define user creation and Role assignment processes 7. Set up password policies 8. Create Groups in BOBJ Server for different type of Users (Admins, Managers, Developers, End Users etc..) 9. Define and Control access to various Folders 10.Setup SSO with AD or LDAP for SAP, Enterprise and other types of Authentication 11.Define & Control access at Object level for different types of BOBJ Reports (Full control, View, Schedule, View on Demand) 12.Transportation of Security objects within BOBJ Landscape 13.Integration of BOBJ Security with HANA DB Security Roles *This is pure hands on role* Thanks & Regards *Vijender D *| IT Recruiter *[image: cid:image001.jpg@01D08762.68493F80]* Mobile: +1-585-643-1768 | Fax: +1- 585-285-4133 email: vija...@avanitechsolutions.com <00...@avanitechsolutions.com> | website: www.avanitechsolutions.com Yahoo: vijjuvijay48 | Gtalk: vijjuvijay48 -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
URGENT REQUIREMENT :: Oracle Mobile Security Suite 11g System & Security Architect :: Remote :: 2-3+ Months
*Hi,We have the following position. please let me know if you are interested.Role: Oracle Mobile Security Suite 11g System & Security Architect* *Location: **Remote* *Duration : 2-3+ Months* * Job Description:* *Industry *: General / Oracle Mobility / Oracle Enterprise Mobility *Initiative/Task *: Resource will be responsible for completion of various tasks, relating to the Oracle Mobile Security Suite 11g *Current Products *: Oracle Mobile Security Suite 11g *Required Modules *: All aspects of Solaris 11 *Core Assignment: *Complete various tasks relating to Oracle Mobile Security Suite 11g, in the following areas: • Oracle Mobile Security Suite Fundamentals • Oracle Mobile Security Suite Access Server (MSAS) • Oracle Mobile Security Suite Admin Console (MSAC) • Oracle Mobile Security Suite File Manager (MSFM) • Oracle Mobile Security Suite Notification Server (MSNS) • Oracle Mobile Security Suite Containerization • Oracle Mobile Security Suite Provisioning • Oracle Mobile Security Suite Policies • Deployment *Specific Focal Points: *Oracle Mobile Security Suite 11g certification(s) *Required Skill sets: (Skills that must be met)* • Secure Mobile Container Apps • Secure Web Browser o Kerberos or NTLM o HTML5 applications including offline support o Download files into file manager (if your security policy allows it) • Secure File Manager • Accessing network files on Windows File System or SharePoint • Moving or copying files to/from local file store • Native clients supporting ActiveSync mail server including Exchange, Google Apps, and Lotus Notes • Attachments can be restricted to the container • OMSS Component Architecture • Secure Email, Calendar, Contacts, Tasks, Notes • Solution Components • DMZ and app level SSL tunnel deployments • Mobile Security Administrative console / WebDAV • Internal SMB/CIFS file shares • Mobile Security Container (previously known as Bitzer Secure Container) • Single Sign-on and FIPS 140-2 encryption. Current support for iOS only. • Mobile Security Access Server • Mobile Security Administrative Console • Installing Oracle Mobile Security Suite on Windows • Installing Oracle Mobile Security Suite on Linux • Mobile Security Administrative Console Guide • Extending Enterprise Access and Governance with Oracle Mobile Security • Mobile Security File Manager • Mobile Security Notification Server • Customization and Branding • Advanced Configuration Options • Application Containerization • Extending Enterprise Access and Governance with Oracle Mobile Security • Mobile Security Access Server (previously known as BMAX Gateway) • Mobile Security File Manager (previously m/Drive) • Mobile Security Application Wrapping Tool (previously Bitzer Containerization Tool) • Extending Enterprise Access and Governance with Oracle Mobile Security • Installation Requirements Understanding, Implementation, Advanced Configuration options, and Troubleshooting in all of the following Oracle Mobile Security Suite products / components: Thanks and Regards *Todd Parks* Ph: 630-315-9525 || Email: todd_pa...@aesinc.us.com || <http://www.aesinc.us.com/> -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Direct Client Requirement @ Security architect @ Santa Clara, CA
Hi Friend, Greetings for the day!!! This is Anu from Talentminds; I am working on below requirement. Please help me with updated resume ASAP. *Reply to anu.talentmi...@gmail.com <u.talentmi...@gmail.com>* *Role: Security Architect* *Location Santa Clara, CA* *Duration: 6+ Months* *Description:* • Should have worked in designing the security architecture in cloud and datacenter environments • Should have worked in the capacity of a security architect and dealt with requirements gathering from multiple stakeholders, building the security strategy & design • Should have good understanding of security compliance standards (one or more of ISO, PCI, HIPPA etc) and should must have worked with external security audit organizations during security audits Regards, Anu | Sr Recruiter Talent Minds Phone:214-884-5136 Email: anu.talentmi...@gmail.com -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Security Architect Opportunity In MA
Hello Good Morning, This is *Vincent Karoff * Below Is the Hottest Position for my client please do let me know I you have any suitable consultants *The client need someone Local to MA and Green Card USC and EAD- TN Candidates* Position: Security Architect Duration: 3+ month Location: Southboro, MA. They Need local to MA I can get the Interview ASAP . Job Description: This position is part of a Secure Solution Delivery Group that works proactively to drive value and mitigate risk by providing consistent direction and providing subject matter expertise in network vulnerability assessments, design and deployment of security technologies and solutions. Will help to facilitate and drive the design and implementation of complex enterprise IT infrastructure security, processes, standards, regulatory issues, and assessments. Will drive the implementation of Standard and Custom Security Solutions to IT and Business projects. Assess and evaluate the risk (design mitigation) and ensure any accepted risk is fully documented. Support the design of secure infrastructure, applications and mobile solutions. Assist in the implementation of protective and mitigating controls. Provide support to security operations and assist in providing technical security consulting services of technical security projects. Responsibilities: - Research, design, and implement information security solutions for organization. - Architect systems and products that comply with all applicable security policies and standards. - Architect innovative solutions for wide range of complex problems. - Interface with management to report on project and milestones. - Independently determine and develop approach to solutions, under limited direction - Develop new methodologies or processes and re-evaluate existing processes - Perform technical project leadership roles. - Anticipate issues and address them proactively. - Articulate Web Application Security Analysis findings and provide remediation strategies as well as Security Thread Modeling Skills - Knowledge of Web Services, SOA Architecture, Application Security Firewalls, XML Firewalls and IDS technologies. - Knowledge of Enterprise Mobility Architectures and emerging technologies - Experience with Single Sign-on technologies. - Experience in wireless, mobile, infrastructure or application level vulnerability testing, remediation, risk assessment and auditing. - Application Security knowledge and best practices. - Software security designs such as OWASP or SANS secure coding and secure design principles. - Background in secure code development and review. - Familiarity with SDLC, Agile, Rapid Application Development, Kanban, Scrum, CMMI, Java, SANS GWEB, Android/Apple Development or REST. - Experience with Cloud Security work AWS, VMWare Air, OpenStack and RackSpace or other secure cloud deployment security architecture design. - Strong Network Security Architecture experience. - Experience with Cloud and Platform as a service are a plus. - Ability to communicate complex and technical issues to diverse audiences, orally and in writing, in an easily-understood, authoritative, and actionable manner. - A team-focused mentality with the proven ability to work effectively with diverse stakeholders - An understanding of the impact of emerging business and end-user technologies have on information security requirements and architecture - Broad understanding of all aspects of information security. - Excellent written and oral communication skills. - Consultative skills. - BS in Computer Science, Information Security, or related field - Experience with regulatory compliance and information security management frameworks (e.g., IS027000, COBIT, NIST 800, PCI DSS, HIPAA, FedRAmp, GLBA, Sox etc.) - SANS CISSP, CISA, GIAC certifications preferred *Vincent Karoff - Technical Recruiter* vincent.kroff@gmail. <vinc...@panzersolutions.com> Gtalk :vincent.kroff skype :syed.abdullah784 -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Urgent Need Data Security Architect in Bellevue, WA for 6+months
Hi Partner, This is Shaik from Deegit Inc. Please find the below requirement for your review. If you are comfortable with the requirement please get back to me ASAP on sh...@deegit.com *Position: Data Security Architect* Location: Bellevue, WA Duration: 6+ Months *Job Description:* · Data Security Architect is a member of the IDW (Integrated Data Warehouse) Data Architecture team focused on client’s latest Hadoop/Teradata Data Warehouse platform. · This person will own the data warehouse data security strategy and ensure the new data warehouse complies with client’s security standards as listed by · CIS (Corporate Information Security department). · This role will own the security design on IDW (Integrated Data Warehouse) from the data architecture side and will work with strategic vendors, CIS, and other vendor partners to design overall data warehouse security and to ensure IDW security strategy is in alignment with CIS and product roadmaps of Hortonworks Hadoop and Teradata · As a member of the Data Architecture team you will own the security design of client’s newest Hadoop/Teradata data warehouse implementation. · Work with strategic vendors and internal CIS (corporate information security) and other vendor partners to design the security controls and to ensure the IDW · security strategy is in alignment with CIS and product roadmaps of Hortonworks Hadoop and Teradata · Collaborate with team members, peers and the business unit management team to determine technical information security requirements and planned remediation · Liaise with and assist outsourced security service providers with vulnerability assessments of business applications, systems and architectures. · Qualifications: Strong understanding of encryption, obfuscation and/or tokenization technologies · Candidate must have strong technical, influential and organizational skills. · Candidate should be knowledgeable about Hadoop and Teradata security best practices · Candidate should be knowledgeable about Hadoop and Teradata security best practices · Prefer six years of experience in information security related discipline, in addition to several years relevant systems and/or network administration experience. · Demonstrated ability to work effectively in a complex matrixed environment. · Outstanding verbal and written communication skills. · Ability to translate security requirements into business risks and impacts. · Experience with high level design Architecture, Firewall, Internet, LAN Router, Network, Protocols, Web Services and SOA. · Appropriate industry certifications, such as CISSP, CISA or CCIE. · Preferred skill: Bachelor degree in Computer Science, Information Security, Information Management, or other related discipline. · Telecommunications industry expertise, Six Sigma Training, Audit, Compliance & Network experience preferred. Best Regards, ___ Shaik | Deegit Inc | 1900 East Golf Rd., Suite 925 | Schaumburg, IL 60173 | Ph: 847.440.2436 ext - 358 | Fax: 847.330.1987 sh...@deegit.com | www.deegit.com | -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Re : Senior Security Architect
Hi, Hope you are doing great. This is Sunil from Burgeon IT Services, we are an IT consulting organization and We do have a vacancy with our Prime Customer in which you may be interested, Kindly review the details and if you find it interesting do send an updated copy of your updated resume and following details ASAP to su...@teamworkassociates.net *Position: Senior Security Architect * *Location: Houston, TX* *Duration: 6 months * *Rate: $60/hr C2C* *Job Responsibilities:* · Secures enterprise information by determining security requirements; planning, implementing, and testing security systems; preparing security standards, policies, and procedures; mentoring team members. · Enhances security team accomplishments and competence by planning delivery of solutions; answering technical and procedural questions for less experienced team members; teaching improved processes; mentoring team members. · Determines security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates. · Plans security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; designs public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards. · Implements security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures; creating, transmitting, and maintaining keys; providing technical support; completing documentation. · Verifies security systems by developing and implementing test scripts. · Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs. · Upgrades security systems by monitoring security environment; identifying security gaps; evaluating and implementing enhancements. · Prepares system security reports by collecting, analyzing, and summarizing data and trends. · Updates job knowledge by tracking and understanding emerging security practices and standards; participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations. · Enhances department and organization reputation by accepting ownership for accomplishing new and different requests; exploring opportunities to add value to job accomplishments. *Senior Security Architect Skills and Qualifications:* Network Security, Network Hardware Configuration, Network Protocols, Networking Standards, Supervision, Conceptual Skills, Decision Making, Informing Others, Functional and Technical Skills, Dependability, Information Security Policies *Thanks & Regards* *Sunil* *Executive Recruiter | Talent Acquisition Team* Phone No. :302-220-4724 ;Fax : 302-355-1559 Email Id: su...@teamworkassociates.net NOTE: We respect your Online Privacy. This is not an unsolicited mail. If you are not interested in receiving our E-mails then please reply with a "REMOVE" in the subject line and mention all the E-mail addresses to be removed with any E-mail addresses which might be diverting the E-mails to you. We apologize for any unintended inconvenience -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Urgent Need Data Security Architect in Bellevue, WA for 6+months
Hi Partner, This is Shaik from Deegit Inc. Please find the below requirement for your review. If you are comfortable with the requirement please get back to me ASAP on sh...@deegit.com *Position: Data Security Architect* Location: Bellevue, WA Duration: 6+ Months *Job Description:* · Data Security Architect is a member of the IDW (Integrated Data Warehouse) Data Architecture team focused on client’s latest Hadoop/Teradata Data Warehouse platform. · This person will own the data warehouse data security strategy and ensure the new data warehouse complies with client’s security standards as listed by · CIS (Corporate Information Security department). · This role will own the security design on IDW (Integrated Data Warehouse) from the data architecture side and will work with strategic vendors, CIS, and other vendor partners to design overall data warehouse security and to ensure IDW security strategy is in alignment with CIS and product roadmaps of Hortonworks Hadoop and Teradata · As a member of the Data Architecture team you will own the security design of client’s newest Hadoop/Teradata data warehouse implementation. · Work with strategic vendors and internal CIS (corporate information security) and other vendor partners to design the security controls and to ensure the IDW · security strategy is in alignment with CIS and product roadmaps of Hortonworks Hadoop and Teradata · Collaborate with team members, peers and the business unit management team to determine technical information security requirements and planned remediation · Liaise with and assist outsourced security service providers with vulnerability assessments of business applications, systems and architectures. · Qualifications: Strong understanding of encryption, obfuscation and/or tokenization technologies · Candidate must have strong technical, influential and organizational skills. · Candidate should be knowledgeable about Hadoop and Teradata security best practices · Candidate should be knowledgeable about Hadoop and Teradata security best practices · Prefer six years of experience in information security related discipline, in addition to several years relevant systems and/or network administration experience. · Demonstrated ability to work effectively in a complex matrixed environment. · Outstanding verbal and written communication skills. · Ability to translate security requirements into business risks and impacts. · Experience with high level design Architecture, Firewall, Internet, LAN Router, Network, Protocols, Web Services and SOA. · Appropriate industry certifications, such as CISSP, CISA or CCIE. · Preferred skill: Bachelor degree in Computer Science, Information Security, Information Management, or other related discipline. · Telecommunications industry expertise, Six Sigma Training, Audit, Compliance & Network experience preferred. Best Regards, ___ Shaik | Deegit Inc | 1900 East Golf Rd., Suite 925 | Schaumburg, IL 60173 | Ph: 847.440.2436 ext - 358 | Fax: 847.330.1987 sh...@deegit.com | www.deegit.com | -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Need Security Architect in Bellevue, WA for 6 months
Hi Partner, This is Shaik from Deegit Inc. Please find the below requirement for your review. If you are comfortable with the requirement please get back to me ASAP on sh...@deegit.com *Position: Security Architect* Location: Bellevue, WA Duration: 6+ Months *Job Description* •Data Security Architect is a member of the IDW (Integrated Data Warehouse) Data Architecture team focused on T-Mobile’s latest Hadoop/Teradata Data Warehouse platform. •This person will own the data warehouse data security strategy and ensure the new data warehouse complies with T-Mobile security standards as listed by CIS (Corporate Information Security department). *Responsibilities* •What you will do: •This role will own the security design on IDW (Integrated Data Warehouse) from the data architecture side and will work with strategic vendors, CIS, and other vendor partners to design overall data warehouse security and to ensure IDW security strategy is in alignment with CIS and product roadmaps of Hortonworks Hadoop and Teradata •As a member of the Data Architecture team you will own the security design of T-Mobile’s newest Hadoop/Teradata data warehouse implementation. •Work with strategic vendors and internal CIS (corporate information security) and other vendor partners to design the security controls and to ensure the IDW security strategy is in alignment with CIS and product roadmaps of Horton works Hadoop and Teradata •Collaborate with team members, peers and the business unit management team to determine technical information security requirements and planned remediation •Liaise with and assist outsourced security service providers with vulnerability assessments of business applications, systems and architectures. *Qualifications* •Preferred: Any of the following •CISSP, CISA, CISM, C-RISC, CCNA, CCIE, Six Sigma Yellow/Green/Black Belt Best Regards, ___ Shaik | Deegit Inc | 1900 East Golf Rd., Suite 925 | Schaumburg, IL 60173 | Ph: 847.440.2436 ext - 358 | Fax: 847.330.1987 sh...@deegit.com | www.deegit.com | -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Need (IAM) Security Architect in MN
*Hi Partners,* *Greetings,* *Hope you are doing Well!!!* *Please forward a profiles to **shan...@techconsultinc.com* shan...@techconsultinc.com *Here are the requirement details* -- *Plymouth, MN* -- The Identity and Access Management (IAM) Security Architect evaluates system specifications, processes, and working parameters for complex application integrations. Candidate should be self-motivated, enthusiastic, detail oriented, multi-tasking, and adaptable in a very fast paced environment. This individual must be a senior level Identity and Access Management Engineer who can quickly understand our security frameworks and understand how to integrate with business applications. The IAM Security Architect will have a leadership role in defining our IDP and IDaaS implementations. 3+ years of experience with one or more of the following IAM products: CA SiteMinder Ping Federate Layer7 CA IdentityMinder RSA Adaptive Authentication CA GovernanceMinder 5+ years of experience conducting application integrations Knowledge and experience with sound IAM practices Looking forward to hearing from you at the earliest!!! *Regards* *Shankar* Professional Recruiter 33505 State Street, Suite # 200 Farmington, MI 48335 *V* (248)-522-6879 *F* (248)-579-4454 *Linkedin: **www.linkedin.com/in/shkrajan* http://www.linkedin.com/in/shkrajan *Email** : **shan...@techconsultinc.com* shan...@techconsultinc.com *Messanger**: shankarraj...@yahoo.com shankarraj...@yahoo.com* *Minority Certified and Woman Owned Enterprise* *TCI**- Technology Consultants inc* *Note:* *It is not a solicitation attempt!!!* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Urgent Req : Cloud Security Architect Windsor CT Contract
HI, This is MIKE from Agile Enterprise Solutions. This is in reference to the following position. * Please find below job description if you feel comfortable please revert with updated resume, Rate and contact details ASAP * Role:Cloud Security Architect Location: Windsor CT Duration: Contract Client :Infosys / VOYA Job Description: We need a security architect who has hands on experience in cloud environment where he has worked on defining and implement enterprise security standards, policies in the cloud environment (SIEM, Security Testing, some DR) and then work with App SME on cloud migration in compliance with the security standards. Thanks Regards Mike Michon, Agile Enterprise Solutions Inc., Ensuring Client's Success Ph: 630-315-9541 Fax: (630) 206-2397 Email: mike_mic...@aesinc.us.com Web: www.agilees.com Gtalk/YIM: mikeagilees Note: If you have received this mail in error or prefer not to receive such emails in the future, please reply with REMOVE in the subject line and the email id(s) to be removed. All removal requests will be honored ASAP. We sincerely apologize for any inconvenience caused. -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Our client is looking for Identity Access Management Security Architect@Milwaukee, WI
*Hi Friend,* *Greetings for the day!!!* *This is Vijay from SQLN Systems; I am working on below requirement. Please help me with updated resume ASAP.* *Reply to vi...@sqlnsystems.com vi...@sqlnsystems.com* *Title: Cloud Security: Identity Access Management Security Architect* *Duration:6+ Months ( Long Term)* *Location:Milwaukee, WI* *Required Qualifications:* - 5+ years of experience designing and implementing security and identity solutions to support mission critical andbusiness programs - Specific emphasis on development-centered skills - Some experience with technologies and protocols to support identity federation and robust access control models - (e.g., SAML 2.0, XACML, WS-Federation, WS-Trust, OAuth, OpenID) - Detailed knowledge of enterprise Web technologies, security and cutting-edge infrastructures - Ability to work independently and collaboratively supporting the development of client deliverables - Specific knowledge of cloud architecture, as well as on-premise IT landscape - Specific knowledge and experience in Identity and Access Management (IAM) and Security space - AD and LDAP experience is preferred - 2+ years of application programming experience is strongly preferred - Project Management experience is a plus - Comfortable with day-to-day direct client interaction and willingness to be a hands-on contributor - Excellent communication skills, including issue tracking, triaging and crisis management - Experience in process improvement, decision making, managing processes, planning, analysing information and developing standards -- Thanks Regards! Vijay,Sr IT Recruiter, Direct Number: 214-884-6231,Email:vi...@sqlnsystems.com email%3avi...@rposervices.com, Skype:vickey.recruiter, . -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Need Urgent Security Architect In MD
*Position : Security Architect* *Location : **Silver Springs is in MD* *Duration : 3+Months* *Required:* *Application Architecture experience Security Architecture experience* Technical acumen requisite for a successful architect *This individual should: *Possess a thorough knowledge of systems and how their components interconnect Be able to completely and accurately design and document system architecture Be able to work with various system owners in providing support for documentation design and review * Preferable Technology Experience:* Linux Windows LDAP TAM Active Directory C# .net Java -- *Warm Regards* *Matt Jones* *Technical Recruiter** |** Panzer Solutions LLC |* *Work Ph: 203-652-1444 Ext 119 (**Best Way to reach me through Email**)* *Email : **matt.jo...@panzersolutions.com* * Web: | * *www.panzersolutions.com* http://www.enterprisesolutioninc.com/ -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Need Security Architect In MD For 3 Months
*Position : Security Architect* *Location : **Silver Springs is in MD* *Duration : 3+Months* *Required:* *Application Architecture experience Security Architecture experience* Technical acumen requisite for a successful architect *This individual should: *Possess a thorough knowledge of systems and how their components interconnect Be able to completely and accurately design and document system architecture Be able to work with various system owners in providing support for documentation design and review * Preferable Technology Experience:* Linux Windows LDAP TAM Active Directory C# .net Java -- *Warm Regards* *Matt Jones* *Technical Recruiter** |** Panzer Solutions LLC |* *Work Ph: 203-652-1444 Ext 119 (**Best Way to reach me through Email**)* *Email : **matt.jo...@panzersolutions.com* * Web: | * *www.panzersolutions.com* http://www.enterprisesolutioninc.com/ -- *Warm Regards* *Matt Jones* *Technical Recruiter** |** Panzer Solutions LLC |* *Work Ph: 203-652-1444 Ext 119 (**Best Way to reach me through Email**)* *Email : **matt.jo...@panzersolutions.com* * Web: | * *www.panzersolutions.com* http://www.enterprisesolutioninc.com/* |* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Urgent Need Application Security Architect
*Position : Application/Security Architect* *Location : **Silver Springs is in MD* *Duration : 3+Months* *Required:* *Application Architecture experience Security Architecture experience* Technical acumen requisite for a successful architect *This individual should: *Possess a thorough knowledge of systems and how their components interconnect Be able to completely and accurately design and document system architecture Be able to work with various system owners in providing support for documentation design and review * Preferable Technology Experience:* Linux Windows LDAP TAM Active Directory C# .net Java -- *Warm Regards* *Matt Jones* *Technical Recruiter** |** Panzer Solutions LLC |* *Work Ph: 203-652-1444 Ext 119 (**Best Way to reach me through Email**)* *Email : **matt.jo...@panzersolutions.com* * Web: | * *www.panzersolutions.com* http://www.enterprisesolutioninc.com/* |* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Need Security Architect
*Position : Security Architect* *Location : **Silver Springs is in MD* *Duration : 3+Months* *Required:* *Application Architecture experience Security Architecture experience* Technical acumen requisite for a successful architect *This individual should: *Possess a thorough knowledge of systems and how their components interconnect Be able to completely and accurately design and document system architecture Be able to work with various system owners in providing support for documentation design and review * Preferable Technology Experience:* Linux Windows LDAP TAM Active Directory C# .net Java -- *Warm Regards* *Matt Jones* *Technical Recruiter** |** Panzer Solutions LLC |* *Work Ph: 203-652-1444 Ext 119 (**Best Way to reach me through Email**)* *Email : **matt.jo...@panzersolutions.com* * Web: | * *www.panzersolutions.com* http://www.enterprisesolutioninc.com/ -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Security Architect - NJ
Greetings, Hope you are doing well! Please go through the below requirement and let me know if you have any consultant available, please do send me thier updated resume and the best number. Security Architect Location: Livingston, NJ Duration: Long Term Description: Create, improve and perform threat and vulnerability management processes. Perform penetration testing/ethical hacking on hardened systems for assurance. Assist with enhancing secure configuration management processes. Perform assessments against infrastructure and application design to ensure compliance with security standards. Ensure potential vulnerabilities are assessed and, if applicable, promptly addressed. Manage the penetration testing program and remediation of any issues encountered. Assist with projects to implement new threat and vulnerability management technologies. Provide recommendations for improving configuration standards, based on personal expertise and outside sources. Assist the incident response team and serve as a subject matter expert for sophisticated attack. Gather security intelligence, define applicability to current environment, identification of mitigating controls. Thanks, Steven Smith Please send your updated resume to steven.sm...@panzersolutions.com -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Application Security Architect || Silver Springs, MD
Hello Partners, We are looking for *Application Security Architect* for one of our client at *Silver Springs, MD*. Please let me know your interest. *Application Security Architect* *Location: Silver Springs, MD* *Duration: 6+ Months* *Rate: $60/hr* *Phone Interview* *Required Skills:* · Linux · Windows · LDAP · TAM · Active Directory · C# · .net · Java *Thanks Regards* *Dev Chauhan* *International Technical Solutions (ITS)* D: 206-274-4684 F: 206-319-4579 dev.chau...@i-tecsol.com himanshu.kak...@i-tecsol.com Note: We respect your Online Privacy. This is not an unsolicited mail. Under Bills.1618 Title III passed by the 105th U.S. Congress this mail cannot be considered Spam as long as we include Contact information and a method to be removed from our mailing list. If you are not interested in receiving our e-mails then please reply with a REMOVE in the subject line at supp...@i-tecsol.com and mention all the e-mail addresses to be removed with any e-mail addresses, which might be diverting the e-mails to you. We are sorry for the inconvenience. -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Hot Requirement...........................Sr. Data Architect / Data Security Architect
Good Morning Friends We Request You To Provide The Top Qualified Profiles For This Requirement *Position : Sr. Data Architect / Data Security Architect* *Location : San Jose CA* *Duration : 6+ Months * *Expirence: 8+ Yrs* *Job Description Update:* The ideal candidate should be able to comprehend business requirements, and must ensure that all the data models and implementations can be traced back to the business strategy and security key principles. The Data Architect will design database security alerts that can be implemented in Imperva . The Data Architect will provide services for Information Security team and enterprise security initiatives. *The Data Architect for Database Security will work with Business partners, MP Project Developers, Product Managers to understand the Business Requirements, Database access patterns, Application functionality and database configuration. The person should be able to create Data Models, based on the requirements and should be able to integrate data classification in the Models, ensuring data security. This candidate will be involved into design and architecture of Database Security policy, Data Discovery, Data Security Architecture and special database level auditing, alerts and controls.* *Must Have Skills:* *Excellent Design and Data Architectural skills needed for the position.* *Experience of using Imperva and designing database security alerts.* *Must have Information Security Architecture experience* *Good understanding of Hardware, platforms, hosting: servers, network components and security devices and where they are kept* * Must be able to create Interfaces between applications – that is: Events, messages and data flows.* *Understanding of Local and wide area networks, Internet connectivity* *Must have an experience in online ecommerce Industry with High Volume of Traffic flowing in and out.* *Technical Expert in Database Platforms like Imperva , Oracle, MySQL, Teradata, Hadoop and other No SQL Databases* Thanks Regards, Rasheed Hamsol Technologies LLC Email: rasheedham...@gmail.com -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Urgent Requirement...............Data Security Architect
Good Morning Friends We Request You To Provide The Top Qualified Profiles For This Requirement *Position : Data Security Architect* *Location : San Jose CA* *Duration : 6+ Months * *Expirence: 8+ Yrs* *Technical Qualification:* *Proficient with databases (SQL, NoSQL databases) and network communications.* *Preference will be given to those candidates with Oracle Teradata and Hadoop experience* *Experience working with data analytics in Information Security , IT Risk Management , and IT compliance areas is highly desirable.* *• SOX, PCI, ISO, general compliance and/or risk-based compliance, yielding a comprehensive understanding of technology and best practices * *• A minimum of 3 years of experience in Information Security related tools and technologiesare desirable. * *• Experience with tools such as IBM InfoSphere Guardium, Vontu, Oracle Unified Directory, Power Broker is desirable. * *• Proficiency with SIEM tools such as Splunk desired not a must * *• Seen as a security SME.* *Soft Skills: * *Strong analytical skills, effective communicator – verbally and in writing * *Ability to time manage, plan and prioritize workload * *Passion to learn new technologies and deliver. * *Well organized, detail oriented, ability to multi-task * *Ability to take initiative and work on own or as part of a team * *Strong relationship building skills and ability to work with multiple stakeholders at different levels across the organization* Thanks Regards, Rasheed Hamsol Technologies LLC Email: rasheedham...@gmail.com -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Kind Attn............................Data Security Architect
Good Morning Friends We Request You To Provide The Top Qualified Profiles For This Requirement *Position : Data Security Architect* *Location : San Jose CA* *Duration : 6 Months * *Expirence: 8+ Yrs* *Technical Qualification:* Proficient with databases (SQL, NoSQL databases) and network communications. Preference will be given to those candidates with Oracle Teradata and Hadoop experience Experience working with data analytics in Information Security , IT Risk Management , and IT compliance areas is highly desirable. SOX, PCI, ISO, general compliance and/or risk-based compliance, yielding a comprehensive understanding of technology and best practices A minimum of 3 years of experience in Information Security related tools and technologiesare desirable. Experience with tools such as IBM InfoSphere Guardium, Vontu, Oracle Unified Directory, Power Broker is desirable. Proficiency with SIEM tools such as Splunk desired not a must Seen as a security SME. *Soft Skills: * Strong analytical skills, effective communicator – verbally and in writing Ability to time manage, plan and prioritize workload Passion to learn new technologies and deliver. Well organized, detail oriented, ability to multi-task Ability to take initiative and work on own or as part of a team Strong relationship building skills and ability to work with multiple stakeholders at different levels across the organization Thanks Regards, Rasheed Hamsol Technologies LLC Email: rasheedham...@gmail.com -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Kind Attn...........................Security Architect
Good Afternoon Dear Friends We Request You To Provide The Top Qualified Profiles For This Requirement *Position: Security Architect* *Location: 15 month ongoing contract (2-3 years)* *Duration: Erlanger, KY* *Expirence : 10+ Yrs* *Description:* Establishes technical standards, architects system design, configuration based on requirements and best practices. Expert in Risk Assessment and vulnerability / threat management. As a security architect, the candidate for this position will be responsible for developing information security requirements, standards, and best practices for a wide range of internal technology projects. This position will participate in working meetings to determine risk and develop appropriate information security controls with other project managers. *Requirements:* • Experience creating information security standards • Expert in developing and implementing information security requirements. • Expert in designing and implanting information security systems. • Expert in information security best practices. • Microsoft Windows security systems • Microsoft Active Directory • Unix security system • LDAP authentication systems • Database security • Network file share security systems • Experience in security risk assessment • Writing information security requirements Thanks Regards, Rasheed Hamsol Technologies LLC Email: rasheedham...@gmail.com -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Need Sr. Data Architect / Data Security Architect
*Hi* *Hope you are doing good send resumes to **mohan.si...@bhaninfo.com* mohan.si...@bhaninfo.com *Need Sr. Data Architect / Data Security Architect* *1) **Sr. Data Architect / Data Security Architect* * Location : CA* * Rate : open* – The ideal candidate should be able to comprehend business requirements, and must ensure that all the data models and implementations can be traced back to the business strategy and security key principles. – The Data Architect will provide services for Information Security team and enterprise security initiatives. – The Data Architect for Database Security will work with Business partners, MP Project Developers, Product Managers to understand the Business Requirements, Database access patterns, Application functionality and database configuration. The person should be able to create Data Models, based on the requirements and should be able to integrate data classification in the Models, ensuring data security. This candidate will be involved into design and architecture of Database Security policy, Data Discovery, Data Security Architecture and special database level auditing, alerts and controls. *Must Have Skills:* – Excellent Design and Data Architectural skills needed for the position. – Must have Information Security Architecture experience – Good understanding of Hardware, platforms, hosting: servers, network components and security devices and where they are kept – Must be able to create Interfaces between applications – that is: Events, messages and data flows. – Understanding of Local and wide area networks, Internet connectivity – Must have an experience in online ecommerce Industry with High Volume of Traffic flowing in and out. – Technical Expert in Database Platforms like Oracle, MySQL, Teradata, Hadoop and other No SQL Databases *Thanks Regards, * *Manmohan singh, * *Technical Recruiter BHANINFO Inc | Enterprise Information Intelligence Integrator 1572One Blue Hills Plaza Pearl River NY 10965 P: 845-613-0660 || E: mohan.si...@bhaninfo.com mohan.si...@bhaninfo.com G-Talk : mohan.bhaninfo ||YIM : mohan.bhaninfo www.bhaninfo.com http://www.bhaninfo.com* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Need Sr. Data Architect / Data Security Architect
*Hi* *Hope you are doing good send resumes to **mohan.si...@bhaninfo.com* mohan.si...@bhaninfo.com *Sr. Data Architect / Data Security Architect* *Location : CA* *Rate : open* The ideal candidate should be able to comprehend business requirements, and must ensure that all the data models and implementations can be traced back to the business strategy and security key principles. The Data Architect will provide services for Information Security team and enterprise security initiatives. The Data Architect for Database Security will work with Business partners, MP Project Developers, Product Managers to understand the Business Requirements, Database access patterns, Application functionality and database configuration. The person should be able to create Data Models, based on the requirements and should be able to integrate data classification in the Models, ensuring data security. This candidate will be involved into design and architecture of Database Security policy, Data Discovery, Data Security Architecture and special database level auditing, alerts and controls. *Must Have Skills:* Excellent Design and Data Architectural skills needed for the position. Must have Information Security Architecture experience Good understanding of Hardware, platforms, hosting: servers, network components and security devices and where they are kept Must be able to create Interfaces between applications – that is: Events, messages and data flows. Understanding of Local and wide area networks, Internet connectivity Must have an experience in online ecommerce Industry with High Volume of Traffic flowing in and out. Technical Expert in Database Platforms like Oracle, MySQL, Teradata, Hadoop and other No SQL Databases *Thanks Regards, * *Manmohan singh, * *Technical Recruiter BHANINFO Inc | Enterprise Information Intelligence Integrator 1572One Blue Hills Plaza Pearl River NY 10965 P: 845-613-0660 || E: mohan.si...@bhaninfo.com mohan.si...@bhaninfo.com G-Talk : mohan.bhaninfo ||YIM : mohan.bhaninfo www.bhaninfo.com http://www.bhaninfo.com* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Need Sr. Data Architect / Data Security Architect
*Hi* *Hope you are doing good send resumes to **mohan.si...@bhaninfo.com* mohan.si...@bhaninfo.com *Need Sr. Data Architect / Data Security Architect* *1) **Sr. Data Architect / Data Security Architect* * Location : CA* * Rate : open* – The ideal candidate should be able to comprehend business requirements, and must ensure that all the data models and implementations can be traced back to the business strategy and security key principles. – The Data Architect will provide services for Information Security team and enterprise security initiatives. – The Data Architect for Database Security will work with Business partners, MP Project Developers, Product Managers to understand the Business Requirements, Database access patterns, Application functionality and database configuration. The person should be able to create Data Models, based on the requirements and should be able to integrate data classification in the Models, ensuring data security. This candidate will be involved into design and architecture of Database Security policy, Data Discovery, Data Security Architecture and special database level auditing, alerts and controls. *Must Have Skills:* – Excellent Design and Data Architectural skills needed for the position. – Must have Information Security Architecture experience – Good understanding of Hardware, platforms, hosting: servers, network components and security devices and where they are kept – Must be able to create Interfaces between applications – that is: Events, messages and data flows. – Understanding of Local and wide area networks, Internet connectivity – Must have an experience in online ecommerce Industry with High Volume of Traffic flowing in and out. – Technical Expert in Database Platforms like Oracle, MySQL, Teradata, Hadoop and other No SQL Databases *Thanks Regards, * *Manmohan singh, * *Technical Recruiter BHANINFO Inc | Enterprise Information Intelligence Integrator 1572One Blue Hills Plaza Pearl River NY 10965 P: 845-613-0660 || E: mohan.si...@bhaninfo.com mohan.si...@bhaninfo.com G-Talk : mohan.bhaninfo ||YIM : mohan.bhaninfo www.bhaninfo.com http://www.bhaninfo.com* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Need Sr. Data Architect / Data Security Architect
*Hi* *Hope you are doing good send resumes to **mohan.si...@bhaninfo.com* mohan.si...@bhaninfo.com Need Sr. Data Architect / Data Security Architect Sr. Data Architect / Data Security Architect Location : CA Rate : open – The ideal candidate should be able to comprehend business requirements, and must ensure that all the data models and implementations can be traced back to the business strategy and security key principles. – The Data Architect will provide services for Information Security team and enterprise security initiatives. – The Data Architect for Database Security will work with Business partners, MP Project Developers, Product Managers to understand the Business Requirements, Database access patterns, Application functionality and database configuration. The person should be able to create Data Models, based on the requirements and should be able to integrate data classification in the Models, ensuring data security. This candidate will be involved into design and architecture of Database Security policy, Data Discovery, Data Security Architecture and special database level auditing, alerts and controls. Must Have Skills: – Excellent Design and Data Architectural skills needed for the position. – Must have Information Security Architecture experience – Good understanding of Hardware, platforms, hosting: servers, network components and security devices and where they are kept – Must be able to create Interfaces between applications – that is: Events, messages and data flows. – Understanding of Local and wide area networks, Internet connectivity – Must have an experience in online ecommerce Industry with High Volume of Traffic flowing in and out. – Technical Expert in Database Platforms like Oracle, MySQL, Teradata, Hadoop and other No SQL Databases *Thanks Regards, * *Manmohan singh, * *Technical Recruiter BHANINFO Inc | Enterprise Information Intelligence Integrator 1572One Blue Hills Plaza Pearl River NY 10965 P: 845-613-0660 || E: mohan.si...@bhaninfo.com mohan.si...@bhaninfo.com G-Talk : mohan.bhaninfo ||YIM : mohan.bhaninfo www.bhaninfo.com http://www.bhaninfo.com* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Multiple Requirements Need Sr. Data Architect / Data Security Architect,Sr.java developer/IOS/Android Developers
*Hi* *Hope you are doing good send resumes to mohan.si...@bhaninfo.com mohan.si...@bhaninfo.com* *Need Sr. Data Architect / Data Security Architect,Sr.java developer/IOS/Android Developers* *1) **Sr. Data Architect / Data Security Architect* * Location : CA* * Rate : open* – The ideal candidate should be able to comprehend business requirements, and must ensure that all the data models and implementations can be traced back to the business strategy and security key principles. – The Data Architect will provide services for Information Security team and enterprise security initiatives. – The Data Architect for Database Security will work with Business partners, MP Project Developers, Product Managers to understand the Business Requirements, Database access patterns, Application functionality and database configuration. The person should be able to create Data Models, based on the requirements and should be able to integrate data classification in the Models, ensuring data security. This candidate will be involved into design and architecture of Database Security policy, Data Discovery, Data Security Architecture and special database level auditing, alerts and controls. *Must Have Skills:* – Excellent Design and Data Architectural skills needed for the position. – Must have Information Security Architecture experience – Good understanding of Hardware, platforms, hosting: servers, network components and security devices and where they are kept – Must be able to create Interfaces between applications – that is: Events, messages and data flows. – Understanding of Local and wide area networks, Internet connectivity – Must have an experience in online ecommerce Industry with High Volume of Traffic flowing in and out. – Technical Expert in Database Platforms like Oracle, MySQL, Teradata, Hadoop and other No SQL Databases *2) Sr. Java Developer with good PHP, Java , HTML, XMP, UI design and development of web applications* * Location: San Jose* * Rate : open* · Back End ( database , Web Server ) and Front End ( UI ) Application architecture and design · Back End and Front End ( UI ) development using PHP, Java, SQL ( My SQL, Oracle or MS SQL Server ) , MS Office · Web Serves management / design and development of web services · Perform Admin tasks in C3 / Linux and windows environment ( create jobs, monitoring , etc.. ) · Excellent communication skills · Be able to work independently and as a team member .. · Technical skills: PHP, SQL, Java, HTML , Linux, etc.. *3) Urgent - iOS Android Requirements* *Location : CA* *Rate : open* *Android:* · 4+ years of experience in *Android Development*. · Strong *Java* skills. · Good experience of *OO concepts design*. · Experience building Android applications that are available on Google Play would be a plus. · Knowledge of *OpenGL ES and building graphics* applications. · *JDK, Web Sockets* knowledge required. · Nice to have: *JavaScript, Git, C++ coding*. · Has to be self-driven to get new projects off the ground. · Interest in creating a good application experience and knowledge of what it entails. *4) iOS:* • 4+ years of experience in iOS Development. • Strong *Objective-C skills*. • Good experience of *OO concepts design*. • Experience building iOS applications that are available on Apple Store would be a plus. • Knowledge of *OpenGL ES and building graphics applications.* • *Web Sockets* knowledge required. • Nice to have: *JavaScript, Git, C++ coding*. • Has to be self-driven to get new projects off the ground. • Interest in creating a good application experience and knowledge of what it entails. *Thanks Regards, * *Manmohan singh, * *Technical Recruiter BHANINFO Inc | Enterprise Information Intelligence Integrator 1572One Blue Hills Plaza Pearl River NY 10965 P: 845-613-0660 || E: mohan.si...@bhaninfo.com mohan.si...@bhaninfo.com G-Talk : mohan.bhaninfo ||YIM : mohan.bhaninfo www.bhaninfo.com http://www.bhaninfo.com* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Windows Security Architect || Erlanger, KY
Hello Partners, We are looking for *Security Architect* for one of our client at *Erlanger, KY*. Please let me know your interest. *Windows Security Architect* *Location: Erlanger, KY* *Duration: 13+ Months* *Rate: $65/hr* *Requirements/Must Have**: * · Experience creating information security standards · Expert in developing and implementing information security requirements. · Expert in designing and implanting information security systems. · Expert in information security best practices. *Skills Qualification**:* · Microsoft Windows security systems · Microsoft Active Directory · Unix security system · *LDAP authentication systems * · Database security · Network file share security systems · Experience in security risk assessment · Writing information security requirements *Thanks Regards* *Dev Chauhan* *International Technical Solutions (ITS)* D: 206-274-4684 F: 206-319-4579 dev.chau...@i-tecsol.com himanshu.kak...@i-tecsol.com Note: We respect your Online Privacy. This is not an unsolicited mail. Under Bills.1618 Title III passed by the 105th U.S. Congress this mail cannot be considered Spam as long as we include Contact information and a method to be removed from our mailing list. If you are not interested in receiving our e-mails then please reply with a REMOVE in the subject line at supp...@i-tecsol.com and mention all the e-mail addresses to be removed with any e-mail addresses, which might be diverting the e-mails to you. We are sorry for the inconvenience. -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Security Architect Location – Erlanger, KY Duration – 8-12 months
*Security Architect* *Location – Erlanger, KY* *Duration – 8-12 months* *Send Resumes at vina...@idctechnologies.com vina...@idctechnologies.com* *Interview process – Phone and Skype ok. If local, then face to face.* Role Description : Establishes technical standards, architects system design, configuration based on requirements and best practices. Expert in Risk Assessment and vulnerability / threat management. Desired Experience : 6.00 yrs. General Description : As a security architect, the candidate for this position will be responsible for developing information security requirements, standards, and best practices for a wide range of company technology projects. This position will participate in working meetings to determine risk and develop appropriate information security controls with other project managers. *Requirements/Must Have : Experience creating information security standards Expert in developing and implementing information security requirements. Expert in designing and implanting information security systems.* *Expert in information security best practices. Skills Qualification : Microsoft Windows security systems Microsoft Active Directory Unix security system LDAP authentication systems Database security Network file share security systems Experience in security risk assessment Writing information security requirements* Warm Regards, Vinayak Ram IDC Technologies Inc 1851 McCarthy Blvd, Milpitas, CA 95035 Work: 408-470-3749 Mailto: vina...@idctechnologies.com Website: www.idctechnologies.com -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
Sr. Data Architect / Data Security Architect at San Jose, CA
*Title: **Sr. Data Architect / Data Security Architect* *Duration: **6 months+* *Location: **San Jose, CA* *Rate: Open* *Top Overall Skills / Experience:* · *Oracle* · *Architecture/design* · *DBA (Teradata and MySQL are nice to have)* · *Database Security* *Job Overview:* Sr. Data Architect / Data Security Architect – The ideal candidate should be able to comprehend business requirements, and must ensure that all the data models and implementations can be traced back to the business strategy and security key principles. – The Data Architect will provide services for Information Security team and enterprise security initiatives. – The Data Architect for Database Security will work with Business partners, MP Project Developers, Product Managers to understand the Business Requirements, Database access patterns, Application functionality and database configuration. The person should be able to create Data Models, based on the requirements and should be able to integrate data classification in the Models, ensuring data security. This candidate will be involved into design and architecture of Database Security policy, Data Discovery, Data Security Architecture and special database level auditing, alerts and controls. *Regards,* *Rahman, * *Sr Resource Recruiter* *rahm...@usmsystems.com rahm...@usmsystems.com* *703 246 1849* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
IMMEDIATE START :-Network Security Architect with DBAM(Database Activity Monitoring),ROCKLIN, CA
*Hello All,* *Please go through the job description and let me know your interest.Please revert back with your updated resume with your contact at vi...@itscient.com vi...@itscient.comPosition:- Network Security Architect with DBAM(Database Activity Monitoring)Location: ROCKLIN, CADuration: 6+MonthsJOB DESCRIPTIONRequired Skills Experience* - *8-10 years over all experience in enterprise wide roll-out of DBAM* - *Hands on experience in design/implementation of DBAM for small or medium enterprise clients* - *Experience in implementation of any of the DBAM products such as Imperva* - *Experience in gathering requirements and creating use cases for DBAM services* - *Experience in agent deployment, policy configuration, report generation, alerts configuration* - *Good Client interaction skills* - *Excellent communication skills* *Desired Skills ExperienceGood knowledge in Data security MaskingGood knowledge in Database concepts, schema objects, tablespacesProfessional certifications (or equivalent) in Enterprise Security* *Thanks And Regard,* *Vicky Kumar * *ll IT-SCIENT - Talent Management Group ll* *ll Phone: 510 870 5083 ll Fax: 877.701.4872* *ll Email: vi...@itscient.com vi...@itscient.com ll Web: www.itscient.com http://www.itscient.com/* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
IMMEDIATE START :-Network Security Architect with DBAM(Database Activity Monitoring),ROCKLIN, CA
*Hello All,Please go through the job description and let me know your interest.Please revert back with your updated resume with your contact at vi...@itscient.com vi...@itscient.comPosition:- Network Security Architect with DBAM(Database Activity Monitoring)Location: ROCKLIN, CADuration: 6+MonthsJOB DESCRIPTIONRequired Skills Experience* - *8-10 years over all experience in enterprise wide roll-out of DBAM* - *Hands on experience in design/implementation of DBAM for small or medium enterprise clients* - *Experience in implementation of any of the DBAM products such as Imperva* - *Experience in gathering requirements and creating use cases for DBAM services* - *Experience in agent deployment, policy configuration, report generation, alerts configuration* - *Good Client interaction skills* - *Excellent communication skills* *Desired Skills ExperienceGood knowledge in Data security MaskingGood knowledge in Database concepts, schema objects, tablespacesProfessional certifications (or equivalent) in Enterprise Security* *Thanks And Regard,* *Vicky Kumar * *ll IT-SCIENT - Talent Management Group ll* *ll Phone: 510 870 5083 ll Fax: 877.701.4872* *ll Email: vi...@itscient.com vi...@itscient.com ll Web: www.itscient.com http://www.itscient.com/* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
REQUIREMENT:::Network Security Architect/Managers/Analyst at Houston, TX
Hello Hope you are doing great today!!! This is Imtiaz from Canopyone. I have an excellent opportunity from one of our clients. I would appreciate if you give prompt response on this. Please do respond back to imt...@canopyone.com *Position:*Network Security Architect/Managers/Analyst *Duration:* Long Term *Location:*Houston, TX *JOB DESCRIPTION* · The role should be specifically to implement the SIEM and depending on the length of the engagement, help us complete the build-out of the SOC (following the PwC blueprint). · Expert Level QRadar SIEM implementation experience in an enterprise environment · Familiarity with QRadar Models: 3124, 1624, 1724 · Competence with QRadar v7.2 · Strong understanding of QRadar architecture · Experience creating complex event and flow rules · Experience on-boarding diverse systems' logs · Experience in the setup of Threat Intelligence · Experience managing and logically applying building blocks and network hierarchy · Working knowledge of Linux required · Familiarity with regular expressions would be a bonus · Understand network architecture and communications · Knowledge of TCP/IP · Previous experience building a SOC would be beneficial *Please Email me a copy of your WORD formatted resume along with details as mentioned below.* *Full Name:* *Current Location, City and State:* *Mobile and Home Phone No:* *Email ID:* *US work authorization:* *Visa Expiry date (If H1/EAD):* *Highest Educational degree:* *Overall years of experience* *Currently on a project:* *Willingness to relocate across US: * *Last 4 digit of SSN#* *Interview Availability:* *Available to join from* (*Availability)*: *Education:* *Skype Id:* *Expected Hourly Rate(c2c):* *If this project does not match your exact skills perhaps you know of someone with the necessary experience and availability; if so, please feel free to forward this e-mail at your discretion or pass on their references to me.* *Thanks regards,* *Imtiaz* *IT Recruiter* [image: Description: Description: Description: Description: cid:image001.png@01CC72EB.BA1A2B60]|| *Tel: **703-831-8282 Ext. 221* ||* fax: **703-439-2550* |*imt...@canopyone.com* |imt...@canopyone.com | *www.canopyone.com* http://www.canopyone.com/ || *4229 Lafayette Center Dr , Suite #1625, Chantilly, VA 20151* *Disclaimer:* If you have received this email in error or prefer not to receive such emails in the future, please reply with REMOVE in the subject line. All remove requests will be honored ASAP. We sincerely apologize for any inconvenience caused. -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
New job - Security Architect - In-Person Interview - Jersey city - New Jersey
A new Job, ID: 229286 http://www.ejobsville.com/display-job/229286 was added at eJobsVille.com - For the Best Tech Jobs in Town http://www.ejobsville.com/ Title: Security Architect posted on 2014-08-20 13:56:38 Job Description:The Information Security Architect is responsible for developing and maintaining the enterprise information security architecture. Additionally they will develop and enforce information security technology standards, roadmaps, and governance. The Security Architect collaborates within the information technology team and the throughout the business to develop and maintain technology roadmap components to optimize security architecture processes. The Security Architect is expected to demonstrate leadership expertise to execute strategic direction as well as technical expertise in information security management, infrastructure architecture, and an extensive knowledge of PCI DSS requirements and validation methodologies. *Responsibilities*: · Determines security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates. · Plans security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; designs public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards. · Verification of delivered technical solutions against previously approved architecture specifications and change requests. · Actively lead information security architecture design using formal risk management methodologies · Responsible for yearly PCI Audit and Certification · Collaborate with information technology teams to implement and maintain information security roadmap components. · Develop and enforce information security architecture standards (enterprise computing, Cloud, network, virtualization, etc.) and best practices as well as enterprise technology platform standards [operating system, database servers, application servers, application integration (ESB), virtualization, Cloud, etc.] · Communicate and evangelize with key stakeholders in the organization the risks associated with information assets and the opportunities presented by the security architecture · Maintain general awareness of developments in the information security marketplace including vendor strategies and report on their potential impact on and applicability to the organization · Assist business and technical analysts with the identification of threats to information security, appropriate mitigating controls and assessment of residual risks · Assist engineers with the application of the security architecture and the design of secure information systems solutions · Technologies and understanding of the technologies involved in the role include Firewall, IDS / IPS, Security Information Event Management tools, IT GRC, Proxies, Forensic tools, Encryption (data at rest and in transit), VPN, web proxies. · Even though the position is for an Information Security Architect, there will be opportunities and challenges outside the strict definition of the role, as needed. · Excellent oral and written communication skills. · Strong teamwork abilities, leadership, integrity, and relationship-building skills. · Time management skills are a must, as well as the ability to be flexible and creative. · Participates in IT Security assessments, risk analysis and reporting · Responds to requests for information on IT company policies, practices, guidelines and standards. · The ability to conceptualize complex business and technical requirements into comprehensible models and templates. · Ability to work well under minimal supervision. · Coaching / mentoring junior staff *Qualifications:* · 7-10 years’ experience in Information Security Architecture Design, with a broad exposure to infrastructure/network and multiplatform environments. · Strong understanding of Compliance and Regulations (ISO/IEC 27001/27002, COBIT, ITAR, Sarbanes Oxley, PCI-DSS) · Strong understanding of securing Virtualized, Cloud, Citrix architectures · Strong understanding of securing BYOD environments (Mobile Device Management) · Knowledge and experience of Network Security and Internet Security. · Knowledge and experience of enterprise class security tools and their capabilities, limitations etc. · Be able to build strong working relationships. · Experience
OIM Security Architect || Saline, MI
Hello Partners, We are looking for *OIM Security Architect *for one of our client at *Saline, MI*. Please let me know your interest. *OIM Security Architect * *Location: Saline, MI* *Duration: 13+ Months* *General Description:* Security Architect responsible for designing and architecting security solutions. Heavy involvement with the implementation of Oracle Identity and Access Management including reconciliation, access management application integration *Requirements/Must Have: * · *Experience with Oracle Identity Management 11gR2 * · *Oracle Identity Manager * · *Oracle Access Manager including Federation * · *Oracle Unified Directory * · *Oracle HTTP Server * · *WebLogic Experience integrating applications with SaaS providers * · *Java development * · *Linux experience* *Thanks Regards* *Dev Chauhan* *International Technical Solutions (ITS)* D: 206-274-4684 F: 206-319-4579 dev.chau...@i-tecsol.com himanshu.kak...@i-tecsol.com Note: We respect your Online Privacy. This is not an unsolicited mail. Under Bills.1618 Title III passed by the 105th U.S. Congress this mail cannot be considered Spam as long as we include Contact information and a method to be removed from our mailing list. If you are not interested in receiving our e-mails then please reply with a REMOVE in the subject line at supp...@i-tecsol.com and mention all the e-mail addresses to be removed with any e-mail addresses, which might be diverting the e-mails to you. We are sorry for the inconvenience. -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
IMMEDIATE NEEDED:-NETWORK SECURITY Architect,St. louis, MO
*Hello All,* *Please go through the job description and let me know your interest.* *Please revert back with updated resume at * *//vi...@itscient.com vi...@itscient.com * *Position:-NETWORK SECURITY ArchitectLocation:- St. louis, MODuration: 6+MonthsJob Description:* - *GOOD experience in Enterprise Security spanning Firewalls, IPS, VPN, and other network security technologies such as Anti-Virus, web proxy, content filtering solution, etc* - *Hard skills 3 to 4 years experience in enterprise infrastructure securityb* - *3 -4 years’ experience in managing system integration projects in Security field.* - *Experience in dealing with infrastructure projects related to demergers, datacenter transformations, acquisitions, etc would be preferred* - *Experience in technologies like Cisco ASA firewalls, Symantec Antivirus, Cisco Web security, Sourcefire FireAMP, Cisco ISE, Cisco ACS, etc would be desired* - *Strong stakeholder communication skills* *Thanks and Regards,* *_* *Vicky Kumar Menon ll IT-SCIENT - Talent Management Group Phone: 510 870 5083 510%20870%205083 ll Fax: 877.701.4872 877.701.4872 ll *Email: vi...@itscient.com vi...@itscient.com **ll Web: www.itscient.com http://www.itscient.com ll* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
New job - Network Security Architect - Phone-hire - Skype Interview - Raleigh- North Carolina
A new Job, ID: 211884 http://www.ejobsville.com/display-job/211884 was added at eJobsVille.com - For the Best Tech Jobs in Town http://www.ejobsville.com/ Title: Network Security Architect posted on 2014-07-23 14:19:18 Job Description:Hi , Greetings from EApps Tech LLC…!!! My name is Srikanth we have a job opportunity for you as a *Network Security Architec *one of our client based at *Jersey city NJ. * *Job Title: Network Security Architect **at* *Location* *: **Jersey city NJ.* *Duration: 6 months* *Start date: ASAP* *Job Description :* Our client need of a Information Security Architect is responsible for developing and maintaining the enterprise information security architecture. Additionally they will develop and enforce information security technology standards, roadmaps, and governance. The Security Architect collaborates within the information technology team and the throughout the business to develop and maintain technology roadmap components to optimize security architecture processes. The Security Architect is expected to demonstrate leadership expertise to execute strategic direction as well as technical expertise in information security management, infrastructure architecture, and an extensive knowledge of PCI DSS requirements and validation methodologies. Qualifications: · 7-10 years’ experience in Information Security Architecture Design, with a broad exposure to infrastructure/network and multiplatform environments. · Strong understanding of Compliance and Regulations (ISO/IEC 27001/27002, COBIT, ITAR, Sarbanes Oxley, PCI-DSS) · Strong understanding of securing Virtualized, Cloud, Citrix architectures · Strong understanding of securing BYOD environments (Mobile Device Management) · Knowledge and experience of Network Security and Internet Security. · Knowledge and experience of enterprise class security tools and their capabilities, limitations etc. · Be able to build strong working relationships. · Experience in designing, developing and implementing security policies and technical documentation for an onshore/offshore development model · Experience of Security Awareness programs. · Knowledge of Outsourcing business, organization and personalities. · Knowledge of a security-specific architecture methodology (for example, SABSA). · Knowledge and experience of Service Management (ITIL). · Formal training in a relevant enterprise architecture methodology (for example, the Zachman Framework or TOGAF). · Professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials. · Bachelor’s Degree or master’s degree in computer science, information systems or other related field; or equivalent work experience. Skills and Competencies - Data and Network Encryption, 2-Factor authentication, Encryption Key Management, Security Event Management, SSH Key Management, Web Application Firewalls, Network Firewalls, Proxy Servers, SPAM Filtering, Digital Rights Protection, Anti-Malware software *Click here to view full job description and apply http://www.ejobsville.com/display-job/211884 (Registration not mandatory to apply for this job)* -- Best regards, eJobsVille.com - For The Best Tech Jobs In Town -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
New job - Security Architect - Phone-hire - Skype Interview - Jersey City- New Jersey
A new Job, ID: 211904 http://www.ejobsville.com/display-job/211904 was added at eJobsVille.com - For the Best Tech Jobs in Town http://www.ejobsville.com/ Title: Security Architect posted on 2014-07-23 15:09:13 Job Description:*Job Title : Security Architect* Location : Jersey City, NJ Duration : *Long Term* Interview Type: Phone and Skype *Job Description:* *Security Architect* The Information Security Architect is responsible for developing and maintaining the enterprise information security architecture. Additionally they will develop and enforce information security technology standards, roadmaps, and governance. The Security Architect collaborates within the information technology team and the throughout the business to develop and maintain technology roadmap components to optimize security architecture processes. The Security Architect is expected to demonstrate leadership expertise to execute strategic direction as well as technical expertise in information security management, infrastructure architecture, and an extensive knowledge of PCI DSS requirements and validation methodologies. Responsibilities: · Determines security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates. · Plans security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; designs public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards. · Verification of delivered technical solutions against previously approved architecture specifications and change requests. · Actively lead information security architecture design using formal risk management methodologies · Responsible for yearly PCI Audit and Certification · Collaborate with information technology teams to implement and maintain information security roadmap components. · Develop and enforce information security architecture standards (enterprise computing, Cloud, network, virtualization, etc.) and best practices as well as enterprise technology platform standards [operating system, database servers, application servers, application integration (ESB), virtualization, Cloud, etc.] · Technologies and understanding of the technologies involved in the role include Firewall, IDS / IPS, Security Information Event Management tools, IT GRC, Proxies, Forensic tools, Encryption (data at rest and in transit), VPN, web proxies. · Even though the position is for an Information Security Architect, there will be opportunities and challenges outside the strict definition of the role, as needed. · Excellent oral and written communication skills. · Strong teamwork abilities, leadership, integrity, and relationship-building skills. · Time management skills are a must, as well as the ability to be flexible and creative. · Participates in IT Security assessments, risk analysis and reporting · Responds to requests for information on IT company policies, practices, guidelines and standards. · The ability to conceptualize complex business and technical requirements into comprehensible models and templates. · Ability to work well under minimal supervision. · Coaching / mentoring junior staff Qualifications: · 7-10 years’ experience in Information Security Architecture Design, with a broad exposure to infrastructure/network and multiplatform environments. · Strong understanding of Compliance and Regulations (ISO/IEC 27001/27002, COBIT, ITAR, Sarbanes Oxley, PCI-DSS) · Strong understanding of securing Virtualized, Cloud, Citrix architectures · Strong understanding of securing BYOD environments (Mobile Device Management) · Knowledge and experience of Network Security and Internet Security. · Knowledge and experience of enterprise class security tools and their capabilities, limitations etc. · Experience of Security Awareness programs. · Knowledge of Outsourcing business, organization and personalities. · Knowledge of a security-specific architecture methodology (for example, SABSA). · Knowledge and experience of Service Management (ITIL). · Formal training in a relevant enterprise architecture methodology (for example, the Zachman Framework or TOGAF). · Professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security
New job - Security Architect - Phone-hire - Skype Interview - Jersey City- New Jersey
A new Job, ID: 211090 http://ejobsville.com/display-job/211090 was added at eJobsVille.com - For the Best Tech Jobs in Town http://ejobsville.com/ Title: Security Architect posted on 2014-07-22 20:15:21 Job Description:*Job Description:* - Security Architecture Design, with a broad exposure to infrastructure/network and multiplatform environments. - Strong understanding of Compliance and Regulations (ISO/IEC 27001/27002, COBIT, ITAR, Sarbanes Oxley, PCI-DSS) - Strong understanding of securing Virtualized, Cloud, Citrix architectures - Strong understanding of securing BYOD environments (Mobile Device Management) - Knowledge and experience of Network Security and Internet Security. - Knowledge and experience of enterprise class security tools and their capabilities, limitations etc. - Be able to build strong working relationships. - Experience in designing, developing and implementing security policies and technical documentation for an onshore/offshore development model - Experience of Security Awareness programs. - Knowledge of Outsourcing business, organization and personalities. - Knowledge of a security-specific architecture methodology (for example, SABSA). - Knowledge and experience of Service Management (ITIL). - Formal training in a relevant enterprise architecture methodology (for example, the Zachman Framework or TOGAF). - Professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials. - Bachelor’s Degree or master’s degree in computer science, information systems or other related field; or equivalent work experience. - Plans security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; designs public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards. Job Requirements: *Job Title: Security Architect * *Location: Jersey city, NJ* *Duration: 6Months* *Job Description:* - Security Architecture Design, with a broad exposure to infrastructure/network and multiplatform environments. - Strong understanding of Compliance and Regulations (ISO/IEC 27001/27002, COBIT, ITAR, Sarbanes Oxley, PCI-DSS) - Strong understanding of securing Virtualized, Cloud, Citrix architectures - Strong understanding of securing BYOD environments (Mobile Device Management) - Knowledge and experience of Network Security and Internet Security. - Knowledge and experience of enterprise class security tools and their capabilities, limitations etc. - Be able to build strong working relationships. - Experience in designing, developing and implementing security policies and technical documentation for an onshore/offshore development model - Experience of Security Awareness programs. - Knowledge of Outsourcing business, organization and personalities. - Knowledge of a security-specific architecture methodology (for example, SABSA). - Knowledge and experience of Service Management (ITIL). - Formal training in a relevant enterprise architecture methodology (for example, the Zachman Framework or TOGAF). - Professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials. - Bachelor’s Degree or master’s degree in computer science, information systems or other related field; or equivalent work experience. - Plans security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; designs public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards. *Click here to view full job description and apply http://ejobsville.com/display-job/211090 (Registration not mandatory to apply for this job)* -- Best regards, eJobsVille.com - For The Best Tech Jobs In Town -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com
Urgent Needed : Security Architect for KY only locals ..
Hi, My name is Vijay . I have great opportunity for which I need skilled candidates . Please read through my SOW below and let me know if you have any candidates for the open positions. on C2C. Hopefully we can build an alliance for a great partnership. Please send resumes to *vijay.addon...@gmail.com vijay.addon...@gmail.com* Job Role : Security Architect Location : Erlanger, KY Duration : 4-6 months *MUST have Juniper VPN and Bluecoat Proxy experience* Role : Security Architect Role Description : Establishes technical standards, architects system design, configuration based on requirements and best practices. Expert in Risk Assessment and vulnerability / threat management. Desired Experience : 5.00 yrs. General Description : Upgrading existing Juniper VPN and Bluecoat Proxy server implementations to latest version. Current rule sets need to be totally re-worked, so they are more easily managed. Architecture considerations should include future need for expansion of SSL decryption of web browsing and data feeds to a network DLP. Requirements/Must Have : 1. Juniper VPN implementation and rule set creation experien *Thanks Regards,* *Vijay * *Contact : 908-388-1241* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
New job - Network Security Architect - Phone-hire - Skype Interview - Houston- Texas
A new Job, ID: 156530 http://www.ejobsville.com/display-job/156530 was added at eJobsVille.com - For the Best Tech Jobs in Townhttp://www.ejobsville.com Title: Network Security Architect posted on 2014-04-24 08:55:53 Job Description:Hi, Hope you are doing great! Please find the requirement below , If you find yourself comfortable with the requirement please reply back with your updated resume and I will get back to you or I would really appreciate if you can give me a call back at my contact number 609-897-9670 x 2164 Position: Network Security Architect Location: Houston, TX Interview:: Telephonic the skype Duration: 12+ Months Experienced Required:- • Experience designing, implementing and troubleshooting network security for enterprise customers (preferably within a datacenter environment) • Extensive experience in security configuration of network and security devices in a large enterprise environment (routers, switches, firewalls, intrusion detection/prevention systems) • Experience installing, configuring and troubleshooting one (1) or more of the following Cisco security technologies: ISE, IPS, ASA, CSM, VPN • Detailed understanding of TCP/IP protocols • detailed understanding of routing protocols (OSPF, RIP, EIGRP, BGP) and layer 2 protocols and technologies • Experience in project management, ability to clearly communicate security planning and technology issues verbally on both a formal and informal basis to all levels of client staff Recommended Certifications and Educational Background: • CCNP, CCSP, CCIE desired but not required. • One (1) or more of the following industry certifications: CISSP, SANS GIAC, NSA IAM REQUIRED SKILLS: • Expert-level knowledge in network security design, architecture and implementation. • In-depth knowledge of systems and network security PREFERRED SKILLS: • CCNP or higher, mainly focused on Cisco ASA with NAT 8.2, 9.1, Firewall rules, L2L VPN, AnyConnect Premium posturing with DAP’s, and Cisco ISE 1.2 with SGT and SGA familiarization. Help! Preserve trees. Please don't print this e-mail unless you really need to. Salary: DOE *Click here to view full job description and apply http://www.ejobsville.com/display-job/156530 (Registration not mandatory to apply for this job)* -- Best regards, eJobsVille.com - For The Best Tech Jobs In Town -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
New job - Java Security Architect (12+Months,OH) Locals Only.. - In-Person Interview - Columbus- Ohio
A new Job, ID: 140302 http://www.ejobsville.com/display-job/140302 was added at eJobsVille.com - For the Best Tech Jobs in Townhttp://www.ejobsville.com Title: Java Security Architect (12+Months,OH) Locals Only.. posted on 2014-04-01 10:39:35 Job Description: *Position:Java Security Architect (Locals Only)Location: Columbus, OHDuration: 12+ Month Required:-Candidate will be responsible for providing Role based access and authentication protocol.The successful candidate should have solid background in application development, broad experience over an array of information security and technical disciplines and be able to provide pragmatic, business-aligned security guidance. Good Exposure to Entitlements and Authorization processUnderstanding of cryptography. authentication, authorization, security protocols, and security vulnerabilities.Experience with security related technologies including encryption, PKI, SSL certificates, proxy services, DNS.* Good Knowledge on Active Directory Methodologies Experience providing and validating security requirements related to information system design and implementation. Recognizes problems by identifying abnormalities; reporting violations. Implements security improvements by assessing current situation; evaluating trends; anticipating requirements. Salary: DOE *Click here to view full job description and apply http://www.ejobsville.com/display-job/140302 (Registration not mandatory to apply for this job)* -- Best regards, eJobsVille.com - For The Best Tech Jobs In Town -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
New job - Information Security Architect - Client: American Airlines - Dallas, TX area - Phone-hire - Dallas- Texas
A new Job, ID: 92846 http://ejobsville.com/display-job/92846 was added at eJobsVille.com - For the Best Tech Jobs in Town http://ejobsville.com Title: Information Security Architect - Client: American Airlines - Dallas, TX area posted on 2014-01-09 06:49:31 Job Description: Client: American Airlines Information Security Architect long term contract in Dallas, TX area *Primary responsibilities: Perform detailed risk evaluation and develop mitigation plan for various IT projects, including but not limited to reviewing architecture designs and providing detailed guidance on risk mitigation. Provide consulting services to IT organization and confirm adherence to Company's security policy and regulatory requirements such as PCI, PII, HIPAA, and SOX.Act as a security liaison with Network team, and play a lead role in developing and maintaining network security strategy for the organization Serve as the subject matter expert on all matters of Enterprise Information Security. Research and recommend enhancements to the enterprise information security services.Review firewall change escalations and provide technical guidance to security engineering team Understand security policies and procedures and assist in enforcing them Research and analyze attempted breaches of data security and rectifying security weaknesses Assist in creating a catalog of Security standards and commonly used patterns in the organization Education/Experience 5-7 years experience in Information Technology with a focus on Information Security Bachelor's degree in Computer Science CISSP Certification Responsibility level Exercises independent judgment with direction from supervisor Skills Extensive knowledge in designing network security controls, such as firewalls, IDS/IPS, SIEM, WEb Application Firewalls, Internet Proxy, etc.Solid networking background, and experience with network security tools, such as network firewalls, IDs/IPS, VPN, etc. Detailed understanding for various protocols, and applications, such as TCP/IP stackExpert knowledge with various types of access control mechanisms and network segmentations, such as firewall ACLs, isolated VLANs, VRFs, VDCs, etc Capable of addressing crowds as a Security Consultant Proficiency in key aspects of Information Security (Confidentiality, Integrity, Accessibility, Authenticity, Non-Repudiation) Proficiency in Information Security controls (Administrative, Logical, Physical) General knowledge surrounding Information Security as applied at multiple layers (Platform, Networking, Mobility, Application, Web, etc.)Excellent documentation and verbal skills The ability to handle multiple projects simultaneously CISSP certification mustNetwork Security – 3-5 years Security Architecture Design – 2-3 yearsSecurity Risk Management – 2-3 yearsIdentity Access Management – 1-2 years* Click here to view full job description and applyhttp://ejobsville.com/display-job/92846 (Guest users can also apply) -- Best regards, eJobsVille.com - For The Best Tech Jobs In Town -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/groups/opt_out.
Need Snr Security Architect in MN
*Hi Partners,* *Greetings,* *Hope you are doing Well!!!* *Please forward a profiles to **shan...@techconsultinc.com*shan...@techconsultinc.com *Here are the requirement details*** -- *Data Loss Prevention Security Architect* 3 month Contract Plymouth **Must pass a drug test and background check once offered the position** The Data Loss Prevention (DLP) Architect will focus on evolving the DLP architectures, developing an approach and strategy for data discovery and data classification, creating new and evolving security services and standards pertaining to DLP, consulting with internal and external customers, and developing and documenting strategies, standards, and roadmaps for DLP architectures. Translate business requirements into technical requirements and assist other team members in designing and implementing the security requirements. Provide Technical program oversight specific to the relevant Information Security domain Identification of concepts and architectural areas of need specific to the relevant Information Security domain. *Qualifications:* 8+ years of practical experience in the field of IT is required and 5+ years Information Security experience (inclusive of the IT experience). Must have solid experience in data security, and general IT Strategy and Enterprise Architecture Must have excellent communication both in person and in teleconference situations with technical and non-technical audience and collaborators. Individuals in this role must be well versed and experienced in common Information Security practices and the CISSP domains, as well as possess Data Protection based Information Technology experience in a large organization. They must be able to leverage these experiences and education to identify opportunities for improvement in the present information security architecture as well as furnish thought leadership around enacting the necessary improvements and addressing gaps. Individuals are expected to have a strong background across all of the following information security domains, with industry expertise in, at minimum, one: Data Protection, Regulatory Compliance such as PCI, HIPAA, SoX etc. One or more of these security certifications such as CISSP, CISM, SANS GIAC, etc required Looking forward to hearing from you at the earliest!!! *Regards* *Shankar* Professional Recruiter 33505 State Street, Suite # 200 Farmington, MI 48335 *V* (248)-522-6879 *F* (248)-579-4454 *Linkedin: **www.linkedin.com/in/shkrajan*http://www.linkedin.com/in/shkrajan *Email** : **shan...@techconsultinc.com* shan...@techconsultinc.com* * *Messanger**: shankarraj...@yahoo.com* *Minority Certified and Woman Owned Enterprise* *TCI**- Technology Consultants inc* *Note:** **It is not a solicitation attempt!!!* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/groups/opt_out.
Immediate Need !! Network Security Architect !! Interview ASAP !!
Immediate Need !! *Network Security Architect* !! Interview ASAP !! Job Title: Network Security Architect Location: San Jose, CA / RTP, NC Duration: 9+months *Required skills/qualifications include: * - The ideal candidate will have technical expertise with large scale enterprise Unix and Linux systems service delivery, security concepts, strategies, tools, and implementation experience,. - Strong experience with one or more popular scripting languages (shell, perl, python, etc.), ability to write and document scripts for automation and reporting. Some experience with database design and querying in a popular database system (Oracle, MySQL, etc.) - Strong experience working with NFS storage systems (Netapp/EMC preferred), NFS client configuration, CIFS, remote data replication. Regards, Chris Roe - Staffing Manager Direct::415-251-3968 ch...@itbtalent.com |chris.requireme...@gmail.com Skype I.D :Chris.Roe 75 -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/groups/opt_out.
Need Security Architect – Must be USC Or Green Card holder in TX
*Hi Partners,* *Greetings,* *Hope you are doing Well!!!* *Please forward a profiles to **shan...@techconsultinc.com*shan...@techconsultinc.com *Here are the requirement details*** -- *BACKFILL: Security Architect – Must be USC Or Green Card holder* *Location: Houston TX (downtown)* *Duration: through 10/31/2103 – will extend or go perm thereafter* *Project/Role:* Security Architect to design and implement the required Security Infrastructure for the Web Based Managed Services Environment. *Skills Required:* US Citizen or Green Card Strong English communication skills. Experience dealing with challenging client personnel. CISSP certification required. In-depth knowledge of VPNs (Site-to-Site, SSL, etc.), Web Application Firewalls, Firewalls, Token Servers, Reverse Proxies, etc. will be required. Application security experience required End to end security architecture experience required F5 experience required Looking forward to hearing from you at the earliest!!! *Regards* *Shankar* Professional Recruiter 33505 State Street, Suite # 200 Farmington, MI 48335 *V* (248)-522-6879 *F* (248)-579-4454 *Linkedin: **www.linkedin.com/in/shkrajan*http://www.linkedin.com/in/shkrajan *Email** : **shan...@techconsultinc.com* shan...@techconsultinc.com* * *Messanger**: shankarraj...@yahoo.com* *Minority Certified and Woman Owned Enterprise* *TCI**- Technology Consultants inc* *Note:** **It is not a solicitation attempt!!!* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/groups/opt_out.
Security Architect – Must be USC Or Green Card holder Location: Houston TX (downtown)
Dear Friends, Please share the resumes for the following requirement. *BACKFILL: Security Architect – Must be USC Or Green Card holder* *Location: Houston TX (downtown)* *Duration: through 10/31/2103 – will extend or go perm thereafter* *Project/Role:* Security Architect to design and implement the required Security Infrastructure for the Web Based Managed Services Environment. *Skills Required:* US Citizen or Green Card Strong English communication skills. Experience dealing with challenging client personnel. CISSP certification required. In-depth knowledge of VPNs (Site-to-Site, SSL, etc.), Web Application Firewalls, Firewalls, Token Servers, Reverse Proxies, etc. will be required. Application security experience required End to end security architecture experience required F5 experience required Thanks and Best Regards, Rajani *Sun-IT Solutions, Inc.,* 7400 Baymeadows way, Suite # 315, Jacksonville, Fl 32256 T: 904-737-2046 ext:158,f: 904-448-0321 *raj...@sun-itsolutions.com jyoth...@sun-itsolutions.com , www.sun-itsolutions.com* *Note:** We respect your Online Privacy. This is not an unsolicited mail. Under Bills.1618 Title III passed by the 105th U.S. Congress this mail cannot be considered Spam as long as we include Contact information and a method to be removed from our mailing list. If you are not interested in receiving our e-mails then please reply with a REMOVE in the subject line at **rem...@sun-itsolutions.com** and mention all the e-mail addresses to be removed with any e-mail addresses, which might be diverting the e-mails to you. We are sorry for the inconvenience* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/groups/opt_out.
Required::: Security Architect || Lincolnshire, IL || Contract to Hire...
Hello Associates, Hope you are doing great! *Please reply to **recruite...@exatechinc.com * This is Ali Ahmed from Exatech Inc.We have an immediate need for below mention requirement, if you feel that you are a perfect match to this requirement, please forward your most updated resume along with the best time and number to carry out further discussions. Looking forward to hear from you... * * *Role:Security Architect* *Location: Lincolnshire, IL* *Duration: Contract-to-hire* *Salary: $/per year* *Interview: Phone Screen and face to face.* *GREEN CARDS OR CITIZENS PLEASE!* *Responsibilities:* Responsible for ensuring the confidentiality, integrity, and availability of computer systems, data, and network resources; working with both internal and external development teams in an effort to validate that both new and existing architectures and applications are developed and deployed in a secure manner. Responsible for creating a secure computing environment through the implementation of security standards for systems and applications, as well as security policies and guidelines. Handles the security of more complex environments, architectures and applications. Develops, coaches and mentors staff level Security Architects. · Identifies the need for new security technology solutions; designs, reviews and collaborates on the deployment of new solutions. - Contributes to the development and implementation of security technology solutions for complicated and more complex environments and architecture. · Conducts request for information/request for proposal (RFI/RFP) and vendor selection and leads the technical design of the deployment. Technologies might include: Database security; Enterprise encryption - application and whole disk; Authorization and Authentication systems such as two-factor, federated, single-sign-on, Active Directory/Light Weight Access Protocol (AD/LDAP); Cloud computing / virtualization; Data leakage identification and prevention; Network/Wireless access controls; Intrusion Detection and Prevention; Security Incident and Event Management; Web application firewalls; Host based controls; Application gateway security controls; Voice over Internet Protocol (VOIP) security controls. · Acts as a subject matter expert on the implementation and capabilities of all existing security controls, particularly in the case of complex and complicated security issues. · Develops baseline system and application hardening guides based on industry best practice and provides assistance to IT teams on current security solutions and configurations. · Conducts system architecture reviews for new technology to ensure best practices, document security solutions, and enable re-use of processes. · Assists in the ongoing documentation, development, implementation, and maintenance of processes, procedures, and services associated with architecture functions including ensuring requirements and deliverables are clearly defined. · Works with Security Operations to ensure architectures are appropriately assessed and able to be supported, contributing to the most complex solutions. · Works with Security Operations to implement new technologies and security solutions in alignment with industry best practice and commonly accepted principles of secure design. · Provides emergency support to Security Operations for escalated issues. · Provides coaching, mentoring and development to staff level Security Architects. Thanks Regards *Ali Ahmed* *Exatech Inc* *4758 Forest Ridge Dr* *Mason OH 45040* *Phone: 513-433-5532* *Email: recruite...@exatechinc.com * *Web: www.exatechinc.com* -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-abap+unsubscr...@googlegroups.com. To post to this group, send email to sap-abap@googlegroups.com. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/groups/opt_out.
Need Security Architect in IL
*Hi Partners,* ** *Greetings,* ** *Hope you are doing Well!!!* ** *Please forward a profiles to **shan...@techconsultinc.com*shan...@techconsultinc.com ** *Here are the requirement details* -- Security Architect Location: Lincolnshire, IL Length: 6 months Start: ASAP Interview: phone – in person Skills Required: · Must have 5+ years of in depth knowledge and experience with network and security technology such as: o IPSEC, o Routers, o Firewalls, o IDS/IPS, o DLP and WAF. · Experience with secure design in relation to data sharing with third parties and vendors. – · *Experience with compliance aspects such as Privacy, HIPAA and PCI. * · CISSP or other applicable certifications. · Excellent comm. skills Regards, Shankar 248-522-6879 Technology consultanst inc -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to sap-abap@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/sap-abap?hl=en.
Urgent-: Oracle EBS Security Architect Required - Greenbay, WI
Hello Guys, Hope you are doing well! we have a urgent req from our client based in Greenbay, WI. pls have a look and send me suitable profile ASAP. Role -: Oracle EBS Security Architect Location -: Greenbay, WI Duration -: 1+ year Tasks/Responsibilities: · Security Architect: o Review and evaluate current Oracle R11 Custom Menus/functions/responsibilities approach and structure and recommend model/strategy o Review custom responsibility recommend Oracle R12 migration § Seeded versus Custom Mapping § Strategy for developing custom responsibilities § Implementation of RBAC o Assist with development of R11 to R12 migration path based on newly developed strategy o Knowledge transfer to Customer IS security team o Assist with development of project plan · Security Administration: o Build new Oracle R12 security · Timing o Targeting 5/21 start date thanks - -- Achin IDC Technologies, Inc1851 McCarthy Blvd, Milpitas, CA 95035 E-: HYPERLINK mailto:ac...@idctechnologies.comac...@idctechnologies.com P-: +1-408-852-7192 W-:http://www.idctechnologies.com/ Connect me : G- nigamachin Y- achin_quest -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to sap-abap@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/sap-abap?hl=en.
Need Network Security Architect -Firewall Rapid 7 Expert 12 mo - MN - Minneapolis
*Hi Partners,* ** *Greetings,* ** *Hope you are doing Well!!!* ** *Please forward a profiles to **shan...@techconsultinc.com*shan...@techconsultinc.com ** *Here are the requirement details* This is more on the analyst role and there could be another one coming yet. The manager/team are looking for an individual that has strong hands on engineering experience with Firewalls. Key words to focus on are: Rapid 7 - penetration testing and vulnerability management, VPN. They need someone who is well rounded in infrastructure/network projects. * * *MN - Minneapolis* *Database Architect - Expert (1722356) * *12 mo* Senior Network Security Architect – Consultant: Client is seeking an experienced Network Security Architect to design and implement network security solutions. Utilities have been named by the Department of Homeland Security as one of the primary targets for cyber threats. As a critical infrastructure provider, our job is to protect our systems from deliberate threats to our power grid. Similarly, we protect our corporate and customer's information against data loss. Due to the rise in cyber security threats and increased regulations, we're looking for an individual that has a wide base of experience in helping to protect the delivery of reliable energy to our customers. *Position Summary:* The position is for a lead security architect to re-design and re-engineer the enterprise firewall and VPN solutions to protect Xcel Energy’s network, cyber assets, power grid and customer data. · Apply expert level business and technical acumen while defining security solutions that deliver best practices for building and monitoring controls for information protection and threat management · Protect the company against risks of data loss and vulnerability management as well as drive initiatives to ensure compliance with regulatory requirements from agencies such as FERC, NERC, and Department of Homeland Security (such as CIP, HIPAA, SOX, PCI). *Essential Responsibilities*: • Design and implement enterprise wide security solutions to ensure deployed solutions minimize security and privacy risks. • Provide expert level knowledge and expertise on firewalls, VPN, IDP, information risk management, compliance and other security related expertise. • Provide consulting expertise to all stakeholders to ensure plans are integrated into overall strategic and operational plans. • Provide architecture guidance for security and direction. • Evaluate vendor and internal security technologies for security capabilities and integration into a service delivery environment • Document and communicate security assessments and product security reviews. • Interpret business, compliance, and security requirements, operational requirements, enterprise/customer requirements, conduct rigorous analysis, assess security of the code/system, create recommendations, prioritize solutions, and work with business to mitigate exposure to achieve the desired risk posture. • Actively partner with infrastructure, application and other stakeholders to ensure deployed solutions minimize security and privacy risks. • Contribute to industry practices, and stay current on trends. • Provide threat assessment, analysis and risk mitigation for infrastructure and applications. • Stay abreast of industry and technology trends and best practices to advise leadership on when to innovate and when to use traditional approaches. Also, keep abreast of current and potential threats and risks for security related information protection and compliance • Ensure proper alignment of controls related to infrastructure and information systems and distribution of information to prevent theft, misuse and compliance with all regulatory requirements. • Analyze risks and make educated decisions about how to best protect the company against those risks. • Understand regulatory requirements and best practice solutions to build and manage controls to manage security risks • Communicate effectively with senior management, key leadership, business peers, IT peers and vendors to solve business/technical problems and provide technical solutions. -- Regards, Shankar 248-522-6879 Technology consultanst inc -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to sap-abap@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/sap-abap?hl=en.
SAP Security Architect--DIRECT CLIENT
Hi There, Please forward Resumes to sur...@addonusa.comblocked::mailto:sur...@addonusa.com SAP Security Architect Location: Maplewood, MN Duration: 12+ months Rate; market *Required Skills:* · 10+ years of Strong SAP Security experience, capable of handling a technical team lead position · Strong hands-on experience in at least three of the following skillsets: ERP (and/or) HR Security / BI Security / EP Security / GRC · SAP Security Technical Consulting and Client Interaction Skills are mandatory · Experience in at-least two End-to-End SAP Technical Implementations · Strong Exposure to SAP Security Architecture, Strategy, Design and Implementation · Work with SAP Business Process Owners to identify SAP Security Requirements and translate them to SAP Authorizations and Roles · Experience in SOX Compliance Audit Activities is mandatory · Experience in SAP NetWeaver Identity Management / 3rd Party compliance tools will be an added advantage SAP GRC Access Control 5.3 and 10.0 [SPM/CUP/RAR/ERM] Module implementation experience with at-least two end to end project implementation experience. -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to sap-abap@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/sap-abap?hl=en.
BACKFILL JOB:Sr. Security architect, MN, IMMEDIATE INTERVIEW
*Reply to:v...@beyondtekit.com* Hi, Client is looking for a *Sr. Security architect* for a 12+ months Project in * MN*. They are looking for GC and citizens only. Location: Minneapolis, MN** Duration : 12+ months ** *Following is the job description.* Target has secure network segments to house Secure Handling Required data related to GLBA, PCI, SOX, HIPAA and proprietary information. Each of the firewalls is configured with point to point connections defined between source and destination systems. This architecture is new to many Target application teams and requires a great deal of training and facilitation when performing a new application build behind the firewall or migrating an existing system behind one of the firewalls. There are secure access rules, procedures, firewall rules, network diagrams and other documentation that needs to be created and kept up to date related to this environment. *Specific functions include:* Working with the Technical Architects in the Secure Build Engineering Team to understand Targets Segmentation Strategy and create process and procedures for segmentation decisions Work across multiple Target Technology Teams including network, database, application development and server technology to collect data for segmentation projects and define firewall rules. Provide technical assistance to the Segmentation On-Boarding Project Manager including working technical issue resolution with other TTS teams Create required documentation including physical/logical data flow diagrams, application design documents and security design documents Identify segmentation issues, perform problem analysis, identify root cause and outline resolution options *Technical Skills:* Experience with firewall configuration and networking (eg Checkpoint VSX Firewalls and Cisco routers and switches) Engineering logical and physical network flow diagrams using MS Visio Understanding Systems Architecture including interrelationships between server operating systems, database, network traffic and port management and impacts of systems and applications upon the enterprise wide technical environment Firewall Rule Analysis experience Security experience interfacing with Security. *Please complete the following skills-matrix and send back with your updated resume.* *Full Name:* *Degree Major:* *Total experience as a Sr. Security architect:* *Total experience with Handling Required data related to GLBA, PCI, SOX, HIPAA and proprietary information:* *Total experience with secure access rules, procedures:* *Total experience with firewall rules :* *Total experience with network diagrams :* *Total experience with physical/logical data flow diagrams:* *Total experience with security design documents:* *Total experience with firewall configuration and networking (eg Checkpoint VSX Firewalls and Cisco routers and switches) :* *Total experience with Engineering logical and physical network flow diagrams using MS Visio:* *Total experience with Understanding Systems Architecture including interrelationships between server operating systems:* *Total experience with database, network traffic and port management:* *Total experience with Firewall Rule Analysis :* *Total experience with interfacing with Security : * *Expected Hourly:* *Whether is it c2c/W-2? If c2c, specify the corporate name:* *Day Phone #:* *Evening Phone #:* *Cell Phone #:* *Availability:* *Current City/State:* *Work Status (US Citizen / Green Card )* *Have you applied recently for this requirement earlier through anyone else? Y/N:* *Are you ready to relocate on your own expenses (Yes/No)? * Warm Regards, * Vasu * Tel: 714-857-2002 Ext:815 | Fax: 714-364-9705 *v...@beyondtekit.com** *| *www.BeyondTekIT.com Alternate E.Mail:vasu.beyondte...@gmail.com * -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to sap-abap@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/sap-abap?hl=en.
Need Security Architect in MN
*Hi Partners,* ** *Greetings,* ** *Hope you are doing Well!!!* ** *Please forward a profiles to **shan...@techconsultinc.com*shan...@techconsultinc.com ** *Here are the requirement details* ** Contract Application Security Architect Eden Prairie, MN *Additional Information:*** Strong project management and security process and goals knowledge. Was not strong enough in development facing skills, shown below, with special emphasis on lack of hands on skills in providing C# developers for WPF/WCF web services with specific security implementation guidance: · Has participated in threat modeling sessions with application teams · Led application security architecture design sessions · Driven security design reviews with application and infrastructure teams · Participated and led security code reviews to identify coding vulnerabilities · Has led initiatives to work with development staff to prevent OWASP related vulnerabilities · Knowledge of .Net Security architecture in particularly with C# · Has proven experience designing secure applications that are Internet Facing. · Experience designing secure applications with .Net/C#/WPF,SQL -- Regards, Shankar 248-522-6879 Technology consultanst inc -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to sap-abap@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/sap-abap?hl=en.
**Immediate Hire Of Network Security Architect (CISSP) Based At Detroit, MI**
*Please send resumes to **shirley @datagrp.com shirley.datagr...@gmail.com *** ** *Job Title: Network Security Architect (CISSP)* *Location: Detroit, MI* *Duration: 6+ Months* * * *Need only EAD/GC/US Citizens!!!* *Details From Manager**: * 1) Application Development Background. 2) Must understand how Application Security plays a part in the application. 3) Must have knowledge of where applications are going, how they are developed, how they are managed, and how they are maintained. 4) Needs to have a CISSP. 5) Excellent communication skills (both verbal and written). 6) Must know the differences between the different databases. 7) A good understanding of how the Oracle database functions is very helpful (but not a must). *Summary**:* Application Security Architect is responsible for assuring that IT application software and infrastructure is designed, implemented, and operated in accordance with applicable security standards and practices. Primary responsibilities include applications security, risk assessment, validation of security pen test results, problem resolution, system documentation, and system security management and support. *Essential Duties and Responsibilities**:* Good understanding of the architecture and the various web application tier and database tier components: underlying objects, schemas/products, database objects, file system structure, tables, views, packages, procedures, sequences, indexes, and constraints. Conduct information security threat analyses on new and changed application development initiatives towards design, review, and incident response planning. Provide in-depth assistance with the integration of information security within the application development life cycle. Review security requirements at relevant phases for both technical and operational perspective. Reviews remediation activities for completeness. Identifying security requirements and recommending appropriate solutions to IT and business problems. Review application source code for vulnerabilities, using both manual and automated code scanning techniques aka White box Testing. Perform vulnerability scanning and penetration testing at all application tiers using appropriate tools (network scanners, web scanners, database scanners, etc.) aka Blackbox Testing. Knowledge of operating systems (Windows, UNIX) and common COTS products used to deliver web services, including IIS, Apache, Tomcat, Oracle Application Server, WebSphere, etc. Identify and convincingly explain the risks associated with common application vulnerabilities, demonstrate exploitation, and recommend mitigation options. Discern, document, and setup standard practices for application security audits. Partner with operations, audit, legal, and compliance and administration teams to support the information security needs of their projects and ensure that risks are accurately identified and appropriately managed to the enterprise's accepted level of risk. Participate in developing standards for information technology security practices. Identify and evaluate tools and techniques to be used for capture, modeling and analysis of information security architecture. Analyze, review, customize and recommend security architectures for internal projects and initiatives. Identifies, implements, and monitors best practices for information security architecture. Determine and clearly communicate - quantitatively where possible - the information security risks to the application development teams. Assure compliance to security policies, standards, and procedures, including HIPPA, SOX, and CMS compliance. Monitor and recommend changes in standards that affect application security, especially in the area of privacy and identity theft. Initiate and promote activities to foster information security awareness and education among application development. Work with Information security peers and manager to assure standards compliance on various platforms (e.g., OS’s, databases, networks, etc.) upon which application development group relies for the operation of its applications. Identify threats and risks to the confidentiality, integrity and availability of all data residing on information systems platforms. *Education And/Or Experience**:* Bachelors Degree in Computer Science, Management Information Systems or related discipline required. Master's Degree in related field preferred. A minimum of 5-7 years experience working with core Oracle and SQL databases, and 5+ years experience in Unix/Linux. ** *Qualifications**:* To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. In-depth understanding of common operating systems
SAP Security Architect-VA
Hi Partner, Please send resumes to an...@nihaki.com I need a SAP Security Architect for my client in Cooktown, VA. The project is 6-8+ weeks and begins on January 15, 2011. I deally, I need an SAP technical architect to assess and evaluate client’s current roles enabled in SAP to design future state architecture for re-implementation of controls based on findings using SAP or other tools such as Securinfo. Must have in-depth knowledge of SAP Controls and ability to understand and assess controls within a large and complex SAP FICO environment. Knowledge of SAP Financials, SAP Security user profiles and permissions, and concepts of separation of duties and least privileges required and ability to translate these concepts into recommended user profile setups and security setups based on best practices. Good documentation skills and communication skills also required. I can pay $Open/hr plus expenses on a C2C. I am wondering if you, or perhaps a colleague, would be interested. If so, please send me your updated resume in Word format, and your contact information. Please send the updated resume of the consultant along with the rate, location and contact information. Please make sure the Consultant's skills match the requirement. After reviewing the resume I will contact you if I need more information. Thanks, Anand Bandarupally Nihaki Systems Inc 346 Georges Road, Suite # 1, Dayton, NJ 08810. Direct: 732-645-1215 Phone: 732-823-6471/6472 Extn: 111 Fax : 732-438-6973 www.nihaki.com an...@nihaki.com Note: Under Bill s.1618 Title III passed by the 105th U.S. Congress this mail cannot be considered Spam as long as we include contact information and a remove link for removal from our mailing list. Click here to REMOVE from the mailing list -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to sap-a...@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/sap-abap?hl=en.
Immediate need of Oracle DBA/ with Security Architect EXP,(6+M),Jersey city,NJ.
Hi, This is BHANU PRASAD from SVIT INC, Please let me know if you have any good resources having all the skills mentioned. Please feel free to call or mail me with updated resume and best rate ASAP. Title: Oracle DBA/ with Security Architect EXP. Location: NJ Jersey City Duration: (6+months) JOB DESCRIPTION: Looking for someone experienced with implementing database level security on an Oracle 11g database. Security Tools to Configure: Oracle Label Security (OLS) Oracle Advanced Security Option (ASO) Oracle Virtual Private Database (VPD) Oracle Data Masking Pack Oracle Database Vault Thanks Regards Bhanu Prasad SVIT Inc (CELEBRATING 8th ANNIVERSARY 2002-2010) Technical Recruiter Voice: 347-863-7983 || Alt: 646-898-6227 || Fax: 516-977-0618 E-mail: bh...@svitinc.com || G-mail: bhanu.svit...@gmail.com || URL: www.svitinc.com Svit Inc is an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, ancestry, citizenship, disability, age, military or veteran status, and other characteristics We help our clients, employees partners compete and win! *** If wanted to be Removed, Plz reply in the subject line Remove. Sorry for the inconvenience caused || SVIT INC || NEW YORK || -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to sap-a...@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/sap-abap?hl=en.
Need SharePoint Security Architect:
*Hello,*** *Hope everything fine with you; kindly help me in filling this Requirement.* ** *Please send resume with contact details and rate to * pe...@turingsystems.com* *** *Work Location: **Warren MI,* *Duration: 6 Months *** *Need SharePoint Security Architect:* *Job Description:* *Must be able to Design a security model around SharePoint 2010 * *Must have experience identifying the requirements for LDAP directory for SharePoint 2010* *Skills : * *SharePoint 2010 * *C#* *In depth LDAP knowledge* *WEB* *HTML* *CSS* *XSL* *XSLT* *JavaScript* *Experience with Claims based authentification setting up SharePoint User Groups/ SUN 1 and building security systems in a enterprise environment.*** Peter James *Turing Systems Inc * (732) 597-9493 yhmsngr:-peterdngr NOTE: We respect your online privacy. This is not an unsolicited mail. Under bill 1618 title III passed by the 105th us congress this mail cannot be considered Spam as long as we include contact information and a method to be removed from our mailing list. If you are not interested in receiving our e-mails, please reply with a REMOVE in the subject line. We apologize for any inconvenience caused by this mail. -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to sap-a...@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/sap-abap?hl=en.
Need SharePoint Security Architect:
*Hello,*** *Hope everything fine with you; kindly help me in filling this Requirement.* ** *Please send resume with contact details and rate to * pe...@turingsystems.com* *** *Work Location: **Warren MI,* *Duration: 6 Months *** *Need SharePoint Security Architect:* *Job Description:* *Must be able to Design a security model around SharePoint 2010 * *Must have experience identifying the requirements for LDAP directory for SharePoint 2010* *Skills : * *SharePoint 2010 * *C#* *In depth LDAP knowledge* *WEB* *HTML* *CSS* *XSL* *XSLT* *JavaScript* *Experience with Claims based authentification setting up SharePoint User Groups/ SUN 1 and building security systems in a enterprise environment.*** Peter James *Turing Systems Inc * (732) 597-9493 yhmsngr:-peterdngr NOTE: We respect your online privacy. This is not an unsolicited mail. Under bill 1618 title III passed by the 105th us congress this mail cannot be considered Spam as long as we include contact information and a method to be removed from our mailing list. If you are not interested in receiving our e-mails, please reply with a REMOVE in the subject line. We apologize for any inconvenience caused by this mail. -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to sap-a...@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/sap-abap?hl=en.
Need SharePoint Security Architect:
*Hello,*** *Hope everything fine with you; kindly help me in filling this Requirement.* ** *Please send resume with contact details and rate to * pe...@turingsystems.com* *** *Work Location: **Warren MI,* *Duration: 6 Months *** *Need SharePoint Security Architect:* *Job Description:* *Must be able to Design a security model around SharePoint 2010 * *Must have experience identifying the requirements for LDAP directory for SharePoint 2010* *Skills : * *SharePoint 2010 * *C#* *In depth LDAP knowledge* *WEB* *HTML* *CSS* *XSL* *XSLT* *JavaScript* *Experience with Claims based authentification setting up SharePoint User Groups/ SUN 1 and building security systems in a enterprise environment.*** Peter James *Turing Systems Inc * (732) 597-9493 yhmsngr:-peterdngr NOTE: We respect your online privacy. This is not an unsolicited mail. Under bill 1618 title III passed by the 105th us congress this mail cannot be considered Spam as long as we include contact information and a method to be removed from our mailing list. If you are not interested in receiving our e-mails, please reply with a REMOVE in the subject line. We apologize for any inconvenience caused by this mail. -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to sap-a...@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/sap-abap?hl=en.
Need SharePoint Security Architect
*Hello,*** *Hope everything fine with you; kindly help me in filling this Requirement.* ** *Please send resume with contact details and rate to * pe...@turingsystems.com* *** *Work Location: **Warren MI,* *Duration: 6 Months *** *Need SharePoint Security Architect* *Job Description:* *Must be able to Design a security model around SharePoint 2010 * *Must have experience identifying the requirements for LDAP directory for SharePoint 2010* *Skills : SharePoint 2010 ,C#, In depth LDAP knowledge, WEB, HTML, CSS,XSL, XSLT, JavaScript* *Experience with Claims based authentification setting up SharePoint User Groups/ SUN 1 and building security systems in a enterprise environment.* * * Peter James *Turing Systems Inc * (732) 597-9493 yhmsngr:-peterdngr NOTE: We respect your online privacy. This is not an unsolicited mail. Under bill 1618 title III passed by the 105th us congress this mail cannot be considered Spam as long as we include contact information and a method to be removed from our mailing list. If you are not interested in receiving our e-mails, please reply with a REMOVE in the subject line. We apologize for any inconvenience caused by this mail. -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to sap-a...@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/sap-abap?hl=en.
Need SharePoint Security Architect
*Hello,*** *Hope everything fine with you; kindly help me in filling this Requirement.* ** *Please send resume with contact details and rate to * pe...@turingsystems.com* *** *Work Location: **Warren MI,* *Duration: 6 Months *** *Need SharePoint Security Architect* *Job Description:* *Must be able to Design a security model around SharePoint 2010 * *Must have experience identifying the requirements for LDAP directory for SharePoint 2010* *Skills : SharePoint 2010 ,C#, In depth LDAP knowledge, WEB, HTML, CSS,XSL, XSLT, JavaScript* *Experience with Claims based authentification setting up SharePoint User Groups/ SUN 1 and building security systems in a enterprise environment.* * * Peter James *Turing Systems Inc * (732) 597-9493 yhmsngr:-peterdngr NOTE: We respect your online privacy. This is not an unsolicited mail. Under bill 1618 title III passed by the 105th us congress this mail cannot be considered Spam as long as we include contact information and a method to be removed from our mailing list. If you are not interested in receiving our e-mails, please reply with a REMOVE in the subject line. We apologize for any inconvenience caused by this mail. -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to sap-a...@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/sap-abap?hl=en.
[Client : HP ] security architect
Location : Boston, MA Duration : 6 months Client : HP * Understand and define the security architecture discipline, processes, concepts and best practices * Define and document architecture modeling, practices, governance and reference patterns as they pertain to Enterprise Security. * Solid understanding of system security, security architecture, network security with architectural oversight of current state and future state as it aligns to business strategy documenting this information in an EA Framework. * Provide technical leadership at the enterprise level for the design of information technology systems with a core focus on Security * Architect, design and oversee administration of EIM footprints * Experience or knowledge of object/component development, n-tier applications, cross system integration, securing web services, UDDI, etc and identify how this will apply to our future state. * Knowledge and understanding of conceptual architectures and how they will apply to our future state. * In depth understanding of enterprise architecture standards and the demonstrated ability to advocate and enforce their use as part of our Architecture Review Board. * Ability to analyze, diagnose and resolve complex architectural problems using industry standard engineering principles around EIM and Identity provisioning. * Ability to see IT patterns and applies industry and internal patterns in solution delivery. * Knowledge and understanding of the business implications of introducing (or displacing) solutions. Experience and Education: Key Requirements * Bachelor's Degree in Computer Science, Engineering, or related field required and 10+ years of experience as an IT Architect. * CISSP certified * Experience with security solutions such as SSO, Identity Management, Federated Identity Management, Network access control, endpoint enforcement products, proxy servers, infrastructure and desktop firewalls, IDS/IPS, encryption solutions, vulnerability assessments tools, identify access management, etc. * Experience with security-related hardware, software, external interfaces, commercial security products, and architecture/design practices for SOA * Experience HIPAA security requirements highly desirable * Knowledge and understanding of IT strategy and planning aligned to business strategies. * Experience with large and complex security infrastructures as well as complex application integration environments. * Experience with VPN and encryption related technologies that apply to requested solutions (AES, DES/DES3, FWZ, ISAKMP, PGP, IPSEC, HTTPS) * Proficient in architecture modeling, practices, governance and reference patterns. * In depth understanding of enterprise architecture standards and the demonstrated ability to advocate and enforce their use. * Knowledge and understanding of prevailing methodologies. (OOAD, RUP). * Broad-based knowledge of the IT industry and trends. * Excellent consulting and influencing skills. * Formal and informal leadership and mentoring skills. * Excellent communication skills - verbal, written, presentation. * Excellent collaboration skills (with other architects, analysts, managers, business). * Certification or experience with TOGAF, Zachman, FEAF, COBIT, ITIL or Gartner Framework a plus. * Possess appropriate security certifications (CISSP, CISA, SCNA, SCNP). Thanks Regard's Mahi A. Accounts Manager, Manchester, NH, 03104. E-mail: mailto:m...@tek-linx.com m...@tek-linx.com Direct: (603) 263 0323 Please do not print this email unless it is absolutely necessary. Spread environmental awareness. This e-mail and any attached files may contain confidential and/or privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive this e-mail for the recipient), you may not review, copy or distribute this message. Please contact the sender by reply e-mail and delete all copies of this message. We respect your Online Privacy. This is not an unsolicited mail. Under Bills.1618 Title II passed by the 105th U.S. Congress this mail cannot be considered Spam as long as we include Contact information and a method to be removed from our mailing list. If you are not interested in receiving our e-mails then please reply with a remove in the subject line and mention all the e-mail addresses to be removed with any e-mail addresses which might be diverting the e-mails to you. We are sorry for the inconvenience. -- You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to sap-a...@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr
Need Network Security Architect in CT-Rate- $55/HR
*Hi Partners,* ** *Greetings,* ** *Hope you are doing Well!!!* ** *Please forward a profiles to **shan...@techconsultinc.com*shan...@techconsultinc.com ** *Here are the requirement details* Start Date:7/6/09 Location: Windsor, CT Title: Network Security Architect Description: Own the long-term architecture of the Information Security Solution from the Application perspective. Evolve a rolling 3 year technical strategy and maintain corresponding Roadmaps. Promote Information Security solutions and building blocks in all I relevant initiatives. Makes independent, creative technical contributions related to implementing interface and infrastructure designs from the security perspective, ensuring coherence across applications and services. Analyzes business models and maps/integrates security components into a unified infrastructure construct using a risk management approach. Ensures that Information Security is embedded into the IT services, applications and applications from the security architecture perspective, works closely with Project Managers, Architecture, Application Development, Risk Management, Security Monitoring, and Security Operations teams. Infrastructure Network Communications Application Design (including SaaS Security) XML Appliances (Schema Validation, Authentication, etc) Operating Systems (Unix, Windows, Mainframe) Authentication (Active Directory, LDAP, IWA, SSO, IDM, Kerberos) Key Management Multifactor Authentication (Consumer, 802.1x, OTP) Security Monitoring Support tools (Cristal Reports, Share Point) Security Information and Event Management (ArcSight, Symantec) Host Intrusion Prevention (Third Brigade, ISS) Database Security Monitoring (Guardium, Access Control) Security Operation Center (Balance Scorecard, Dashboard, KRI) Development Tools Database Security (Oracle, MSSQL, Sybase, UDB) Data Protection (DLP, Data Masking, Data Obscuring) SAML 1.1 and 2.0 (Federation and Delegation) WS Security C++, JEE, VB, C# (Best practices OWASP, OASIS) JAX-WS, EJB, AJAX Integrate Fire-ID Privilege Usage Control (Fortefi, Power Broker, Cyber Ark) Education: Bachelor's Degree in Computer Science, Engineering, or a directly related field. Master Degree preferred. Certifications: CISSP (Required), CISSP-ISSAP (Preferred), MSSD (Required), CEH (Preferred) CISM (Desired), MSSE (Desired), Location: CT Relocation offered: No Does the incumbent in this job have direct accountability for staff supervision/management? No Does the incumbent in this job have budget accountability? No Is travel expected to perform this job? Yes If so, what percentage of time will be spent traveling? 25% Thanks Shankar 248-522-6879 --~--~-~--~~~---~--~~ You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to SAP-ABAP@googlegroups.com To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/SAP-ABAP -~--~~~~--~~--~--~---
(Job) Security Architect Strategy - Middletown, CT
*Reply to sur...@beyondtekit.com* Hi, How are you doing today? This is my direct client opening for *Security Architect Strategy - Middletown, CT. This is a 5 months position*. The Hourly rate is *DOE*. *Job Description:* Required skills ISO27002, DIACAP knowledge is a plus, Threat Modeling with specific experience around OCTAVEs Threat Profiling and Microsoft’s Threat Modeling frameworks a plus Description: Client is seeking a security consultant with strategic and technical skills to assist client*s Security Architecture group. The consultant will become part of the existing team and provide architecture services focused on the security requirements of client*s business units. - Security Architect: - Document all requirements according to Client standards - Ensure that all security designs and recommendations conform to Clients security policies, frameworks, and industry best practices. - Meet individual project security-related deadlines and milestones according to project dates and timelines. - Provide the Security Manager a written status and discuss in person on a weekly basis. - The consultant*s primary responsibilities will be to assist Client in determining their current and future requirements concerning: - Trust Zones * Creating a trust zone strategy and implementation deliverables. This includes but is not limited to - knowledge around physical zones, logical zones and tying zones back to frameworks such as ISO27001/2 and corporate strategy. Knowledge of the Liberty Alliance*s trust zone guidance. - Knowledge of Enterprise cryptography key management. Ability to create a requirements document and vet potential technology vendors. Emphasis on technology vendors will be core Public Key Infrastructure (PKI) core services. Knowledge of digital certificates and asymmetry of these certificates for application developers and technology partners of the client. - Knowledge of secure application development and secure coding techniques (software assurance) valuable. Knowledge of Mitre and OWASP secure coding initiatives Confidential Company *Please complete the following skills-matrix and send back with your updated resume.*** *Full Name:* *Degree Major:* *Total IT Experience:* *Total Security Architect exp:* *Total exp with Threat Modeling around OCTAVEs Threat Profiling and Microsoft’s Threat Modeling frameworks:* *Total knowledge / exp with physical zones, logical zones and tying zones back to frameworks such as ISO27001/2 and corporate strategy: * *Total knowledge / exp with Liberty Alliance*s trust zone:* *Total knowledge / exp with Enterprise cryptography key management:* *Total Knowledge / exp of digital certificates and asymmetry of these certificates for application developers and technology partners of the client:* *Total knowledge / exp with secure application development and secure coding techniques (software assurance) valuable:* *Total knowledge / exp with Knowledge of Mitre and OWASP secure coding :* *Do you have the ability to create a requirements document and vet potential technology vendors (Y/N)?* *Total Knowledge / exp with DIACAP:* *Hourly rate:* *Whether is it C2C/W2? If C2C, specify the corporate name:* *Day Phone #:* *Evening Phone #:* *Cell Phone #:* *Availability:* *Current City/State:* *Work Status (US Citizen/Green card/others):* *Have you applied recently for this requirement earlier through any one else? Y/N* *Thanks Regards,* *Suresh* *Technical Recruiter* *Ph: 714-857-2002 x 827* *Fax: 714-364-9705* *sures...@beyondtekit.com*** blocked::mailto:nav...@beyondtekit.com *www.beyondtekit.com* --~--~-~--~~~---~--~~ You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to SAP-ABAP@googlegroups.com To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/SAP-ABAP -~--~~~~--~~--~--~---
(JOB) - Lead MPLS/Network Security Architect - Austin, TX - long term contract position
Reply Back to [EMAIL PROTECTED] [EMAIL PROTECTED] Hi, *Greetings!!* *Hope you are doing well..* This is my direct client opening for *Lead MPLS/Network Security Architect - Austin, TX.* This is a *long term contract position*. The Hourly rate is DOE. *Minimum Requirements:* Skills/Experience 8+ Years: Experience in providing day to day technical team leadership of complex projects 8+ Years: Hands-on experience in communication networks and support services 8+ Years: Experience in core network routing and security 7+ Years: Experience in BGP routing protocol 6+ Years: Experience with the security requirements typical in an MPLS Architecture 4+ Years: Hands-on experience with designing MPLS networks and security 4+ Years: IP QOS Experience 4+ Years: Experience in OSPF and DIRGP 3+ Years: MPLS QOS deployment Experience 3+ Years: Cisco 7600 series router experience 3+ Years: Cisco Catalyst 6000 series Switch experience 2+ Years: Experience in the deployment of a large scale service provider MPLS network and connected VPN's 2+ Years: Experience on Cisco Firewall Service Module (FWSM) and Intrusion Detection Service Module (IDSM) 2+ Years: Experience on Cisco SONET 15454 Products 1+ Years: Experience on Ciena DWDM products 1+ Years: Experience in Wireless LAN architecture and deployment * Preferences:* Skills/Experience 4+ Years: Bachelor's degree in electronics and communication engineering, or related discipline 1+ Years: Knowledge of and experience with data center architecture 1+ Years: Experience with Inter-AS MPLS design *Please complete the following skills-matrix and send back with your updated resume.* Full Name: Degree Major: Total IT Exp: Total Lead MPLS/Network Security Architect exp: Total exp in providing day to day technical team leadership of complex projects: Total exp in communication networks and support services: Total exp in core network routing and security: Total exp in BGP routing protocol: Total exp with the security requirements typical in an MPLS Architecture: Total exp with designing MPLS networks and security: Total IP QOS Exp: Total exp in OSPF and DIRGP: Total MPLS QOS deployment Exp: Total Cisco 7600 series router exp: Total Cisco Catalyst 6000 series Switch exp: Total exp in the deployment of a large scale service provider MPLS network and connected VPN's: Total exp on Cisco Firewall Service Module(FWSM) and Intrusion Detection Service Module(IDSM): Total exp on Cisco SONET 15454 Products: Total exp on Ciena DWDM products: Total exp in Wireless LAN architecture and deployment: Total exp with data center architecture: Total exp with Inter-AS MPLS design: Hourly Rate: Whether is it C2C/1099/W2? Day Phone #: Evening Phone #: Cell Phone #: Availability: Current City/State: Have you applied recently for this requirement earlier through any one else? Y/N ** If you qualify for this position, are available immediately and are interested, please send your resume, rate and contact information to * *mailto: [EMAIL PROTECTED][EMAIL PROTECTED]/Network%20Security%20Architect%20-%20Austin,%20TX **?subject=Lead MPLS/Network Security Architect - Austin, TX [EMAIL PROTECTED]/Network%20Security%20Architect%20-%20Austin,%20TX * - *Please ensure you complete and copy/paste the above-completed matrix with your response* * * *Thanks and Regards* *KUMAR* *BeyondTekIT* *Tel: 714-857-2002 - Ext -823* *Fax: 714-364-9705* [EMAIL PROTECTED] [EMAIL PROTECTED] *www.beyondtekit.com* http://www.beyondtekit.com/ --~--~-~--~~~---~--~~ You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to SAP-ABAP@googlegroups.com To unsubscribe from this group, send email to [EMAIL PROTECTED] For more options, visit this group at http://groups.google.com/group/SAP-ABAP -~--~~~~--~~--~--~---
URG REQ Network Security Architect
** Hi, Please find the requirement and send me updated resume ASAP Please send resumes to [EMAIL PROTECTED] This position is for a Senior Network Architect who has experience designing Network Security solutions and has led Network Security Project Teams. *Location: Foster City, CA* *Duration: Minimum 6 months* *Industry: Finance/Credit Cards* Requirements: - Expert knowledge of Cisco and Nokia Check Point Firewall products - Cisco CCIE, CCNA or CCNP Routing and Switching certifications - Minimum 7 years experience administering enterprise networks in mission-critical, 7x24 production environments. - The person will need to understand Security Policy experience and understanding. Cisco Routing and switching experience. - Complex firewall and security design or support, troubleshooting with specific experience in Cisco IOS, PIX, Check Point. Thanks for sending your qualified candidate's resumes, rates and contact information. -- Warm Regards, Prashant G OSAIR Technologies. Phone: 408-649-5536 Fax: 732-289-6076 [EMAIL PROTECTED] www.osairtech.com We Want to be your Trusted , Preferred long Term Partner Note: If you are not interested in receiving our e-mails then please reply to [EMAIL PROTECTED] with a remove in the subject line and mention all the e-mail addresses to be removed with any e-mail addresses, which might be diverting the e-mails to you. Apologies for the inconvenience caused --~--~-~--~~~---~--~~ You received this message because you are subscribed to the Google Groups SAP ABAP group. To post to this group, send email to SAP-ABAP@googlegroups.com To unsubscribe from this group, send email to [EMAIL PROTECTED] For more options, visit this group at http://groups.google.com/group/SAP-ABAP -~--~~~~--~~--~--~---