URGENT NEED: Infrastructure Security Architect - El Segundo, CA - 1+ Year Contract

2017-03-30 Thread Kaazmi Kahn
Hi folks,
Hope all is well..

Please share your consultant resume to *kk...@ayrglobal.com
<kk...@ayrglobal.com>*

*Job Role: Infrastructure Security Architect*
*Location: El Segundo, CA*
*Duration: 1+ Year Contract*

*Job Description:*
Infra Security Consultant
Wipro seeks Security Consultant to provide building solutions to address
specific customer needs. In this position, you will be working with
technology experts in a number of areas.The DirecTV Cyber security
programme would encompass a number of work streams running to deliver
capability improvements in all the major areas of services including threat
intelligence, malware protection, vulnerability management, security
monitoring, and compliance incident response.

*Responsibilities: -*
The ideal candidate should be self-driven and have a good experience in the
Security aspects in the area of network design and planning.
The candidate must have strong;
Minimum 10-14 years' experience in Security.
Extensive exposure on Service Provider environment
Network Engineering and Design with a focus on network integration and
transformation
Risk and Compliance

*Excellent communication skills*
Candidate needs to work closely with Senior Director on defining strategy
and evaluating new products and tools and implementing
These work streams are defined to address outstanding requirements relating
to regulatory, audit, risk and business obligations.

*The work streams defined are as follows: *
Security Perimeter Device Management
Infrastructure and security
Advertising
CDN
Cloud
Monitoring Controls.
Improve Discovery Maturity

*Soft Skills Requirements:*
Ability to present topics in a clear and concise manner to many levels of
technical skill sets for varying audience
Good Training skills.
Good presentation
Effective collaboration and teaming with multiple internal teams

*Best Regards,*

*Kaazmi Kahn - Recruiter*
*AYR Global IT Solutions Inc.*
*1431 Opus Pl, Suite 110, Downers Grove, IL -  60515*
*Direct: (281) 670-9343 | Email: kk...@ayrglobal.com <kk...@ayrglobal.com>*

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Fwd: Very urgent:: Infrastructure Security Architect ::El Segundo, CA

2017-03-24 Thread Mayank Gupta
Hi

We have an urgent requirement from our client. Please share resume with us
ASAP. You can even call upon 609-897-9670 Ext 5123 or share resume at
maya...@sysmind.com

*Role:: Infrastructure Security Architect*
*Location : *El Segundo, CA

*Job Description :*

Security Consultant to provide building solutions to address specific
customer needs. In this position, you will be working with technology
experts in a number of areas. The DirecTV Cyber security programme would
encompass a number of work streams running to deliver capability
improvements in all the major areas of services including threat
intelligence, malware protection, vulnerability management, security
monitoring, and compliance incident response.



Responsibilities: -

The ideal candidate should be self-driven and have a good experience in the
Security aspects in the area of network design and planning.

The candidate *must* have strong;

 Minimum 10-14 years’ experience in Security.

· Extensive exposure on Service Provider environment

· Network Engineering and Design with a focus on network
integration and transformation

· Risk and Compliance

· Excellent communication skills

· Candidate needs to work closely with Senior Director on defining
strategy and evaluating new products and tools and implementing



These work streams are defined to address outstanding requirements relating
to regulatory, audit, risk and business obligations.



The work streams defined are as follows:



-   Security Perimeter Device Management

-   Infrastructure and security

-   Advertising

-   CDN

-   Cloud

-   Monitoring Controls.

-   Improve Discovery Maturity





*Soft Skills Requirements:*



· Ability to present topics in a clear and concise manner to many
levels of technical skill sets for varying audience

· Good Training skills.

· Good presentation

· Effective collaboration and teaming with multiple internal teams



Mayank Gupta | SYSMIND, LLC

[image: Description: Description:
https://newoldstamp.com/editor/profilePictures/profile-b15c8fc3ea4630e2ca604f11e3e951c7-41898.png]

Phone: 609-897-9670 x 5123

Email: maya...@sysmind.com

Website: sysmind.com

Address: 38 Washington Road, Princeton Junction, NJ 08550

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Security Architect

2017-01-31 Thread archit jain
Hi

Please let me know your interest for this position

Reply back with expected hourly rate

 

Interview Mode-Phone/Skype

 

Location: Columbia, SC

Duration: 12+ months

Rate: Open

 

Job Description

The Information Security Architect will report to the Office of Information 
Assurance and operate as an experienced consultant to client leadership, 
business units, business partners and vendors.

 

Security Program Experience:

Experience with CMS MARS-E or other FISMA Risk Management Framework (RMF) 
compliant programs is strongly desired and will be given the highest weight. 
Experience should include well documented success in the performance of 
security focused processes and procedures supportive of a secure, compliant 
enterprise architecture. 

 

Experience with development and integration of RMF tasks and artifacts into the 
System Development Life Cycle (SDLC) is ideal.

 

Experience in security as related to multi-tenant, cloud services and vendor 
interface management would be considered desirable for this position.

 

Technical Knowledge:

Hands on experience with any or all of the following technologies would be 
considered a desirable for this position:

· IBM System 390/zSeries

· Linux and Windows servers

· Network Firewalls, Intrusion Prevention Systems (IPS), Switching and 
Routing Infrastructure

· Security Information and Event Management (SIEM) solutions

· Identity and Access Management (IAM) solutions

 

General Duties and Responsibilities:

· Assist in the design, development, implementation and/or ongoing 
maturation of SCDHHS security and compliance solutions

· Provide hands-on support of SCDHHS Systems and Software 

· Participate in audit and assessment of internal agency systems as 
well as business partner/service provider information systems.

· Utilize Microsoft Office software suite, eGRC system, Bizagi, 
Atlassian and other products to document and report on information gathered 
during Audit and Assessment activities or other OIA efforts.

· Participate in third-party audits and/or assessments of agency and 
business partner systems

· Collaborate with agency leadership, business partners and other 
parties/stakeholders to provide recommendations for security and compliance 
risk mitigation efforts.

 

Required Certification: ISC(2), ISACA, SANS GIAC, or other similar Information 
Security Certification is required.

 

Education Preferred: Bachelor’s degree in computer science or similar 
discipline is preferred.

 

Thanks
Archit
 
Archit Jain
Software People Inc.
 <mailto:bhaskar.nain...@softwarepeople.us> archit.j...@softwarepeople.us
Ph: 631-739-8782 © Fax: 631-574-3122
Gtalk: ajain0102

Certifications: NY MWBE, VA SWaM, DE OMWBE, MA MWBE

 

 

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Cloud Security Architect- Bellevue, WA

2017-01-09 Thread Sekhar Reddy
Hi

*Sekhar* here from *METASIS INFORMATION SYSTEMS,* one of our client has an
opening for *Cloud Security Architect*

Below is the job description for your reference, do go through it and let
me know your interest.



*Title: Cloud Security Architect*

*Location: Bellevue, WA*

*Duration: Long-term OR Fulltime*



*Security Architect: *

· 5-8 years’ experience as Security Architect and/or Engineering.

· 4+ years of hands-on experience architecting, designing and
deploying scalable, multi-tenant public, private, or hybrid cloud solutions

· Strong understanding of cloud computing architecture, technical
design and implementations, including Infrastructure as a Service (IaaS),
Platform as a Service (PaaS) and Software as a Service (SaaS) delivery
models

· Practical knowledge of the end-to-end information technology (IT)
process, including architecture, design & engineering, implementation, and
operations in a secure development lifecycle waterfall, agile and
continuous delivery model

· Adeptness with information security standards (e.g., ISO
17799/27002, etc.), rules and regulations related to information security
and data protection, and Cloud Security Alliance best practices and
guidelines

· Professional certifications include: IT security (e.g., CISSP) or
Cloud Security-related certifications (e.g., vendor neutral (CCSK,
Certified Cloud Professional/Architect, etc.) or Cloud vendor certification
(VMware VCP, AWS Certified Solutions Architect, Google, IBM, etc.))

· Application of Vulnerability management, other detection, &
response techniques while integrating security end-to-end in a fast-paced
environment

· Familiarity with PCI, SOX and other compliance standards.

· Experience with Amazon Web Services, Microsoft Azure, or another
related Cloud providers

· Skill with migrating applications to Cloud environments

· Experience working with cloud security and governance tools,
cloud access security brokers (CASBs), and server and network
virtualization technologies such as SDN.

· Experience with enterprise applications (architecture,
development, support, and troubleshooting).

· Experience performing threat modeling and design reviews to
assess security implications and requirements for introduction of new
technologies.

· Experience representing technical viewpoints to diverse audiences
and in making timely and prudent technical risk decisions.

· Experience with enterprise architecture and working as part of a
cross-functional team to implement solutions.

· Strong interpersonal and communication skills; ability to work in
a team environment

· Ability to work independently with minimal direction;
self-starter/self-motivated Experience with assessment, development,
implementation, optimization, and documentation of a comprehensive and
broad set of security technologies and processes, data protection,
cryptography, key management, identity and access management (IAM), network
security within SaaS, IaaS, PaaS, and other cloud environments.

· Working knowledge of common and industry standard
cloud-native/cloud-friendly authentication mechanisms.



Thanks & Regards,

Sekhar

Email : *sek...@metasisinfo.com* <sek...@metasisinfo.com>

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Looking for Siteminder Security Architect position in Atlanta, GA

2016-11-14 Thread salma bhat
Hi Partners,

Please share profile at* naseer.ah...@nityo.com <naseer.ah...@nityo.com>*


Title: Technology Architect | Server Products | Siteminder

Location: Atlanta, GA

Target Start Date: Oct 31



Job Details:

  Modification Comment: More slots are available for submittals. Need
profiles of Security architect  with skills in IPS , firewall , networking
capabilities.



*Must Haves – *Skills : *Security Architect position*, Identity access
management, vulnerability management, encryption sme, any tools such as
siteminder, cyberark



Nice to Have/Skills: OOPS concept, customization experience



How many years of experience? 9+ years

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Urgent Need // Security Architect // Washington, DC

2016-11-09 Thread Mahesh Gurram
Hi Business Partners,
Hope you are doing great!

Please find below mentioned job description and revert back with the
updated resume to mahe...@systelinc.com

Position: Security Architect
Location: Washington, DC
Duration: 6+ Months

*Required Skills:*
Candidate must have demonstrated architecture and control experience
working with Amazon Web Services (AWS), to secure workloads.
Candidate must have an understanding of OWASP Top 10 and SANS 25
vulnerabilities and how to mitigate these vulnerabilities and an
architecture/coding standpoint.
Mobile security architecture experience a plus
Candidate must have an understanding of the Cloud Security Alliance (CSA),
Cloud Controls Matrix and how it can be leveraged for reviews of cloud
solutions.

*Essential Job Functions:*
The contractor will have responsibilities for specific individual tasks and
for working as an integral part of the team in executing ITSSR’s work
program. The primary responsibilities will include, but are not limited to,
a combination of the following
Work with project teams to define security requirements for new systems in
line with the enterprise information security architecture
Provide security design recommendations based on enterprise information
security architecture and solution patterns.
Provide guidance and assist in the development of security standards for IT
platforms in line with the information security architecture
Maintain an up-to-date understanding of emerging trends in information
security architecture; apply new techniques and trends, in-line with
overall information security objectives and risk tolerance of the WBG, to
the WBG’s information security architecture
Perform controls reviews and system assessments to develop risk profiles
for IT systems and evaluate the efficiency and effectiveness of the IT
control environment
Maintain impartiality around IT systems to produce unbiased reports on
information security risk
Provide business units with recommendations to reduce information security
risk within their areas
Identify efficiencies to improve the performance and responsiveness of the
ITSSR information security architecture function
Prepare and present security design and architectural review reports to
system owners, business units and other
Evaluate WBG current software security posture and propose mitigation and
remediation plans to meet software security assurance requirements
Translate technical security deficiencies into business risks that are
understandable by business stakeholders in order to get buy-in for security
investments

*Role Specific Experience:  *
Minimum two (2 or 2+) years of experience working in an information
security, software development, and information risk management related
field.

*Certification Requirements:*
*Required Skills/Abilities:*
Demonstrated experience enterprise security architecture design and
implementation for a financial services organization or other organizations
with similar information security needs and requirements.
Extensive knowledge of IT, enterprise architecture, software development
life cycle, and information security platforms and applications
Ability to work well under pressure and to meet tight deadlines.
Demonstrates a high level of motivation, confidence, integrity and
responsibility.
Knowledge of best practices and standards for enterprise security
architecture specifically in the field of Identity & Access Management,
Enterprise Content Management, Collaboration Tools, Service-Oriented
Architecture, Cloud, Mobility, Data Analytics, and Web 2.0 related
services.
Experience providing guidance for data protection based on data sensitivity
and associated business risk.
Practical knowledge of common Web vulnerabilities as per SANS 25 or OWASP
Top 10 specifications, and experience guiding project team remediating such
vulnerabilities.
Industry certifications highly preferred including, but not limited to,
Certified Information Systems Security Professional (CISSP), Certified
Information Security Manager (CISM), Global Information Assurance
Certification (GIAC), and Information Systems Security Management
Professional (ISSMP).
Demonstrate excellent interpersonal skills; including the ability to work
independently, effectively in a team/task force as a team member or leader,
and with senior staff and managers in the unit and elsewhere in the WBG.
Ability to collaborate with senior management stakeholders to identify
requirements and drive compliance with approved standards.
Desired Skills/Abilities (not required but a plus)
Level III -  7+ years of experience"
Architecture Design and Propose various solution options to the customer
for a problem statement.
Capacity planning.
Implement Security in SDLC.

-- 
*Regards*
*Mahesh Kumar*
*Resourcing Specialist*
*D: 678-261-5215*
*mahe...@systelinc.com <mahe...@systelinc.com>*

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe

FOR ONLY GC AND USC :- Identity & Access Management Security Architect cum Consultant @ Bellevue,WA

2016-09-08 Thread vicky menon
*Dear Partner,*
*Hope you are doing fine !!*

*IT SCIENT is a highly recognized provider of professional IT Consulting
services in the US.*

*Here is our open requirement which can be filled immediately. If you find
yourself comfortable ,Kindly respond to this requirement with your
consultant resume, contact and current location info to speed up the
interview process,Please find the requirement below with my contact and
details 510-516-7899 // vi...@itscient.com
<vi...@itscient.com> //vicky.kumaritsci...@gmail.com
<vicky.kumaritsci...@gmail.com>*

*Position:  Identity & Access Management Security Architect -Technology
Architect / Consultant,*
*Work Location:- Bellevue, WA*
*Duration :- 6+Months*

*Exp : 6 years and above in relevant field*

*only GC or US Citizen for this requirment.*

*Detailed JD* :

Identity & Access Management Security Architect:
A candidate at this level will apply advanced subject matter knowledge to
solve complex business issues and is regarded as a subject matter expert.
Contributes to the development of new solutions, ideas and methodologies.
Works on complex problems requires an in-depth evaluation of data, network
traffics and configurations. Leads and/or provides expertise to functional
project teams and may participate in cross-functional initiatives. Acts as
an expert providing suggestions to solutions including process improvements
and establishing policies. Exercises significant independent judgment
within broadly defined requirements to determine best method for
accomplishing tasks at hand.

Professionals must work well within a team and be at ease with one or more
Identity & Access Management products, including Oracle, CA, Sun, Tivoli
and others. A professional with Identity & Access Management domain skills,
Implementation and support of one or more of the following IAM tools: -
· Hands-on experience with Oracle Identity Manager/Governance or equivalent
including:
o Provisioning Onboarding
o RBAC Authorization models
o Strong knowledge of workflows.
· Hands-on experience with Oracle Access Manager/Federation SSO or
equivalent
· Experience in Oracle Access Manager WebGate deployment and Access Policy
configuration
· Experience in Oracle Federation deployment and Meta Data exchange
· Hands-on experience working with Active Directory, Oracle Unified
Directory, or any other LDAPs
· Expert knowledge and understanding of LDAP concepts with at least few of
the following directories: -
o Active Directory
o Oracle Unified Directory
o Oracle Virtual Directory
o Sun Directory
· XML Gateway and multifactor authentication.
· Experience in working on Microsoft Internet Information Server (IIS),
Apache Web Servers, Application Servers (WebLogic, WebSphere etc.)
· Experience on Custom Auth Schemes, Web Services, Federation/SAML, OAuth
etc.

*--*

Vicky Kumar* | Technical Recruiter*

*IT–SCIENT LLC, Fremont, CA, USA*

*ll IT-SCIENT - Talent Management Group ll*

*ll Phone USA : (510) 516-7899​ ll Fax: 877.701.4872*


*EMAIL : vi...@itscient.com
<vi...@itscient.com> // vicky.kumaritsci...@gmail.com
<vicky.kumaritsci...@gmail.com>*

*Web: www.itscient.com <http://www.itscient.com/>   *

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Network Security Architect

2016-09-01 Thread amit bhatt
   -

   *Title**:** Network Security Architect*

   *Location:** Pleasanton, CA*

   *Term:** Contract*



   *ONLY LOCALS*



   *Required Experience:*
   - Minimum of 10+ years related network engineering and customer support
  experience.
  - *Must have architecture, design and deployment experience with Palo
  Alto Network Firewall**.*
  - *Extensive hands-on Experience with Checkpoint firewall and Cisco
  ASA will be a plus.*
  - *Must have architecture, design and deployment experience with
  Cisco ISE and Network Admission Control (NAC)*
  - Must have Solid working knowledge with security tools such as NAC,
  Antivirus, Firewall, IDS/IPS
  - At least 5+ years of Data Center experience.
  - Extensive experience in securing PCI CDE environment

   · Project Management, Problem Solving, Expert LAN and WAN
   Knowledge, Complex Network Design and Implementation, Network
   Troubleshooting, Network Hardware Configuration, Network Performance
   Tuning, People Management.

   *Technical Skills*
   - Thorough understanding of networking technologies, including
  administration of enterprise routers, switches, firewalls and
  load-balancers (OSI layers 4-7)

   · Expertise with Cisco ACE, F5 and Citrix Load Balancers.

   · Strong OSI layer 2 knowledge and practical experience,
   including various flavors of STP, ARP, QOS, etc.

   · Comprehensive knowledge of OSI layer 3 networks and protocols,
   including broadcast, multicast, anycast concepts, routing, etc.

   · Expertise with various routing protocols (BGP, OSPF, EIGRP)

   · Understanding of network security methodologies as a whole,
   including but not limited to:  ACLs, Stateful firewalls, VPNs (tunneling,
   IPsec, PPTP, etc.)

   · Fluency with common network admin and intrusion detection
   tools such as Rancid, OpenNMS, Nagios, Ethereal/Wireshark, Nmap, Nessus,
   Netflow, etc.

   · Administrative scripting skills (Perl, UNIX shell scripting)

   · In-depth knowledge of Cisco IOS, NX-OS, both Cisco Nexus 1K,
   2K, 5K 7K and non-Nexus series switches, Cisco routers and other Cisco
   networking gear.

   · Solid understanding of data center related technology and
   collocation environment.

   · In-depth knowledge of MPLS network.

   *Professional Skills*

   · Ability to think and operate as a team player

   · Extremely strong communication skills, both written and verbal

   · Experience managing network service and similar support
   providers in a client/vendor relationship

   · Ability to operate as independently or as part of
   collaborative effort
   - Demonstrate strong project leadership and ability to develop strong
  working relationships with customer technical personnel.

   · Strong troubleshooting skills and ability to apply them during
   business impacting incidents.

   · Capable of mentor others and lead by example.



   *Qualifications and **Certifications**:*

   · *Palo Alto Networks Certified Network Security Engineer
   (PCNSE) certification is required.*

   · Bachelor’s degree in a technical field (e.g. Computer Science,
   IT, or similar disciplines).

   · Equivalent work experience implementing and operating
   enterprise level data center and/or office networks.
   - CCIE security certifications are a big plus.





   *Minimum Qualifications and **Certifications**:*

   · *Palo Alto Networks Certified Network Security Engineer
   (PCNSE) certification is required. *

   · *Architecture, design and deployment experience a Must!*

   · *Bachelor’s degree in a technical field (e.g. Computer
   Science, IT, or similar disciplines).*

   · *CCIE security certification and equivalent experience
   preferred!*





   *Thanks & Regards…*

   *RK*

   *Business Development Manager*

   *Email : r...@systematix-software.com <r...@systematix-software.com>*

   *Phone: 616-433-1771*

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Direct client Need for Information Security Architect Level 6 in NW, DC

2016-08-12 Thread Pradeep Kumar
Hello Dear



*Information Security Architect Level 6*

*Location: NW, DC*

*Client: **Government*

*Rates: very good*





*Information Security Architect Level 6 - Consultant Level 6 13-15 Years*

*Complete Description:*

Enterprise Security Architect is responsible for developing blueprint for
enterprise security architecture. Defines, plans, and applies architectural
elements in the analysis, planning, design, implementation, documentation,
assessment, and management of the enterprise security architecture that is
aligned with IT strategy and agency mission, goals, structure, and
processes. Develops security design requirements through sound design
methodology, adequate security control application, and effective
configuration practices.

This role ensures secure architectural solutions are incorporated into
every aspect of the enterprise architecture supporting an organization’s
key business processes and organizational mission. Provides the interface
between the Enterprise Architect and the Information System Security
Engineering as detailed in NIST SP 800-37. Architects counter-measures to
contain, control and recover from dynamic cybersecurity events. Uses
knowledge about current threats to identify flaws and weaknesses in the
composition of system designs and defenses for the mission and mission
critical data.  Specifies solutions and verifies solutions that have been
implemented.  Rapidly adjusts designs based on new defense, threat, and
attack information.

Specific Tasks

Work involves the analysis, planning, design, implementation,
documentation, assessment, and management of the enterprise structural
framework to align IT strategy, plans, and systems with the mission, goals,
structure, and processes of the organization.

Skill

Required / Desired

Amount

of Experience

Expertise Rating

Knowledge of network security architecture concepts, including topology,
protocols, components, and principles (e.g., application of defense-in-depth

Required

5

Years

3 - Expert

Knowledge of defense-in-depth principles and network security architecture

Required

8

Years

3 - Expert

Knowledge of organization's enterprise information security architecture
system.

Required

5

Years

3 - Expert

Knowledge of the enterprise IT architecture

Required

13

Years

3 - Expert

Knowledge of communication methods, principles, and concepts that support
the network infrastructure

Required

5

Years

3 - Expert

Knowledge of the organization’s enterprise IT goals and objectives

Desired

5

Years

Skill in implementing the methods, standards, and approaches for
describing, analyzing, and documenting an organization's enterprise IT
architecture

Required

5

Years

Knowledge of engineering concepts

Required

5

Years

Knowledge of system design tools, methods, and techniques, including
automated systems analysis and design tools

Required

8

Years

Skill in integrating and supporting information system security architecture

Required

8

Years

CISSP, CISM or similar certification desired

Desired

Undergraduate degree in Computer Science, Information Technology, or
related field

Required

-- 

Thank you,
Pradeep Kumar
Email: pkum...@okayainc.com
Phone:631-267-4883 EXT 529

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


IMMEDIATE INTERVIEW :- Identity & Access Management Security Architect ; Bellevue,WA

2016-08-01 Thread vicky menon
*Dear Partner,*
*Hope you are doing fine !!*

*IT SCIENT is a highly recognized provider of professional IT Consulting
services in the US.*

*Here is our open requirement which can be filled immediately. If you find
yourself comfortable ,Kindly respond to this requirement with your
consultant resume, contact and current location info to speed up the
interview process,Please find the requirement below with my contact and
details 510-516-7899 // vi...@itscient.com <vi...@itscient.com> //
vicky.kumaritsci...@gmail.com <vicky.kumaritsci...@gmail.com>*

*Position: Identity & Access Management Security Architect*
*Work Location:- Bellevue,WA*
*Duration: 6+ Months*

*Job Description**:*

*Identity & Access Management Security Architect: *
*Professionals must work well within a team and be at ease with one or more
Identity & Access Management products, including Oracle, CA, Sun, Tivoli
and others. *
*A professional with Identity & Access Management domain skills,
Implementation and support of one or more of the following IAM tools: -*
*· Hands-on experience with Oracle Identity Manager/Governance or
equivalent including:*
*o Provisioning Onboarding*
*o RBAC Authorization models*
*o Strong knowledge of workflows.*
*· Hands-on experience with Oracle Access Manager/Federation SSO or
equivalent*
*· Experience in Oracle Access Manager WebGate deployment and Access Policy
configuration*
*· Experience in Oracle Federation deployment and Meta Data exchange*
*· Hands-on experience working with Active Directory, Oracle Unified
Directory, or any other LDAPs*
*· Expert knowledge and understanding of LDAP concepts with at least few of
the following directories: -*
*o Active Directory*
*o Oracle Unified Directory*
*o Oracle Virtual Directory*
*o Sun Directory*
*· XML Gateway and multifactor authentication.*
*· Experience in working on Microsoft Internet Information Server (IIS),
Apache Web Servers, Application Servers (WebLogic, WebSphere etc.)*
*· Experience on Custom Auth Schemes, Web Services, Federation/SAML, OAuth
etc.*

*--*

*Thanks,*

*Vicky Kumar|| IT-SCIENT || Phone USA : (510) 516-7899 || Fax: 877.701.4872
|| Email: vi...@itscient.com <vi...@itscient.com> || Web: www.itscient.com
<http://www.itscient.com/> ||*

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


security Architect || Miami, FL

2016-06-01 Thread Ranjit Kumar
*Hi all *


*Job title : security Architect *
*Location : Miami, FL *
*Duration : 12+ Months Contract *



*Manager Notes *
*1. Expert experience in PCI (implementation)*
*2. Network Segmentation experience*
*3. Experience with tokenization *
*4. ISA Certification *


*-- *
*Thanks & Regards*
*Ranjith*
*Ph:(925) 973- x 232(Off) *
*Email: ranj...@allianceit.com <ranj...@allianceit.com>*

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


security Architect || Miami, FL

2016-06-01 Thread Ranjith Kumar
*Hi all *


*Job title : security Architect *
*Location : Miami, FL *
*Duration : 12+ Months Contract *



*Manager Notes *
*1. Expert experience in PCI (implementation)*
*2. Network Segmentation experience*
*3. Experience with tokenization *
*4. ISA Certification *


*-- *
*Thanks & Regards*
*Ranjith*
*Ph:(925) 973- x 232(Off) *
*Email: ranj...@allianceit.com <ranj...@allianceit.com>*

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


PLACEMENT :- Salesforce SFDC security Architect, Owing Mill,MD

2016-05-18 Thread vicky menon
*Hello All,*
*Hope you are doing fine !!*

*Please find the requirement below ; If you find yourself comfortable with
the requirement please reply back with your updated resume and I will get
back to you or I would really appreciate if you can give me a call back at
my contact 510-972-5241 // vi...@itscient.com <vi...@itscient.com> //
vicky.kumaritsci...@gmail.com <vicky.kumaritsci...@gmail.com>*

*Position: Salesforce SFDC security Architect*
*Location: Owing Mill,MD*
*Duration: 6+ Months*

*Detailed JD :-*



   - *SFDC security Architect. Experience with SSO Setup and SAML 2.0 to
   integrate internal and third party applications. *
   - *Knowledge and experience in Salesforce Encryption and platform
   encryption. *
   - *Experience using the Gateway products like Cipher Cloud with
   Salesforce *
   - *Solid understanding of Security and sharing model, data structures,
   data modeling, & database schema is required. *
   - *Experience in authenticated web service callouts using Two-Way SSL *
   - *Working knowledge on data masking tools(Ex: Informatica Cloud Test
   data) *
   - *Experience in Set up Two-Factor Authentication Login Requirements for
   Single Sign-On. *
   - *Experience working with Apex and Visual Force (triggers, classes,
   test classes, extensions, components). *
   - *Experience using the Eclipse - Force.com IDE (or equivalent IDE *
   -
- *Minimum five (5) years experience developing and implementing enterprise
   solutions *
   - *Minimum three (3) years of Salesforce experience including writing
   Apex and VF Pages, Triggers *
   - *Solid understanding of and detailed experience with Salesforce.com
   architecture and APIs*

*· Proficiency in HTML, XML, JavaScript, ASP, SQL, Java or C++, SOAP or
REST, and JSON*
*· Demonstrated willingness and capability to learn new technologies
quickly*
*· Burning desire to build great experiences for our customers*
*· Familiarity with security standards such as TLS and SSL is required.*
*· Ability to analyze complex data or systems issues and to provide
actionable recommendations*
*· Experience with large enterprise development and release procedures is
preferred*

*Domain* Salesforce *

*--*


*Thanks and regards,Vicky Kumar Menon*
*|| IT-SCIENT || Phone: 510-972-5241 || Fax: 877.701.4872 || Email:**
vi...@itscient.com
<vi...@itscient.com> **|| Web:* *www.itscient.com
<http://www.itscient.com/>* *||*

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


FW: Job Opening :: .Net Security Architect || Effingham, IL || 6+ Months

2016-04-29 Thread anmol sharma
*Dear Associate,*

 Hope you are doing well! We have an excellent opportunity of *.Net
Security Architect *in *Effingham, IL* please share your interest at the
earliest

 *Please share resume on an...@tresourceinc.com <an...@tresourceinc.com>*

*For your review, Job Description is as follows:*



*Position :: .Net Security Architect*

*Location:: Effingham, IL*

*Duration:: 6+ Months*

 For H1 candidate Need H1B copy at the time of submission



*Required Skills:*

   Ø  Design and implement architectural framework for Security

Ø  Strong experience of HIPAA compliance implementation

Ø  Experience with VeraCode

Ø  Architecture level knowledge of Data Handling which covers - At REST
Security (Selected PHI data) , Mask Sensitive Data, In Transit Security,
Secure Third Party Integration and Internal Integrations.

Ø  Architecture level understanding of Database Isolation - which includes
- Multi-tennancy & Logical separation of Tenant data



 Anmol Sharma

Technical Recruiter

Phone no: 408-709-1760 <+14087091760> EXT: 9699

www.tech-resource.com

1700 Park St, Unit 212,
Naperville IL, 60563

|an...@tresourceinc.com












--

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Required::: Security Architect || Austin, TX || 4+ Months...

2016-04-15 Thread Ali Ahmed
Dear Associates,


Hope you are doing great!

*Please reply to **recruite...@exatechinc.com <recruite...@exatechinc.com> *


This is Ali Ahmed from Exatech Inc. We have an immediate need for below
mention requirement, if you feel that you are a perfect match to this
requirement, please forward your most updated resume along with the best
time and number to carry out further discussions.


Looking forward to hear from you...


*Role: Security Architect*

*Location: Austin, TX*

*Duration: 4+ Months*

*Rate: Open*


*Minimum Requirements:*

*Years*

*Skills/Experience*

7

Full-time experience working in the following (or closely related) fields:
information security, programming, systems analysis, system design;
security architecture; risk assessments, network administration

4

Experience conducting security assessments and/or audits of policies,
standards, procedures and technical environment

4

Experience monitoring/analyzing logs, intrusion detection systems, and
incident handling

4

Experience utilizing vulnerability and risk management software (i.e.
Nessus, Metasploit, Splunk, AppScan, etc.)

4

Experience in business/technical requirements gathering, defining,
reviewing and tracing

4

Experience completing systems security certification and accreditation
process

4

Experience in governance, risk assurance, and compliance program
implementation

4

Experience working with network security, routing protocols, and devices
(i.e. routers, switches, firewalls, IPS)

4

Experience in managing Information security related projects to ensure that
they meet business and security requirements in a timely and cost effective
manner

4

Experience analyzing and defining enterprise, application, and functional
roles

4

Experience in defining, reviewing, and analyzing access controls

4

Experience in Validation and Verification

4

Knowledge of information security principles and practices

4

Knowledge of application security support

4

Knowledge of network infrastructure security support

4

Knowledge of Identity Management principles

4

Knowledge of Access Management principles

4

Knowledge of provisioning principles

4

Knowledge of Directory Services principles, including Active Directory,
LDAP, Virtual Directory and Proxy Directory

4

Knowledge of High Availability, Load Balancing, Local and Geographic
Redundancy and Disaster Recovery Principles

4

Skill in handling multiple tasks, prioritizing, and meeting deadlines

4

Skill in effective oral and written communication

4

Skill in exercising sound judgment and effective decision making

4

Ability to receive and respond positively to constructive feedback

4

Ability to work cooperatively with others in a professional office
environment

4

Ability to provide excellent customer service


*Preferences:*

*Years*

*Skills/Experience*

4

Experience in advising, instructing, and documenting security best
practices and risk mitigation plans

4

Experience in local, state, and federal standards, guidelines and
regulations relating to information security and computer crime

4

Experience in encryption, digital certificates, statistical analysis
processes, and risk management methodology

4

Knowledge in National Institute of Standards and Technology (NIST)
frameworks and standards

4

Knowledge in hacking techniques and culture

4

Certification in Information Systems Security Professional (CISSP)

4

Certification in one or more of the following areas:

·   Certified Information Systems Auditor (CISA)

·   Certification and Analysis Professional (CAP)

·   Systems Security Certified Practitioner (SSCP)

·   Certified in the Governance of Enterprise Information
Technology (CGEIT)

·   Certified Information Privacy Professional (4 different
versions CIPP IT,

CIPP

Government and CIPP Canada and only CIPP)

·   NSA IAM / IEM Certification

·   SANS GIAC: "Intrusion Prevention", "Incident Handling",
"Vulnerability

Assessment", “Forensics”, "Risk Management", or "IT Auditor"

·   Project Management

Regards

*Ali Ahmed*

*Exatech Inc*

4758 Forest Ridge Dr

Mason OH 45040

Phone: 513-433-5531

Email: recruite...@exatechinc.com

Web: www.exatechinc.com

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Urgent Opening - Data Security Architect - Omaha, NE

2016-04-07 Thread ashish gupta
Hello,



Hope you are doing great.



Please review the requirement and if you find it matching your profile then
send me your updated resume with best possible rate/HR  ASAP.



*Role: Data Security Architect *

*Location: Omaha, NE*

*Duration: 6 Months*



Description –



Skill Set



· Strong knowledge on Data Security Concepts, Sensitive Data
Analysis

· 8 years in Information Security with at least 5 years is Data
Security



JD



· Support the tokenization/Encryption process set up using Voltage

· Strong knowledge of encryption algorithms like AES, SHA , PKCS
standards

· Strong knowledge of data security standards PCI-DSS, FFIEC etc

· Sensitive Data Analysis for new applications that needs be
protected

· Work with Business users during analysis, design, implementation
and issues if any

· Monitor the functioning of Voltage Components

· Work with the vendor during Tool Upgrade

· Work with Voltage support team in case of any issues with the tool

· Completely responsible for the Data Security Solution implemented
using Voltage

· Good knowledge of at least one programming language with the
ability to build reusable frameworks

· Design and implement data security solutions at multiple level
including application, database, data level, field level etc

· Deep understanding in Key Management

· Experience working the Hardware Security Modules







Regards

Ashish Gupta

1351 McCarthy Boulevard, Suit 116, Milpitas, CA, USA, 95035

*Phone* : 408-668-9470

*Yahoo, Hangouts* : ashish.recruiter12

*Email* : ashish.gu...@idctechnologies.com

*URL* : WWW.idctechnologies.com <http://www.idctechnologies.com/>

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


[Locals Only]REQ : Application Security architect,Detroit, MI[Locals Only]

2016-03-28 Thread Rctrs Group
Hi  Folks,

Hope you are doing great today!!! Please find the following Direct Client
requirement and revert me back with suitable profiles.
Revert me back on this mail or reach me at 732 982 5999.

Position : *Application Security architect*
Location : Detroit, MI
Duration : Till 12/31/16

*[Locals Only]*

•Strong hands on Platform, Network and Application security
•Complete SDLC experience
•Security Architecture
•Security Assessment
•Security Coding
•Release management


Thanks & Regards.

Rocky
Sr.Technical It Recruiter
ro...@centraprise.com
Centraprise Corp
Edison , New Jersey.
3 Ethel Rd,Suite # 304.
Direct: (732) 982 5999  Ex : 452
Fax :(732) 626 6289
Minority Owned (MBE) Certified

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Need Security Architect in Lansing MI for 12 months

2016-03-10 Thread Shaik Asif
Hi Partner,

Please go through the below requirement if you have any consultant please
send me the updated profile to *p...@innosoul.com <p...@innosoul.com>* or
reach me at *518-504-0086*


*Certified Information Systems Security Professional* (*CISSP*)


*We are looking for 15+ Years resumes*


*Position: Security Architect*

*Location: Lansing MI*

*Duration: 12 months*

*Rate : $180/hr on C2C*



Skills Required This position requires the understanding of the business
context for enterprise application security technologies. An end-to-end
knowledge and understanding of critical system(s) environments, customer
business and applicable technologies. Knowledge of cyber security
regulations and the cyber security regulatory environment. It requires a
high degree of technical skill, initiative, creativity and broad-based
understanding of technology areas. All activities require strict adherence
to department policies and procedures as well as industry best practices.
As a senior position it also involves mentoring, coaching and constant
coordination and consultation with fellow architects and administrators
within the team, vendors and other teams. This position requires the
ability to analyze problems in the environment and provide solutions. This
position requires a thorough understanding of peripheral technologies e.g.,
UNIX, Windows, IP networking, security and audit compliance, enterprise
application security and interfaces into the network environment. This
position must be able to present complex technical solutions in a business
friendly manner, to stakeholders, executive management, vendors, etc.


Skills Preferred

Experience Required 5+ years as an IT Security Architect or Network
Architect 5+ years working in government IT Security roles CISSP
certification is required.

Experience Preferred

Education Required Bachelor’s degree in information systems or other
relevant degree or equivalent industry experience.



Position Description This position is responsible for the overall
strategic, technical, architectural and administrative oversight of the
enterprise application security environments throughout the State of
Michigan. It is responsible for all functions required to plan, design,
optimize, implement, manage, and troubleshoot escalated issues within the
enterprise application security environment. This position is additionally
responsible for advocating the use of application security technologies and
practices, developing standards and procedures, conduct audits, promoting
the usage of automated tools, consulting on current cyber security
regulation changes, developing strategies, and aligning practices with
strategic initiatives. The position provides critical oversight for
infrastructure maintenance and improvements in this highly visible and
critical “red-card” environment containing highly sensitive personal
information; having internal and external interfaces with critical systems;
and operating under strict architectural guidelines and oversight. This
position requires an extremely high degree of technical skill, initiative
and creativity and must stay current with new and emerging theories,
standards, technologies, and practices in tools, software, cyber security
operating systems and hardware in order to provide for the needs of the
state. Responsibilities also include end-to-end facilitation, pilot
implementation, validation, and roll out of new technologies for enterprise
application security. As an enterprise architect position it also involves
mentoring, coaching and coordination and consultation with fellow systems
administrators and architects within the team, Enterprise Architecture,
Michigan Cyber Security, vendors, and other teams that interface with the
enterprise environments. Must be able to communicate in business friendly
terminology, to all stakeholders.


Best Regards

*Paul*

 518-504-0086

Email : p...@innosoul.com

Linkedin : *https://www.linkedin.com/in/paul-lawson-177637b3
<https://www.linkedin.com/in/paul-lawson-177637b3>*

www.innosoul.com

innoSoul,Inc. (An IBM Partner Company)

NY Minority and Woman Owned Business Enterprise (MWBE)

24 Fairfield Ave, Albany NY 12205 Fax: 206-666-1776

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Urgent Opening - Infrastructure Security Architect - Minneapolis, MN

2016-02-02 Thread ashish gupta
Hello,



Hope you are doing great.



Please review the requirement and if you find it matching your profile then
send me your updated resume ASAP/IMMEDIATE



*Title:  Infrastructure Security Architect*

*Location: Minneapolis, MN*

*Duration: 6+ Months *



Duties include:

· Analyze Business Requirements

· -Collaborate with the business to understand/refine/influence
business requirements

· -Ensure that the business opportunity is properly interpreted,
well-understood and clearly documented

· -Collaborate with the business to define an end-to-end
operational vision

· -Demonstrate understanding of cross-functional/cross-domain
requirements and impact

· -Ensure understanding of business capabilities/processes (current
and future)

· -Ensure quality of requirements for solutions development (e.g.,
VFQs)

· Perform Options Analysis

· -Maintain knowledge of current and emerging technologies/products
related to architectural solutions

· -Ensure alignment of solutions with business and IT
goals/objectives

· -Identify/quantify scope and impact of business changes on
systems

· -Identify commercially-available products that can enable the
development and/or delivery of the solution

· -Facilitate/lead/participate in identification of solution
options and features

· -Identify/select proper solutions based on defined criteria

· -Analyze/identify applicable solution requirements

· -Communicate solution options to business owners/stakeholders

· -Utilize applicable standards, and provide/document rationale for
variances from standards

· -Develop/communicate options summary

· Develop Conceptual Designs

· -Develop/finalize/approve solution summary documentation (e.g.,
BACD, SSD, conceptual data model, process flows)

· -Incorporate software and system architecture (e.g.,
infrastructure, network) into conceptual designs

· -Ensure alignment of conceptual designs with enterprise, segment
and functional roadmaps

· -Review conceptual designs to ensure
scalability/applicability/quality/comprehensiveness

· -Ensure traceability between solution summary and applicable
requirements (e.g., PRD, VFQ)

· -Determine when resource, technology and/or application
constraints warrant change to the solution design, and modify the

· conceptual design accordingly

· -Contribute to/review SOWs/RFPs and make recommendations for
improvement to ensure applicability/comprehensiveness

· Ensure Quality/Alignment of Conceptual Designs

· -Provide oversight of conceptual designs to ensure alignment with
enterprise architecture governance

· -Ensure alignment with enterprise technology standards (e.g.,
solution patterns, technology roadmaps, capital plans)

· -Review implementation to ensure alignment with conceptual
design, and resolve any operational issues

· -Ensure adherence to SDLC/UDP/RSA processes (e.g., ADR
documentation requirements)

· -Ensure alignment with IRM policies

· -Ensure alignment with infrastructure policies and standards

· -Identify gaps between established standards and proposed
solutions, and follow the exception/waiver process as needed

· -Participate in Architectural Assurance Reviews

· -Ensure that approved solutions and artifacts are captured in
applicable repository

· Demonstrate and Apply Knowledge of Enterprise Architecture and
Standards

· -Maintain awareness of current technology assets, and the
applicability and capability of each

· -Understand and adhere to the Enterprise Architecture (EA)
governance framework (e.g., principles, policies, standards, reference

· architectures, data-driven designs)

· -Seek opportunities for reuse of existing technology assets, and
make appropriate recommendations

· -Maintain awareness of current business and industry
issues/trends, and incorporate into enterprise architecture designs as

· appropriate

· -Provide ad hoc consulting in applicable areas of expertise



Required Qualifications:

•Undergraduate degree

•8+ years overall experience in IT Solution Delivery and
architecture

•5+ years of experience in secure Networking from architecture,
managing, planning/analysis, design, configuration, implementation,
administration, and monitoring

•3+ years of experience leading complex security projects/programs
for a large enterprise organization

•5+ years of experience supporting network security incident
response activities including detection, analysis, containment, response
and prevention procedures

•3+ years of experience writing Requirements, Acceptance Criteria,
and drawing Network/Security schematics.

· Preferred Qualifications

Urgent Requirement: Security Architect at Anaheim, CA

2016-01-28 Thread shahnawaz ali
*Hi, **Hope you are doing great. Please go through the below mentioned
requirement and share the profiles at **a...@tresourceinc.com
<a...@tresourceinc.com>** ASAP.*

*Job Title:     Security Architect*

*Location: Anaheim, CA*

*Type of hire:   6+ months Contract*



*Interview Mode: Telephonic and Skype/F2F*



Local is preference with them, but we can arrange skype for right candidates


*Job Summary:  *The Security Architect is responsible for performing level
2/3 operational duties while providing architectural consultative services
related to several transformative information technology initiatives.  The
role requires daily hands-on administration of key information security
applications that support the cyber security and incident response
programs.

*Architectural Functions*

· Expert level knowledge of security architectural designs,
requirements development, and solutions definition

· Strong working knowledge in cloud solutions including Azure, AWS,
and O365

· Serve as the subject matter expert for messaging, email, SMTP,
and encryption

· Familiarity with Active Directory security policy settings, GPO,
and identity best practices

· Provides consulting support to projects during the planning,
analysis, design, and build phases

· Influence the strategic and technical decisions during all phases
of a project

· Grasps key client issues based on fact-gathering activities and
develops appropriate analyses and hypotheses


*Operational Functions *

· Experience in SIEM and email/messaging security applications

· Strong working knowledge of system and application logging,
monitoring, and alerting

· Identifies, evaluates, and implements  process and systems
improvement opportunities

· Acts as an intermediary and facilitator to help expand the
capabilities of information security network controls

· Contribute to security risk identification, classification, and
mitigation processes

· Research and analyze incident trends.  Recommend and implement
technology, process, training or other changes to mitigate incident risks.



*Knowledge / Skills / Abilities:*

· Proactive and self-sufficient in working to fulfill the
objectives of this role.

· Ability to accomplish the objectives of this role by
collaborating with others across the ministry and influencing them to take
the appropriate actions.

· Exhibits excellent verbal and written communication skills.
Excellent interpersonal skills.

· Have outstanding project management skills with the ability to
prioritize multiple, diverse, and simultaneous requirements.

· Strong analytical and problem solving skills

· Exhibits excellent verbal and written communication skills.
Excellent interpersonal skills.


*Minimum Position Qualifications:  *

· CISSP certification and health care industry experience

· Administrative experience of AD, Exchange, email encryption, and
SIEM

· McAfee Nitro SIEM, Proofpoint email encryption, McAfee email
gateway experience required

·
http://www.mcafee.com/us/products/siem/index.aspx?eid=15Q3NASRSIE6561





*Regards,ali...@tresourceinc.com <a...@tresourceinc.com>408-709-1760 EXT
9859*

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Urgent need HANA Security Architect ---Santa Clara, CA

2016-01-27 Thread MADHU-GenuineItLlc
Hi Partner,

Hope you are doing great …

Please send resume to ma...@genuineitllc.com





*Title**:** HANA Security Architect*

*Location**: **Santa Clara, CA.*



*Overview:*

we know that with the right people on board, anything is possible. The
quality, integrity, and commitment of our employees have been key factors
in our company’s growth and market presence. By hiring the best people and
helping them grow both professionally and personally, we ensure a bright
future for client and for the people who work here.





*Qualifications:*

ü  The candidate should be a strong team player and have the ability to
work independently.
The job description of the consultant is as follows.

- Experience designing and implementing security for SAP HANA
- Experience Creating customized roles in HANA DB for Developers, Modelers,
Technical Admins, End Users, Power Users.
- Design, Restrict and Control authorizations for HANA DB objects and
Packages/Contents based on System Privileges, Objects Privileges and
Analytic Privileges for various Schema Users
- Define controls to restrict Create, Drop, Alter other DB Admin rights on
HANA DB Schema and its objects
- Design transportation of Security Objects/Roles within HANA Landscape
- Define user creation and Role assignment processes
- Set up password policies
- Create Groups in BOBJ Server for different type of Users (Admins,
Managers, Developers, End Users etc..)
- Define and Control access to various Folders
- Setup SSO with AD or LDAP for SAP, Enterprise and other types of
Authentication
- Define & Control access at Object level for different types of BOBJ
Reports (Full control, View, Schedule, View on Demand)
- Transportation of Security objects within BOBJ Landscape
- Integration of BOBJ Security with HANA DB Security Roles

This is pure hands on role



---

*With Warm Regards *

*Madhu Roy*

GenuineIT LLC *Certified Women Owned Business*

Making IT Happen…

Ph: 832 539 3475

Fax: 281-605-5969

*E-Mail* :ma...@genuineitllc.com

*Gmail *: *nandimadhu74 , madhu.genuineitllc*

*YM  *: madhu_recruiter



Looking ahead to work with you for better Business prospects



According to Bill S.1618 Title III passed by the 105th US Congress, this
message is not considered as "Spam" as we have included the contact
information. If you wish to be removed from our mailing list, please
respond with "remove" in the subject field. We apologize for any
inconvenience caused.

Please consider the environment before printing this e-mail

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Need Security Architect in Columbia, SC for 5 months

2016-01-18 Thread Shaik Asif
*Please sent your consultants resume on p...@innosoul.com
*

*Position:Security Architect*
*Location: Columbia, SC*
*Duration: 5 months*

Category Name Required Importance Level Last Used Experience
Network Security information security principles and practices Yes 1
Lead Currently
Using 6 + Years
Network Security IT Security Yes 1 Lead Currently Using 6 + Years
Network Security Security Information Architecture Yes 1 Lead Currently
Using 6 + Years
Network Security Application Security No 1 Expert Within 1 Year 6 + Years
Network Security risk/vulnerability assessments No 1 Expert Within 10 Years 6
+ Years
Network Security Role Based Access Control (RBAC) No 1 Expert Within 1 Year 6
+ Years
Network Security Security Information Event Management (SIEM) systems
development / configuration No 1 Expert Within 1 Year 6 + Years
Networking & Directories Access control logging and reporting systems Yes 1
Lead Currently Using 6 + Years
Networking & Directories Experience with UNIX, Windows, Linux, MacOS,
Cisco, Juniper, web apps, databases, strong authentication, operating
systems and network security protocols and procedures. Yes 1 Lead Currently
Using 6 + Years
Networking & Directories Information Security Yes 1 Lead Currently Using 6
+ Years
Networking & Directories Network security Yes 1 Lead Currently Using 6 +
Years
Networking & Directories data discovery and data loss prevention (DLP) No 1
Expert Within 1 Year 6 + Years
Networking & Directories Identity Access Management (IAM) No 1 Expert Within
1 Year 6 + Years
Networking & Directories privileged user management (PUM) No 1 Expert Within
1 Year 6 + Years
Specialties Event Handling No 1 Expert Within 1 Year 6 + Years
Specialties IBM No 1 Expert Within 1 Year 6 + Years

*REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):*

Cyber Awareness and understanding

Expert understanding of information, computer and network security. Its
operation, engineering, and architecture.

Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web apps,
databases, strong authentication, operating systems and network security
protocols and procedures.

Expert understanding of access control logging and reporting systems.

*PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):*
Identity Access Management (IAM)
Role Based Access Controls (RBAC)
Privileged User Management (PUM)
Data Loss Prevention (DLP)
Security Information Event Management (SIEM) systems
Vulnerability Assessment (VA)
Applications Security (AppSec)
User metadata and Information Security event collection, logging and
correlation
McAfee e-Policy Orchestrator (ePO) / DoD HBSS
Tenable Security Center / Nessus
IBM AppScan

*Background Checks*
riminal Record – 7 Year History Candidate Confirmation
Drug Screening – 10 Panel Candidate Confirmation
Credit Report – 7 Year History Candidate Confirmation
Driving Record – 7 Year history Candidate Confirmation

​
Best Regards
*Paul*
*[image: http://www.telephoneart.com/animate/ringing.gif]* 518-504-0086
Email : p...@innosoul.com
Linkedin :https://www.linkedin.com/pub/paul-k/49/a53/836
www.innosoul.com
innoSoul,Inc. (An IBM Partner Company)
NY Minority and Woman Owned Business Enterprise (MWBE)
24 Fairfield Ave, Albany NY 12205 Fax: 206-666-1776

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Need Security Architect in Columbia for 5 months

2016-01-15 Thread Shaik Asif
*Please sent your consultant on p...@innosoul.com <p...@innosoul.com>*


*Position: Security Architect  *


*Location: Columbia, SC Duration: 5 months*



*Category Name Required Importance Level Last Used Experience*
Network Security information security principles and practices Yes 1 Lead
Currently Using 6 + Years
Network Security IT Security Yes 1 Lead Currently Using 6 + Years
Network Security Security Information Architecture Yes 1 Lead Currently
Using 6 + Years
Network Security Application Security No 1 Expert Within 1 Year 6 + Years
Network Security risk/vulnerability assessments No 1 Expert Within 10 Years
6 + Years
Network Security Role Based Access Control (RBAC) No 1 Expert Within 1 Year
6 + Years
Network Security Security Information Event Management (SIEM) systems
development / configuration No 1 Expert Within 1 Year 6 + Years
Networking & Directories Access control logging and reporting systems Yes 1
Lead Currently Using 6 + Years
Networking & Directories Experience with UNIX, Windows, Linux, MacOS,
Cisco, Juniper, web apps, databases, strong authentication, operating
systems and network security protocols and procedures. Yes 1 Lead Currently
Using 6 + Years
Networking & Directories Information Security Yes 1 Lead Currently Using 6
+ Years
Networking & Directories Network security Yes 1 Lead Currently Using 6 +
Years
Networking & Directories data discovery and data loss prevention (DLP) No 1
Expert Within 1 Year 6 + Years
Networking & Directories Identity Access Management (IAM) No 1 Expert
Within 1 Year 6 + Years
Networking & Directories privileged user management (PUM) No 1 Expert
Within 1 Year 6 + Years
Specialties Event Handling No 1 Expert Within 1 Year 6 + Years
Specialties IBM No 1 Expert Within 1 Year 6 + Years



*REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):*

Cyber Awareness and understanding

Expert understanding of information, computer and network security. Its
operation, engineering, and architecture.

Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web apps,
databases, strong authentication, operating systems and network security
protocols and procedures.

Expert understanding of access control logging and reporting systems.

PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
Identity Access Management (IAM)
Role Based Access Controls (RBAC)
Privileged User Management (PUM)
Data Loss Prevention (DLP)
Security Information Event Management (SIEM) systems
Vulnerability Assessment (VA)
Applications Security (AppSec)
User metadata and Information Security event collection, logging and
correlation
McAfee e-Policy Orchestrator (ePO) / DoD HBSS
Tenable Security Center / Nessus
IBM AppScan



*Background Checks*
riminal Record – 7 Year History Candidate Confirmation
Drug Screening – 10 Panel Candidate Confirmation
Credit Report – 7 Year History Candidate Confirmation
Driving Record – 7 Year history Candidate Confirmation



​​

Best Regards

*Paul*

 518-504-0086

Email : p...@innosoul.com

Linkedin :https://www.linkedin.com/pub/paul-k/49/a53/836

www.innosoul.com

innoSoul,Inc. (An IBM Partner Company)

NY Minority and Woman Owned Business Enterprise (MWBE)

24 Fairfield Ave, Albany NY 12205 Fax: 206-666-1776

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Urgent Requirement Need // HANA Security Architect // Santa Clara, CA

2015-12-09 Thread vijay
Hi ,

Hope you are doing good !!

Please go though the requirement an let me know if you are Comfortable or
not ASAP..



We have an urgent requirement as follows:

Please respond with Update resume for vija...@avanitechsolutions.com



*Job Title: HANA Security Architect*

*Location: Santa Clara, California*

*Duration: 6 months*



*Job description*

The candidate should be a strong team player and have the ability to work
independently.

The job description of the consultant is as follows.



1.   Experience designing and implementing security for SAP HANA

2.   Experience Creating customized roles in HANA DB for Developers,
Modelers, Technical Admins, End Users, Power Users.

3.   Design, Restrict and Control authorizations for HANA DB objects
and Packages/Contents based on System Privileges, Objects Privileges and
Analytic Privileges for various Schema Users

4.   Define controls to restrict Create, Drop, Alter other DB Admin
rights on HANA DB Schema and its objects

5.   Design transportation of Security Objects/Roles within HANA
Landscape

6.   Define user creation and Role assignment processes

7.   Set up password policies

8.   Create Groups in BOBJ Server for different type of Users (Admins,
Managers, Developers, End Users etc..)

9.   Define and Control access to various Folders

10.Setup SSO with AD or LDAP for SAP, Enterprise and other types of
Authentication

11.Define & Control access at Object level for different types of BOBJ
Reports (Full control, View, Schedule, View on Demand)

12.Transportation of Security objects within BOBJ Landscape

13.Integration of BOBJ Security with HANA DB Security Roles



*This is pure hands on role*




Thanks & Regards

*Vijender D *| IT Recruiter

*[image: cid:image001.jpg@01D08762.68493F80]*

​Mobile: +1-585-643-1768 | Fax: +1- 585-285-4133

​email: vija...@avanitechsolutions.com <00...@avanitechsolutions.com>  |
website: www.avanitechsolutions.com​​

Yahoo: vijjuvijay48 | Gtalk: vijjuvijay48

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


URGENT REQUIREMENT :: Oracle Mobile Security Suite 11g System & Security Architect :: Remote :: 2-3+ Months

2015-12-01 Thread todd parks
*Hi,We have the following position. please let me know if you are
interested.Role: Oracle Mobile Security Suite 11g System & Security
Architect*

*Location: **Remote*

*Duration : 2-3+ Months*

* Job Description:*

*Industry   *:  General / Oracle Mobility /
Oracle Enterprise Mobility

*Initiative/Task  *: Resource will be responsible for
completion of various tasks, relating to the Oracle Mobile Security Suite
11g

*Current Products  *: Oracle Mobile Security Suite 11g

*Required Modules   *: All aspects of Solaris 11



*Core Assignment:  *Complete various tasks relating to Oracle Mobile
Security Suite 11g, in the following areas:

• Oracle Mobile Security Suite Fundamentals

• Oracle Mobile Security Suite Access Server (MSAS)

• Oracle Mobile Security Suite Admin Console (MSAC)

• Oracle Mobile Security Suite File Manager (MSFM)

• Oracle Mobile Security Suite Notification Server (MSNS)

• Oracle Mobile Security Suite Containerization

• Oracle Mobile Security Suite Provisioning

• Oracle Mobile Security Suite Policies

• Deployment



*Specific Focal Points:  *Oracle Mobile Security Suite 11g certification(s)



*Required Skill sets: (Skills that must be met)*

• Secure Mobile Container Apps

• Secure Web Browser

o Kerberos or NTLM

o HTML5 applications including offline support

o Download files into file manager (if your security policy
allows it)

• Secure File Manager

• Accessing network files on Windows File System or SharePoint

• Moving or copying files to/from local file store

• Native clients supporting ActiveSync mail server including
Exchange, Google Apps, and Lotus Notes

• Attachments can be restricted to the container

• OMSS Component Architecture

• Secure Email, Calendar, Contacts, Tasks, Notes

• Solution Components

• DMZ and app level SSL tunnel deployments

• Mobile Security Administrative console / WebDAV

• Internal SMB/CIFS file shares

• Mobile Security Container (previously known as Bitzer Secure
Container)

• Single Sign-on and FIPS 140-2 encryption. Current support for
iOS only.

• Mobile Security Access Server

• Mobile Security Administrative Console

• Installing Oracle Mobile Security Suite on Windows

• Installing Oracle Mobile Security Suite on Linux

• Mobile Security Administrative Console Guide

• Extending Enterprise Access and Governance with Oracle Mobile
Security

• Mobile Security File Manager

• Mobile Security Notification Server

• Customization and Branding

• Advanced Configuration Options

• Application Containerization

• Extending Enterprise Access and Governance with Oracle Mobile
Security

• Mobile Security Access Server (previously known as BMAX
Gateway)

• Mobile Security File Manager (previously m/Drive)

• Mobile Security Application Wrapping Tool (previously Bitzer
Containerization Tool)

• Extending Enterprise Access and Governance with Oracle Mobile
Security

• Installation Requirements Understanding, Implementation,
Advanced Configuration options, and Troubleshooting in all of the following
Oracle Mobile Security Suite products / components:



Thanks and Regards

*Todd Parks*

Ph: 630-315-9525 || Email: todd_pa...@aesinc.us.com ||
<http://www.aesinc.us.com/>

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Direct Client Requirement @ Security architect @ Santa Clara, CA

2015-10-09 Thread Vickey
Hi Friend,

Greetings for the day!!!

This is Anu from Talentminds; I am working on below requirement. Please
help me with updated resume ASAP.

*Reply to anu.talentmi...@gmail.com <u.talentmi...@gmail.com>*

*Role: Security Architect*
*Location Santa Clara, CA*
*Duration: 6+ Months*

*Description:*



• Should have worked in designing the security architecture in
cloud and datacenter environments

• Should have worked in the capacity of a security architect and
dealt with requirements gathering from multiple stakeholders, building the
security strategy & design

• Should have good understanding of security compliance standards
(one or more of ISO, PCI, HIPPA etc) and should must have worked with
external security audit organizations during security audits



Regards,

Anu | Sr Recruiter
Talent Minds
Phone:214-884-5136
Email: anu.talentmi...@gmail.com

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Security Architect Opportunity In MA

2015-09-14 Thread vincent karoff
Hello Good Morning,
This is *Vincent  Karoff *
Below Is the Hottest Position for my client please do let me know I you
have any suitable consultants


*The client need someone Local to MA and Green Card USC and EAD- TN
Candidates*
Position: Security Architect
Duration: 3+ month
Location: Southboro, MA.

They Need local to MA I can get the Interview ASAP .

Job Description:
This position is part of a Secure Solution Delivery Group that works
proactively to drive value and mitigate risk by providing consistent
direction and providing subject matter expertise in network vulnerability
assessments, design and deployment of security technologies and solutions.
Will help to facilitate and drive the design and implementation of complex
enterprise IT infrastructure security, processes, standards, regulatory
issues, and assessments.
Will drive the implementation of Standard and Custom Security Solutions to
IT and Business projects.
Assess and evaluate the risk (design mitigation) and ensure any accepted
risk is fully documented.
Support the design of secure infrastructure, applications and mobile
solutions.
Assist in the implementation of protective and mitigating controls.
Provide support to security operations and assist in providing technical
security consulting services of technical security projects.

Responsibilities:
- Research, design, and implement information security solutions for
organization.
- Architect systems and products that comply with all applicable security
policies and standards.
- Architect innovative solutions for wide range of complex problems.
- Interface with management to report on project and milestones.
- Independently determine and develop approach to solutions, under limited
direction
- Develop new methodologies or processes and re-evaluate existing processes
- Perform technical project leadership roles.
- Anticipate issues and address them proactively.
- Articulate Web Application Security Analysis findings and provide
remediation strategies as well as Security Thread Modeling

Skills
- Knowledge of Web Services, SOA Architecture, Application Security
Firewalls, XML Firewalls and IDS technologies.
- Knowledge of Enterprise Mobility Architectures and emerging technologies
- Experience with Single Sign-on technologies.
- Experience in wireless, mobile, infrastructure or application level
vulnerability testing, remediation, risk assessment and auditing.
- Application Security knowledge and best practices.
- Software security designs such as OWASP or SANS secure coding and secure
design principles.
- Background in secure code development and review.
- Familiarity with SDLC, Agile, Rapid Application Development, Kanban,
Scrum, CMMI, Java, SANS GWEB, Android/Apple Development or REST.
- Experience with Cloud Security work AWS, VMWare Air, OpenStack and
RackSpace or other secure cloud deployment security architecture design.
- Strong Network Security Architecture experience.
- Experience with Cloud and Platform as a service are a plus.
- Ability to communicate complex and technical issues to diverse audiences,
orally and in writing, in an easily-understood, authoritative, and
actionable manner.
- A team-focused mentality with the proven ability to work effectively with
diverse stakeholders
- An understanding of the impact of emerging business and end-user
technologies have on information security requirements and architecture
- Broad understanding of all aspects of information security.
- Excellent written and oral communication skills.
- Consultative skills.
- BS in Computer Science, Information Security, or related field
- Experience with regulatory compliance and information security management
frameworks (e.g., IS027000, COBIT, NIST 800, PCI DSS, HIPAA, FedRAmp, GLBA,
Sox etc.)
- SANS CISSP, CISA, GIAC certifications preferred


*Vincent  Karoff  - Technical Recruiter*
vincent.kroff@gmail. <vinc...@panzersolutions.com>
Gtalk :vincent.kroff
skype :syed.abdullah784

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Urgent Need Data Security Architect in Bellevue, WA for 6+months

2015-09-11 Thread Shaik Asif
Hi Partner,



This is Shaik from Deegit Inc. Please find the below requirement for your
review. If you are comfortable with the requirement please get back to me
ASAP on sh...@deegit.com



*Position: Data Security Architect*

Location: Bellevue, WA

Duration: 6+ Months



*Job Description:*

· Data Security Architect is a member of the IDW (Integrated Data
Warehouse) Data Architecture team focused on client’s latest
Hadoop/Teradata Data Warehouse platform.

· This person will own the data warehouse data security strategy
and ensure the new data warehouse complies with client’s security standards
as listed by

· CIS (Corporate Information Security department).

· This role will own the security design on IDW (Integrated Data
Warehouse) from the data architecture side and will work with strategic
vendors, CIS, and other vendor partners to design overall data warehouse
security and to ensure IDW security strategy is in alignment with CIS and
product roadmaps of Hortonworks Hadoop and Teradata

· As a member of the Data Architecture team you will own the
security design of client’s newest Hadoop/Teradata data warehouse
implementation.

· Work with strategic vendors and internal CIS (corporate
information security) and other vendor partners to design the security
controls and to ensure the IDW

· security strategy is in alignment with CIS and product roadmaps
of Hortonworks Hadoop and Teradata

· Collaborate with team members, peers and the business unit
management team to determine technical information security requirements
and planned remediation

· Liaise with and assist outsourced security service providers with
vulnerability assessments of business applications, systems and
architectures.

· Qualifications: Strong understanding of encryption, obfuscation
and/or tokenization technologies

· Candidate must have strong technical, influential and
organizational skills.

· Candidate should be knowledgeable about Hadoop and Teradata
security best practices

· Candidate should be knowledgeable about Hadoop and Teradata
security best practices

· Prefer six years of experience in information security related
discipline, in addition to several years relevant systems and/or network
administration experience.

· Demonstrated ability to work effectively in a complex matrixed
environment.

· Outstanding verbal and written communication skills.

· Ability to translate security requirements into business risks
and impacts.

· Experience with high level design Architecture, Firewall,
Internet, LAN Router, Network, Protocols, Web Services and SOA.

· Appropriate industry certifications, such as CISSP, CISA or CCIE.

· Preferred skill: Bachelor degree in Computer Science, Information
Security, Information Management, or other related discipline.

· Telecommunications industry expertise, Six Sigma Training, Audit,
Compliance & Network experience preferred.





Best Regards,

___



Shaik | Deegit Inc |

1900 East Golf Rd., Suite 925 | Schaumburg, IL 60173 |

Ph: 847.440.2436 ext - 358 | Fax: 847.330.1987

sh...@deegit.com | www.deegit.com |

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Re : Senior Security Architect

2015-09-10 Thread sunil kumar
Hi,



Hope you are doing great.

This is Sunil from Burgeon IT Services, we are an IT consulting
organization and We do have a vacancy with our Prime Customer in which you
may be interested, Kindly review the details and if you find it interesting
do send an updated copy of your updated resume and following details ASAP
to su...@teamworkassociates.net



*Position: Senior Security Architect *

*Location: Houston, TX*

*Duration: 6 months *

*Rate: $60/hr C2C*



*Job Responsibilities:*

· Secures enterprise information by determining security
requirements; planning, implementing, and testing security systems;
preparing security standards, policies, and procedures; mentoring team
members.

· Enhances security team accomplishments and competence by planning
delivery of solutions; answering technical and procedural questions for
less experienced team members; teaching improved processes; mentoring team
members.

· Determines security requirements by evaluating business
strategies and requirements; researching information security standards;
conducting system security and vulnerability analyses and risk assessments;
studying architecture/platform; identifying integration issues; preparing
cost estimates.

· Plans security systems by evaluating network and security
technologies; developing requirements for local area networks (LANs), wide
area networks (WANs), virtual private networks (VPNs), routers, firewalls,
and related security and network devices; designs public key
infrastructures (PKIs), including use of certification authorities (CAs)
and digital signatures as well as hardware and software; adhering to
industry standards.

· Implements security systems by specifying intrusion detection
methodologies and equipment; directing equipment and software installation
and calibration; preparing preventive and reactive measures; creating,
transmitting, and maintaining keys; providing technical support; completing
documentation.

· Verifies security systems by developing and implementing test
scripts.

· Maintains security by monitoring and ensuring compliance to
standards, policies, and procedures; conducting incident response analyses;
developing and conducting training programs.

· Upgrades security systems by monitoring security environment;
identifying security gaps; evaluating and implementing enhancements.

· Prepares system security reports by collecting, analyzing, and
summarizing data and trends.

· Updates job knowledge by tracking and understanding emerging
security practices and standards; participating in educational
opportunities; reading professional publications; maintaining personal
networks; participating in professional organizations.

· Enhances department and organization reputation by accepting
ownership for accomplishing new and different requests; exploring
opportunities to add value to job accomplishments.

*Senior Security Architect Skills and Qualifications:*

Network Security, Network Hardware Configuration, Network Protocols,
Networking Standards, Supervision, Conceptual Skills, Decision Making,
Informing Others, Functional and Technical Skills, Dependability,
Information Security Policies



*Thanks & Regards*



*Sunil*

*Executive Recruiter | Talent Acquisition Team*

Phone No. :302-220-4724 ;Fax : 302-355-1559

Email Id: su...@teamworkassociates.net



 NOTE: We respect your Online Privacy. This is not an unsolicited mail. If
you are not interested in receiving our E-mails then please reply with a
"REMOVE" in the subject line and mention all the E-mail addresses to be
removed with any E-mail addresses which might be diverting the E-mails to
you. We apologize for any unintended inconvenience

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Urgent Need Data Security Architect in Bellevue, WA for 6+months

2015-09-10 Thread Shaik Asif
Hi Partner,



This is Shaik from Deegit Inc. Please find the below requirement for your
review. If you are comfortable with the requirement please get back to me
ASAP on sh...@deegit.com



*Position: Data Security Architect*

Location: Bellevue, WA

Duration: 6+ Months



*Job Description:*

· Data Security Architect is a member of the IDW (Integrated Data
Warehouse) Data Architecture team focused on client’s latest
Hadoop/Teradata Data Warehouse platform.

· This person will own the data warehouse data security strategy
and ensure the new data warehouse complies with client’s security standards
as listed by

· CIS (Corporate Information Security department).

· This role will own the security design on IDW (Integrated Data
Warehouse) from the data architecture side and will work with strategic
vendors, CIS, and other vendor partners to design overall data
warehouse security
and to ensure IDW security strategy is in alignment with CIS and product
roadmaps of Hortonworks Hadoop and Teradata

· As a member of the Data Architecture team you will own the
security design of client’s newest Hadoop/Teradata data warehouse
implementation.

· Work with strategic vendors and internal CIS (corporate
information security) and other vendor partners to design the security
controls and to ensure the IDW

· security strategy is in alignment with CIS and product roadmaps
of Hortonworks Hadoop and Teradata

· Collaborate with team members, peers and the business unit
management team to determine technical information security requirements
and planned remediation

· Liaise with and assist outsourced security service providers with
vulnerability assessments of business applications, systems and
architectures.

· Qualifications: Strong understanding of encryption, obfuscation
and/or tokenization technologies

· Candidate must have strong technical, influential and
organizational skills.

· Candidate should be knowledgeable about Hadoop and Teradata
security best practices

· Candidate should be knowledgeable about Hadoop and Teradata
security best practices

· Prefer six years of experience in information security related
discipline, in addition to several years relevant systems and/or network
administration experience.

· Demonstrated ability to work effectively in a complex matrixed
environment.

· Outstanding verbal and written communication skills.

· Ability to translate security requirements into business risks
and impacts.

· Experience with high level design Architecture, Firewall,
Internet, LAN Router, Network, Protocols, Web Services and SOA.

· Appropriate industry certifications, such as CISSP, CISA or CCIE.

· Preferred skill: Bachelor degree in Computer Science, Information
Security, Information Management, or other related discipline.

· Telecommunications industry expertise, Six Sigma Training, Audit,
Compliance & Network experience preferred.





Best Regards,

___



Shaik | Deegit Inc |

1900 East Golf Rd., Suite 925 | Schaumburg, IL 60173 |

Ph: 847.440.2436 ext - 358 | Fax: 847.330.1987

sh...@deegit.com | www.deegit.com |

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Need Security Architect in Bellevue, WA for 6 months

2015-08-26 Thread Shaik Asif
Hi Partner,



This is Shaik from Deegit Inc. Please find the below requirement for your
review. If you are comfortable with the requirement please get back to me
ASAP on sh...@deegit.com



*Position: Security Architect*

Location: Bellevue, WA

Duration: 6+ Months



*Job Description*

•Data Security Architect is a member of the IDW (Integrated Data
Warehouse) Data Architecture team focused on T-Mobile’s latest
Hadoop/Teradata Data Warehouse platform.

•This person will own the data warehouse data security strategy and
ensure the new data warehouse complies with T-Mobile security standards as
listed by CIS (Corporate Information Security department).



*Responsibilities*

•What you will do:

•This role will own the security design on IDW (Integrated Data
Warehouse) from the data architecture side and will work with strategic
vendors, CIS, and other vendor partners to design overall data warehouse
security and to ensure IDW security strategy is in alignment with CIS and
product roadmaps of Hortonworks Hadoop and Teradata

•As a member of the Data Architecture team you will own the
security design of T-Mobile’s newest Hadoop/Teradata data warehouse
implementation.

•Work with strategic vendors and internal CIS (corporate
information security) and other vendor partners to design the security
controls and to ensure the IDW security strategy is in alignment with CIS
and product roadmaps of Horton works Hadoop and Teradata

•Collaborate with team members, peers and the business unit
management team to determine technical information security requirements
and planned remediation

•Liaise with and assist outsourced security service providers with
vulnerability assessments of business applications, systems and
architectures.



*Qualifications*

•Preferred: Any of the following

•CISSP, CISA, CISM, C-RISC, CCNA, CCIE, Six Sigma
Yellow/Green/Black Belt






Best Regards,

___



Shaik | Deegit Inc |

1900 East Golf Rd., Suite 925 | Schaumburg, IL 60173 |

Ph: 847.440.2436 ext - 358 | Fax: 847.330.1987

sh...@deegit.com | www.deegit.com |

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Need (IAM) Security Architect in MN

2015-08-20 Thread Shankar
*Hi Partners,*



*Greetings,*



*Hope you are doing Well!!!*



*Please forward a profiles to **shan...@techconsultinc.com*
shan...@techconsultinc.com



*Here are the requirement details*

-- 

 *Plymouth, MN*


--

The Identity and Access Management (IAM) Security Architect evaluates
system specifications, processes, and working parameters for complex
application integrations.

Candidate should be self-motivated, enthusiastic, detail oriented,
multi-tasking, and adaptable in a very fast paced environment. This
individual must be a senior level Identity and Access Management Engineer
who can quickly understand our security frameworks and understand how to
integrate with business applications. The IAM Security Architect will have
a leadership role in defining our IDP and IDaaS implementations.

3+ years of experience with one or more of the following IAM products:
CA SiteMinder
Ping Federate
Layer7
CA IdentityMinder
RSA Adaptive Authentication
CA GovernanceMinder
5+ years of experience conducting application integrations
Knowledge and experience with sound IAM practices



Looking forward to hearing from you at the earliest!!!



*Regards*



*Shankar*

Professional Recruiter

33505 State Street, Suite # 200 Farmington, MI 48335

*V* (248)-522-6879

*F* (248)-579-4454

*Linkedin: **www.linkedin.com/in/shkrajan*
http://www.linkedin.com/in/shkrajan

*Email** : **shan...@techconsultinc.com* shan...@techconsultinc.com

*Messanger**: shankarraj...@yahoo.com shankarraj...@yahoo.com*

*Minority Certified and Woman Owned Enterprise*

*TCI**- Technology Consultants inc*

*Note:* *It is not a solicitation attempt!!!*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Urgent Req : Cloud Security Architect Windsor CT Contract

2015-07-27 Thread mike agilees
HI,

This is MIKE from Agile Enterprise Solutions.

This is in reference to the following position.



* Please find below job description if you feel comfortable please
revert with updated resume, Rate and contact details ASAP *



Role:Cloud Security Architect

Location: Windsor CT

Duration: Contract

Client :Infosys / VOYA



Job Description:

We need a security architect who has hands on experience in cloud
environment where he has worked on defining and implement enterprise
security standards, policies in the cloud environment (SIEM, Security
Testing, some DR) and then work with App SME on cloud migration in
compliance with the security standards.



Thanks  Regards



Mike Michon,

Agile Enterprise Solutions Inc.,

Ensuring Client's Success

Ph: 630-315-9541

Fax: (630) 206-2397

Email: mike_mic...@aesinc.us.com

Web: www.agilees.com

Gtalk/YIM: mikeagilees 

Note: If you have received this mail in error or prefer not to receive
such emails in the future, please reply with REMOVE in the subject
line and the email id(s) to be removed. All removal requests will be
honored ASAP. We sincerely apologize for any inconvenience caused.

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Our client is looking for Identity Access Management Security Architect@Milwaukee, WI

2015-06-12 Thread vickey recruiter
*Hi Friend,*

*Greetings for the day!!!*

*This is Vijay from SQLN Systems; I am working on below requirement. Please
help me with updated resume ASAP.*

*Reply to vi...@sqlnsystems.com vi...@sqlnsystems.com*



*Title:  Cloud Security: Identity Access
Management Security Architect*

*Duration:6+ Months ( Long Term)*

*Location:Milwaukee, WI*

*Required Qualifications:*

   - 5+ years of experience designing and implementing security and
   identity solutions to support mission critical andbusiness programs
   - Specific emphasis on development-­centered skills
   - Some experience with technologies and protocols to support identity
   federation and robust access control models
   - (e.g., SAML 2.0, XACML, WS-­Federation, WS-­Trust, OAuth, OpenID)
   - Detailed knowledge of enterprise Web technologies, security and
   cutting-­edge infrastructures
   - Ability to work independently and collaboratively supporting the
   development of client deliverables
   - Specific knowledge of cloud architecture, as well as on-­premise IT
   landscape
   - Specific knowledge and experience in Identity and Access Management
   (IAM) and Security space
   - AD and LDAP experience is preferred
   - 2+ years of application programming experience is strongly preferred
   - Project Management experience is a plus
   - Comfortable with day-­to-­day direct client interaction and
   willingness to be a hands-­on contributor
   - Excellent communication skills, including issue tracking, triaging and
   crisis management
   - Experience in process improvement, decision making, managing
   processes, planning, analysing information and developing standards





-- 

Thanks  Regards!
Vijay,Sr IT Recruiter,
Direct Number: 214-884-6231,Email:vi...@sqlnsystems.com
email%3avi...@rposervices.com,

Skype:vickey.recruiter,
.

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Need Urgent Security Architect In MD

2015-05-26 Thread Matt Jones
*Position : Security Architect*
*Location : **Silver Springs is in MD*
*Duration : 3+Months*

*Required:*

*Application Architecture experience Security Architecture experience*
Technical acumen requisite for a successful architect


*This individual should: *Possess a thorough knowledge of systems and how
their components interconnect
Be able to completely and accurately design and document system architecture
Be able to work with various system owners in providing support for
documentation design and review

* Preferable Technology Experience:*
Linux
Windows
LDAP
TAM
Active Directory
C#
.net
Java
-- 

*Warm Regards*




*Matt Jones*

*Technical Recruiter** |**  Panzer Solutions LLC |*

*Work Ph: 203-652-1444 Ext 119  (**Best Way to reach me through Email**)*
*Email : **matt.jo...@panzersolutions.com* * Web: |  *
*www.panzersolutions.com* http://www.enterprisesolutioninc.com/

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Need Security Architect In MD For 3 Months

2015-05-25 Thread Matt Jones
*Position : Security Architect*
*Location : **Silver Springs is in MD*
*Duration : 3+Months*

*Required:*

*Application Architecture experience Security Architecture experience*
Technical acumen requisite for a successful architect


*This individual should: *Possess a thorough knowledge of systems and how
their components interconnect
Be able to completely and accurately design and document system architecture
Be able to work with various system owners in providing support for
documentation design and review

* Preferable Technology Experience:*
Linux
Windows
LDAP
TAM
Active Directory
C#
.net
Java
-- 

*Warm Regards*




*Matt Jones*

*Technical Recruiter** |**  Panzer Solutions LLC |*

*Work Ph: 203-652-1444 Ext 119  (**Best Way to reach me through Email**)*
*Email : **matt.jo...@panzersolutions.com* * Web: |  *
*www.panzersolutions.com* http://www.enterprisesolutioninc.com/
-- 

*Warm Regards*




*Matt Jones*

*Technical Recruiter** |**  Panzer Solutions LLC |*

*Work Ph: 203-652-1444 Ext 119  (**Best Way to reach me through Email**)*
*Email : **matt.jo...@panzersolutions.com* * Web: |  *
*www.panzersolutions.com* http://www.enterprisesolutioninc.com/* |*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Urgent Need Application Security Architect

2015-05-22 Thread Matt Jones
*Position : Application/Security Architect*
*Location : **Silver Springs is in MD*
*Duration : 3+Months*

*Required:*

*Application Architecture experience Security Architecture experience*
Technical acumen requisite for a successful architect


*This individual should: *Possess a thorough knowledge of systems and how
their components interconnect
Be able to completely and accurately design and document system architecture
Be able to work with various system owners in providing support for
documentation design and review

* Preferable Technology Experience:*
Linux
Windows
LDAP
TAM
Active Directory
C#
.net
Java
-- 

*Warm Regards*




*Matt Jones*

*Technical Recruiter** |**  Panzer Solutions LLC |*

*Work Ph: 203-652-1444 Ext 119  (**Best Way to reach me through Email**)*
*Email : **matt.jo...@panzersolutions.com* * Web: |  *
*www.panzersolutions.com* http://www.enterprisesolutioninc.com/* |*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Need Security Architect

2015-05-22 Thread Matt Jones
*Position : Security Architect*
*Location : **Silver Springs is in MD*
*Duration : 3+Months*

*Required:*

*Application Architecture experience Security Architecture experience*
Technical acumen requisite for a successful architect


*This individual should: *Possess a thorough knowledge of systems and how
their components interconnect
Be able to completely and accurately design and document system architecture
Be able to work with various system owners in providing support for
documentation design and review

* Preferable Technology Experience:*
Linux
Windows
LDAP
TAM
Active Directory
C#
.net
Java
-- 

*Warm Regards*




*Matt Jones*

*Technical Recruiter** |**  Panzer Solutions LLC |*

*Work Ph: 203-652-1444 Ext 119  (**Best Way to reach me through Email**)*
*Email : **matt.jo...@panzersolutions.com* * Web: |  *
*www.panzersolutions.com* http://www.enterprisesolutioninc.com/

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Security Architect - NJ

2015-05-21 Thread Steven Smith
Greetings,
Hope you are doing well!

Please go through the below requirement and let me know if you have any
consultant available, please do send me thier updated resume and the best
number.

Security Architect
Location: Livingston, NJ
Duration: Long Term

Description:
Create, improve and perform threat and vulnerability management processes.
Perform penetration testing/ethical hacking on hardened systems for
assurance.
Assist with enhancing secure configuration management processes.
Perform assessments against infrastructure and application design to ensure
compliance with security standards.
Ensure potential vulnerabilities are assessed and, if applicable, promptly
addressed.
Manage the penetration testing program and remediation of any issues
encountered.
Assist with projects to implement new threat and vulnerability management
technologies.
Provide recommendations for improving configuration standards, based on
personal expertise and outside sources.
Assist the incident response team and serve as a subject matter expert for
sophisticated attack.
Gather security intelligence, define applicability to current environment,
identification of mitigating controls.

Thanks,
Steven Smith

Please send your updated resume to steven.sm...@panzersolutions.com

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Application Security Architect || Silver Springs, MD

2015-03-31 Thread Dev Chauhan
Hello Partners,



We are looking for *Application Security Architect* for one of our client
at *Silver Springs, MD*. Please let me know your interest.



*Application Security Architect*

*Location: Silver Springs, MD*

*Duration: 6+ Months*

*Rate: $60/hr*



*Phone Interview*



*Required Skills:*

· Linux

· Windows

· LDAP

· TAM

· Active Directory

· C#

· .net

· Java





*Thanks  Regards*

*Dev Chauhan*

*International Technical Solutions (ITS)*

D: 206-274-4684

F: 206-319-4579

dev.chau...@i-tecsol.com himanshu.kak...@i-tecsol.com



Note: We respect your Online Privacy. This is not an unsolicited mail.
Under Bills.1618 Title III passed by the 105th U.S. Congress this mail
cannot be considered Spam as long as we include Contact information and a
method to be removed from our mailing list. If you are not interested in
receiving our e-mails then please reply with a REMOVE in the subject line
at supp...@i-tecsol.com and mention all the e-mail addresses to be removed
with any e-mail addresses, which might be diverting the e-mails to you. We
are sorry for the inconvenience.

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Hot Requirement...........................Sr. Data Architect / Data Security Architect

2015-03-27 Thread Rasheed Hamsol
Good Morning Friends

We Request You To Provide The Top Qualified Profiles For This Requirement


*Position : Sr. Data Architect / Data Security Architect*
*Location : San Jose CA*
*Duration : 6+ Months *
*Expirence: 8+ Yrs*


*Job Description Update:*

The ideal candidate should be able to comprehend business requirements, and
must ensure that all the data models and implementations can be traced back
to the business strategy and security key principles.

The Data Architect will design database security alerts that can be
implemented in Imperva .

The Data Architect will provide services for Information Security team and
enterprise security initiatives.

*The Data Architect for Database Security will work with Business partners,
MP Project Developers, Product Managers to understand the Business
Requirements, Database access patterns, Application functionality and
database configuration. The person should be able to create Data Models,
based on the requirements and should be able to integrate data
classification in the Models, ensuring data security. This candidate will
be involved into design and architecture of Database Security policy, Data
Discovery, Data Security Architecture and special database level auditing,
alerts and controls.*

*Must Have Skills:*

*Excellent Design and Data Architectural skills needed for the position.*


*Experience of using Imperva and designing database security alerts.*

*Must have Information Security Architecture experience*


*Good understanding of Hardware, platforms, hosting: servers, network
components and security devices and where they are kept*


* Must be able to create Interfaces between applications – that is: Events,
messages and data flows.*


*Understanding of Local and wide area networks, Internet connectivity*

*Must have an experience in online ecommerce Industry with High Volume of
Traffic flowing in and out.*

*Technical Expert in Database Platforms like Imperva , Oracle, MySQL,
Teradata, Hadoop and other No SQL Databases*




Thanks  Regards,

Rasheed
Hamsol Technologies LLC
Email: rasheedham...@gmail.com

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Urgent Requirement...............Data Security Architect

2015-03-27 Thread Rasheed Hamsol
Good Morning Friends

We Request You To Provide The Top Qualified Profiles For This Requirement


*Position : Data Security Architect*
*Location : San Jose CA*
*Duration : 6+ Months *
*Expirence: 8+ Yrs*

*Technical Qualification:*

*Proficient with databases (SQL, NoSQL databases) and network
communications.*

*Preference will be given to those candidates with Oracle Teradata and
Hadoop experience*

*Experience working with data analytics in Information Security , IT Risk
Management , and IT compliance areas is highly desirable.*

*• SOX, PCI, ISO, general compliance and/or risk-based compliance, yielding
a comprehensive understanding of technology and best practices *

*• A minimum of 3 years of experience in Information Security related tools
and technologiesare desirable. *

*• Experience with tools such as IBM InfoSphere Guardium, Vontu, Oracle
Unified Directory, Power Broker is desirable. *

*• Proficiency with SIEM tools such as Splunk desired not a must *

*• Seen as a security SME.*

*Soft Skills: *

*Strong analytical skills, effective communicator – verbally and in
writing *

*Ability to time manage, plan and prioritize workload *

*Passion to learn new technologies and deliver. *

*Well organized, detail oriented, ability to multi-task *

*Ability to take initiative and work on own or as part of a team *

*Strong relationship building skills and ability to work with multiple
stakeholders at different levels across the organization*




Thanks  Regards,

Rasheed
Hamsol Technologies LLC
Email: rasheedham...@gmail.com

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Kind Attn............................Data Security Architect

2015-03-18 Thread Rasheed Hamsol
Good Morning Friends

We Request You To Provide The Top Qualified Profiles For This Requirement


*Position : Data Security Architect*
*Location : San Jose CA*
*Duration : 6 Months *
*Expirence: 8+ Yrs*

*Technical Qualification:*

Proficient with databases (SQL, NoSQL databases) and network communications.
Preference will be given to those candidates with Oracle Teradata and
Hadoop experience

Experience working with data analytics in Information Security , IT Risk
Management , and IT compliance areas is highly desirable.

SOX, PCI, ISO, general compliance and/or risk-based compliance, yielding a
comprehensive understanding of technology and best practices

A minimum of 3 years of experience in Information Security related tools
and technologiesare desirable.

Experience with tools such as IBM InfoSphere Guardium, Vontu, Oracle
Unified Directory, Power Broker is desirable.

Proficiency with SIEM tools such as Splunk desired not a must
Seen as a security SME.

*Soft Skills: *
Strong analytical skills, effective communicator – verbally and in writing

Ability to time manage, plan and prioritize workload

Passion to learn new technologies and deliver.

Well organized, detail oriented, ability to multi-task

Ability to take initiative and work on own or as part of a team

Strong relationship building skills and ability to work with multiple
stakeholders at different levels across the organization



Thanks  Regards,

Rasheed
Hamsol Technologies LLC
Email: rasheedham...@gmail.com

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Kind Attn...........................Security Architect

2015-02-20 Thread Rasheed Hamsol
Good Afternoon  Dear Friends

We Request You To Provide The Top Qualified Profiles For This Requirement


*Position: Security Architect*
*Location: 15 month ongoing contract (2-3 years)*
*Duration: Erlanger, KY*
*Expirence   : 10+ Yrs*

*Description:*
Establishes technical standards, architects system design, configuration
based on requirements and best practices.
Expert in Risk Assessment and vulnerability / threat management.
As a security architect, the candidate for this position will be
responsible for developing information security requirements, standards,
and best practices for a wide range of internal technology projects.
This position will participate in working meetings to determine risk and
develop appropriate information security controls with other project
managers.

*Requirements:*
• Experience creating information security standards
• Expert in developing and implementing information security requirements.
• Expert in designing and implanting information security systems.
• Expert in information security best practices.
• Microsoft Windows security systems
• Microsoft Active Directory
• Unix security system
• LDAP authentication systems
• Database security
• Network file share security systems
• Experience in security risk assessment
• Writing information security requirements




Thanks  Regards,

Rasheed
Hamsol Technologies LLC
Email: rasheedham...@gmail.com

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Need Sr. Data Architect / Data Security Architect

2015-02-05 Thread mohan singh
*Hi*

*Hope you are doing good  send resumes to **mohan.si...@bhaninfo.com*
mohan.si...@bhaninfo.com



*Need Sr. Data Architect / Data Security Architect*





*1) **Sr. Data Architect / Data Security Architect*

* Location : CA*

* Rate : open*



–  The ideal candidate should be able to comprehend business
requirements, and must ensure that all the data models and implementations
can be traced back to the business strategy and security key principles.

–  The Data Architect will provide services for Information Security
team and enterprise security initiatives.

–  The Data Architect for Database Security will work with Business
partners, MP Project Developers, Product Managers to understand the
Business Requirements, Database access patterns, Application functionality
and database configuration. The person should be able to create Data
Models, based on the requirements and should be able to integrate data
classification in the Models, ensuring data security. This candidate will
be involved into design and architecture of Database Security policy, Data
Discovery, Data Security Architecture and special database level auditing,
alerts and controls.





   *Must Have Skills:*

–  Excellent Design and Data Architectural skills needed for the
position.

–  Must have Information Security Architecture experience

–  Good understanding of Hardware, platforms, hosting: servers, network
components and security devices and where they are kept

–  Must be able to create Interfaces between applications – that is:
Events, messages and data flows.

–  Understanding of Local and wide area networks, Internet connectivity

–  Must have an experience in online ecommerce Industry with High
Volume of Traffic flowing in and out.

–  Technical Expert in Database Platforms like Oracle, MySQL, Teradata,
Hadoop and other No SQL Databases
*Thanks  Regards, *
*Manmohan singh, *
*Technical Recruiter BHANINFO Inc | Enterprise Information Intelligence
Integrator 1572One Blue Hills Plaza Pearl River NY 10965 P: 845-613-0660 ||
E: mohan.si...@bhaninfo.com mohan.si...@bhaninfo.com G-Talk :
mohan.bhaninfo ||YIM : mohan.bhaninfo www.bhaninfo.com
http://www.bhaninfo.com*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Need Sr. Data Architect / Data Security Architect

2015-01-29 Thread mohan singh
*Hi*

*Hope you are doing good  send resumes to **mohan.si...@bhaninfo.com*
mohan.si...@bhaninfo.com

 *Sr. Data Architect / Data Security Architect*

*Location : CA*

*Rate : open*



The ideal candidate should be able to comprehend business requirements, and
must ensure that all the data models and implementations can be traced back
to the business strategy and security key principles.

The Data Architect will provide services for Information Security team and
enterprise security initiatives.

The Data Architect for Database Security will work with Business partners,
MP Project Developers, Product Managers to understand the Business
Requirements, Database access patterns, Application functionality and
database configuration. The person should be able to create Data Models,
based on the requirements and should be able to integrate data
classification in the Models, ensuring data security. This candidate will
be involved into design and architecture of Database Security policy, Data
Discovery, Data Security Architecture and special database level auditing,
alerts and controls.





*Must Have Skills:*

Excellent Design and Data Architectural skills needed for the position.

Must have Information Security Architecture experience

Good understanding of Hardware, platforms, hosting: servers, network
components and security devices and where they are kept

Must be able to create Interfaces between applications – that is: Events,
messages and data flows.

Understanding of Local and wide area networks, Internet connectivity

Must have an experience in online ecommerce Industry with High Volume of
Traffic flowing in and out.

Technical Expert in Database Platforms like Oracle, MySQL, Teradata, Hadoop
and other No SQL Databases
*Thanks  Regards, *
*Manmohan singh, *
*Technical Recruiter BHANINFO Inc | Enterprise Information Intelligence
Integrator 1572One Blue Hills Plaza Pearl River NY 10965 P: 845-613-0660 ||
E: mohan.si...@bhaninfo.com mohan.si...@bhaninfo.com G-Talk :
mohan.bhaninfo ||YIM : mohan.bhaninfo www.bhaninfo.com
http://www.bhaninfo.com*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Need Sr. Data Architect / Data Security Architect

2015-01-28 Thread mohan singh
*Hi*

*Hope you are doing good  send resumes to **mohan.si...@bhaninfo.com*
mohan.si...@bhaninfo.com



*Need Sr. Data Architect / Data Security Architect*



*1) **Sr. Data Architect / Data Security Architect*

* Location : CA*

* Rate : open*



–  The ideal candidate should be able to comprehend business
requirements, and must ensure that all the data models and implementations
can be traced back to the business strategy and security key principles.

–  The Data Architect will provide services for Information Security
team and enterprise security initiatives.

–  The Data Architect for Database Security will work with Business
partners, MP Project Developers, Product Managers to understand the
Business Requirements, Database access patterns, Application functionality
and database configuration. The person should be able to create Data
Models, based on the requirements and should be able to integrate data
classification in the Models, ensuring data security. This candidate will
be involved into design and architecture of Database Security policy, Data
Discovery, Data Security Architecture and special database level auditing,
alerts and controls.





   *Must Have Skills:*

–  Excellent Design and Data Architectural skills needed for the
position.

–  Must have Information Security Architecture experience

–  Good understanding of Hardware, platforms, hosting: servers, network
components and security devices and where they are kept

–  Must be able to create Interfaces between applications – that is:
Events, messages and data flows.

–  Understanding of Local and wide area networks, Internet connectivity

–  Must have an experience in online ecommerce Industry with High
Volume of Traffic flowing in and out.

–  Technical Expert in Database Platforms like Oracle, MySQL, Teradata,
Hadoop and other No SQL Databases
*Thanks  Regards, *
*Manmohan singh, *
*Technical Recruiter BHANINFO Inc | Enterprise Information Intelligence
Integrator 1572One Blue Hills Plaza Pearl River NY 10965 P: 845-613-0660 ||
E: mohan.si...@bhaninfo.com mohan.si...@bhaninfo.com G-Talk :
mohan.bhaninfo ||YIM : mohan.bhaninfo www.bhaninfo.com
http://www.bhaninfo.com*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Need Sr. Data Architect / Data Security Architect

2015-01-27 Thread mohan singh
*Hi*

*Hope you are doing good  send resumes to **mohan.si...@bhaninfo.com*
mohan.si...@bhaninfo.com



Need Sr. Data Architect / Data Security Architect





Sr. Data Architect / Data Security Architect

 Location : CA

 Rate : open



–  The ideal candidate should be able to comprehend business
requirements, and must ensure that all the data models and implementations
can be traced back to the business strategy and security key principles.

–  The Data Architect will provide services for Information Security
team and enterprise security initiatives.

–  The Data Architect for Database Security will work with Business
partners, MP Project Developers, Product Managers to understand the
Business Requirements, Database access patterns, Application functionality
and database configuration. The person should be able to create Data
Models, based on the requirements and should be able to integrate data
classification in the Models, ensuring data security. This candidate will
be involved into design and architecture of Database Security policy, Data
Discovery, Data Security Architecture and special database level auditing,
alerts and controls.





   Must Have Skills:

–  Excellent Design and Data Architectural skills needed for the
position.

–  Must have Information Security Architecture experience

–  Good understanding of Hardware, platforms, hosting: servers, network
components and security devices and where they are kept

–  Must be able to create Interfaces between applications – that is:
Events, messages and data flows.

–  Understanding of Local and wide area networks, Internet connectivity

–  Must have an experience in online ecommerce Industry with High
Volume of Traffic flowing in and out.

–  Technical Expert in Database Platforms like Oracle, MySQL, Teradata,
Hadoop and other No SQL Databases
*Thanks  Regards, *
*Manmohan singh, *
*Technical Recruiter BHANINFO Inc | Enterprise Information Intelligence
Integrator 1572One Blue Hills Plaza Pearl River NY 10965 P: 845-613-0660 ||
E: mohan.si...@bhaninfo.com mohan.si...@bhaninfo.com G-Talk :
mohan.bhaninfo ||YIM : mohan.bhaninfo www.bhaninfo.com
http://www.bhaninfo.com*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Multiple Requirements Need Sr. Data Architect / Data Security Architect,Sr.java developer/IOS/Android Developers

2015-01-26 Thread mohan singh
*Hi*

*Hope you are doing good  send resumes to mohan.si...@bhaninfo.com
mohan.si...@bhaninfo.com*



*Need Sr. Data Architect / Data Security Architect,Sr.java
developer/IOS/Android Developers*





*1) **Sr. Data Architect / Data Security Architect*

* Location : CA*

* Rate : open*



–  The ideal candidate should be able to comprehend business
requirements, and must ensure that all the data models and implementations
can be traced back to the business strategy and security key principles.

–  The Data Architect will provide services for Information Security
team and enterprise security initiatives.

–  The Data Architect for Database Security will work with Business
partners, MP Project Developers, Product Managers to understand the
Business Requirements, Database access patterns, Application functionality
and database configuration. The person should be able to create Data
Models, based on the requirements and should be able to integrate data
classification in the Models, ensuring data security. This candidate will
be involved into design and architecture of Database Security policy, Data
Discovery, Data Security Architecture and special database level auditing,
alerts and controls.





   *Must Have Skills:*

–  Excellent Design and Data Architectural skills needed for the
position.

–  Must have Information Security Architecture experience

–  Good understanding of Hardware, platforms, hosting: servers, network
components and security devices and where they are kept

–  Must be able to create Interfaces between applications – that is:
Events, messages and data flows.

–  Understanding of Local and wide area networks, Internet connectivity

–  Must have an experience in online ecommerce Industry with High
Volume of Traffic flowing in and out.

–  Technical Expert in Database Platforms like Oracle, MySQL, Teradata,
Hadoop and other No SQL Databases











*2) Sr. Java Developer with good PHP, Java ,  HTML, XMP, UI design and
development of web applications*



*  Location: San Jose*

*  Rate : open*





· Back End ( database , Web Server )  and Front End  ( UI )
Application  architecture  and design

· Back End and Front End ( UI ) development  using PHP, Java, SQL (
My SQL, Oracle or MS SQL Server ) , MS Office

· Web Serves management / design and development of web services

· Perform Admin tasks in C3 / Linux  and windows  environment  (
create jobs, monitoring , etc.. )

·  Excellent  communication skills

· Be able to work independently and as a team member ..

· Technical skills:  PHP, SQL, Java, HTML , Linux, etc..







*3) Urgent - iOS  Android Requirements*

*Location : CA*

*Rate : open*



*Android:*



·  4+ years of experience in *Android Development*.

·  Strong *Java* skills.

·  Good experience of *OO concepts  design*.

·  Experience building Android applications that are available on Google
Play would be a plus.

·  Knowledge of *OpenGL ES and building graphics* applications.

·  *JDK, Web Sockets* knowledge required.

·  Nice to have: *JavaScript, Git, C++ coding*.

·  Has to be self-driven to get new projects off the ground.

·  Interest in creating a good application experience and knowledge of what
it entails.



*4) iOS:*



• 4+ years of experience in iOS Development.
• Strong *Objective-C skills*.
• Good experience of *OO concepts  design*.
• Experience building iOS applications that are available on Apple Store
would be a plus.
• Knowledge of *OpenGL ES and building graphics applications.*
• *Web Sockets* knowledge required.
• Nice to have: *JavaScript, Git, C++ coding*.
• Has to be self-driven to get new projects off the ground.
• Interest in creating a good application experience and knowledge of what
it entails.
*Thanks  Regards, *
*Manmohan singh, *
*Technical Recruiter BHANINFO Inc | Enterprise Information Intelligence
Integrator 1572One Blue Hills Plaza Pearl River NY 10965 P: 845-613-0660 ||
E: mohan.si...@bhaninfo.com mohan.si...@bhaninfo.com G-Talk :
mohan.bhaninfo ||YIM : mohan.bhaninfo www.bhaninfo.com
http://www.bhaninfo.com*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Windows Security Architect || Erlanger, KY

2015-01-21 Thread Dev Chauhan
Hello Partners,



We are looking for *Security Architect* for one of our client at *Erlanger,
KY*. Please let me know your interest.



*Windows Security Architect*

*Location: Erlanger, KY*

*Duration: 13+ Months*

*Rate: $65/hr*



*Requirements/Must Have**: *

· Experience creating information security standards

· Expert in developing and implementing information security
requirements.

· Expert in designing and implanting information security systems.

· Expert in information security best practices.



*Skills  Qualification**:*

· Microsoft Windows security systems

· Microsoft Active Directory

· Unix security system

· *LDAP authentication systems *

· Database security

· Network file share security systems

· Experience in security risk assessment

· Writing information security requirements





*Thanks  Regards*

*Dev Chauhan*

*International Technical Solutions (ITS)*

D: 206-274-4684

F: 206-319-4579

dev.chau...@i-tecsol.com himanshu.kak...@i-tecsol.com



Note: We respect your Online Privacy. This is not an unsolicited mail.
Under Bills.1618 Title III passed by the 105th U.S. Congress this mail
cannot be considered Spam as long as we include Contact information and a
method to be removed from our mailing list. If you are not interested in
receiving our e-mails then please reply with a REMOVE in the subject line
at supp...@i-tecsol.com and mention all the e-mail addresses to be removed
with any e-mail addresses, which might be diverting the e-mails to you. We
are sorry for the inconvenience.

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Security Architect Location – Erlanger, KY Duration – 8-12 months

2015-01-08 Thread Vinayak Ram
*Security Architect*

*Location – Erlanger, KY*

*Duration – 8-12 months*

*Send Resumes at vina...@idctechnologies.com vina...@idctechnologies.com*

*Interview process – Phone and Skype ok.  If local, then face to face.*





Role Description : Establishes technical standards, architects system
design, configuration based on requirements and best practices.

Expert in Risk Assessment and vulnerability / threat management.



Desired Experience : 6.00 yrs. General Description : As a security
architect, the candidate for this position will be responsible for
developing information security requirements, standards, and best practices
for a wide range of company technology projects.

This position will participate in working meetings to determine risk and
develop appropriate information security controls with other project
managers.



*Requirements/Must Have : Experience creating information security
standards Expert in developing and implementing information security
requirements. Expert in designing and implanting information security
systems.*

*Expert in information security best practices. Skills  Qualification :
Microsoft Windows security systems Microsoft Active Directory Unix security
system LDAP authentication systems Database security Network file share
security systems Experience in security risk assessment Writing information
security requirements*





Warm Regards,

Vinayak Ram

IDC Technologies Inc

1851 McCarthy Blvd, Milpitas, CA 95035

Work: 408-470-3749

Mailto:  vina...@idctechnologies.com

Website: www.idctechnologies.com

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


Sr. Data Architect / Data Security Architect at San Jose, CA

2015-01-07 Thread Rahman M
*Title: **Sr. Data Architect / Data Security Architect*

*Duration:  **6 months+*

*Location:  **San Jose, CA*

*Rate: Open*


*Top Overall Skills / Experience:*

· *Oracle*

· *Architecture/design*

· *DBA (Teradata and MySQL are nice to have)*

· *Database Security*

*Job Overview:*

Sr. Data Architect / Data Security Architect

– The ideal candidate should be able to comprehend business
requirements, and must ensure that all the data models and implementations
can be traced back to the business strategy and security key principles.

– The Data Architect will provide services for Information Security
team and enterprise security initiatives.

– The Data Architect for Database Security will work with Business
partners, MP Project Developers, Product Managers to understand the
Business Requirements, Database access patterns, Application functionality
and database configuration. The person should be able to create Data
Models, based on the requirements and should be able to integrate data
classification in the Models, ensuring data security. This candidate will
be involved into design and architecture of Database Security policy, Data
Discovery, Data Security Architecture and special database level auditing,
alerts and controls.

*Regards,*

*Rahman,  *

*Sr Resource Recruiter*

*rahm...@usmsystems.com rahm...@usmsystems.com*

*703 246 1849*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


IMMEDIATE START :-Network Security Architect with DBAM(Database Activity Monitoring),ROCKLIN, CA

2014-09-30 Thread vicky menon
*Hello All,*










*Please go through the job description and let me know your interest.Please
revert back with your updated resume with your contact at
vi...@itscient.com vi...@itscient.comPosition:- Network Security
Architect with DBAM(Database Activity Monitoring)Location: ROCKLIN,
CADuration: 6+MonthsJOB DESCRIPTIONRequired Skills  Experience*

   - *8-10 years over all experience in enterprise wide roll-out of DBAM*
   - *Hands on experience in design/implementation of DBAM for small or
   medium enterprise clients*
   - *Experience in implementation of any of the DBAM products such as
   Imperva*
   - *Experience in gathering requirements and creating use cases for DBAM
   services*
   - *Experience in agent deployment, policy configuration, report
   generation, alerts configuration*
   - *Good Client interaction skills*
   - *Excellent communication skills*






*Desired Skills  ExperienceGood knowledge in Data security  MaskingGood
knowledge in Database concepts, schema objects, tablespacesProfessional
certifications (or equivalent) in Enterprise Security*


*Thanks And Regard,*
*Vicky Kumar *
*ll IT-SCIENT - Talent Management Group ll*
*ll Phone: 510 870 5083 ll Fax: 877.701.4872*
*ll Email: vi...@itscient.com vi...@itscient.com ll Web: www.itscient.com
http://www.itscient.com/*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


IMMEDIATE START :-Network Security Architect with DBAM(Database Activity Monitoring),ROCKLIN, CA

2014-09-29 Thread vicky menon
*Hello All,Please go through the job description and let me know your
interest.Please revert back with your updated resume with your contact at
vi...@itscient.com vi...@itscient.comPosition:- Network Security
Architect with DBAM(Database Activity Monitoring)Location: ROCKLIN,
CADuration: 6+MonthsJOB DESCRIPTIONRequired Skills  Experience*

   - *8-10 years over all experience in enterprise wide roll-out of DBAM*
   - *Hands on experience in design/implementation of DBAM for small or
   medium enterprise clients*
   - *Experience in implementation of any of the DBAM products such as
   Imperva*
   - *Experience in gathering requirements and creating use cases for DBAM
   services*
   - *Experience in agent deployment, policy configuration, report
   generation, alerts configuration*
   - *Good Client interaction skills*
   - *Excellent communication skills*






*Desired Skills  ExperienceGood knowledge in Data security  MaskingGood
knowledge in Database concepts, schema objects, tablespacesProfessional
certifications (or equivalent) in Enterprise Security*


*Thanks And Regard,*
*Vicky Kumar *
*ll IT-SCIENT - Talent Management Group ll*
*ll Phone: 510 870 5083 ll Fax: 877.701.4872*
*ll Email: vi...@itscient.com vi...@itscient.com ll Web: www.itscient.com
http://www.itscient.com/*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


REQUIREMENT:::Network Security Architect/Managers/Analyst at Houston, TX

2014-08-26 Thread Md Imtiaz
Hello



Hope you are doing great today!!!



This is Imtiaz from Canopyone.

I have an excellent opportunity from one of our clients.

I would appreciate if you give prompt response on this.

Please do respond back to imt...@canopyone.com



*Position:*Network Security Architect/Managers/Analyst

*Duration:* Long Term

*Location:*Houston, TX





*JOB DESCRIPTION*

· The role should be specifically to implement the SIEM and
depending on the length of the engagement, help us complete the build-out
of the SOC (following the PwC blueprint).

· Expert Level QRadar SIEM implementation experience in an
enterprise environment

· Familiarity with QRadar Models: 3124, 1624, 1724

· Competence with QRadar v7.2

· Strong understanding of QRadar architecture

· Experience creating complex event and flow rules

· Experience on-boarding diverse systems' logs

· Experience in the setup of Threat Intelligence

· Experience managing and logically applying building blocks and
network hierarchy

· Working knowledge of Linux required

· Familiarity with regular expressions would be a bonus

· Understand network architecture and communications

· Knowledge of TCP/IP

· Previous experience building a SOC would be beneficial




*Please Email me a copy of your WORD formatted resume along with details as
mentioned below.*

*Full Name:*



*Current Location, City and State:*



*Mobile and Home Phone No:*



*Email ID:*



*US work authorization:*



*Visa Expiry date (If H1/EAD):*



*Highest Educational degree:*



*Overall years of experience*



*Currently on a project:*



*Willingness to relocate across US:  *



*Last 4 digit of SSN#*

  *Interview Availability:*

  *Available to join from* (*Availability)*:

  *Education:*



*Skype Id:*

  *Expected Hourly Rate(c2c):*





*If this project does not match your exact skills perhaps you know of
someone with the necessary experience and availability; if so, please feel
free to forward this e-mail at your discretion or pass on their references
to me.*





*Thanks  regards,*

*Imtiaz*

*IT Recruiter*

[image: Description: Description: Description: Description:
cid:image001.png@01CC72EB.BA1A2B60]|| *Tel: **703-831-8282  Ext. 221* ||*
fax: **703-439-2550* |*imt...@canopyone.com* |imt...@canopyone.com |
*www.canopyone.com* http://www.canopyone.com/ || *4229 Lafayette Center
Dr , Suite #1625, Chantilly, VA 20151*

*Disclaimer:* If you have received this email in error or prefer not to
receive such emails in the future, please reply with REMOVE in the
subject line. All remove requests will be honored ASAP. We sincerely
apologize for any inconvenience caused.

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


New job - Security Architect - In-Person Interview - Jersey city - New Jersey

2014-08-20 Thread eJobsVille .com
A new Job, ID: 229286 http://www.ejobsville.com/display-job/229286 was
added at eJobsVille.com - For the Best Tech Jobs in Town
http://www.ejobsville.com/

Title:  Security Architect  posted on 2014-08-20 13:56:38

Job Description:The Information Security Architect is responsible for
developing and maintaining the enterprise information security
architecture.  Additionally they will develop and enforce information
security technology standards, roadmaps, and governance. The Security
Architect collaborates within the information technology team and the
throughout the business to develop and maintain technology roadmap
components to optimize security architecture processes. The Security
Architect is expected to demonstrate leadership expertise to execute
strategic direction as well as technical expertise in information security
management, infrastructure architecture, and an extensive knowledge of PCI
DSS requirements and validation methodologies.

*Responsibilities*:
· Determines security requirements by evaluating business
strategies and requirements; researching information security standards;
conducting system security and vulnerability analyses and risk assessments;
studying architecture/platform; identifying integration issues; preparing
cost estimates.
· Plans security systems by evaluating network and security
technologies; developing requirements for local area networks (LANs), wide
area networks (WANs), virtual private networks (VPNs), routers, firewalls,
and related security and network devices; designs public key
infrastructures (PKIs), including use of certification authorities (CAs)
and digital signatures as well as hardware and software; adhering to
industry standards.
· Verification of delivered technical solutions against previously
approved architecture specifications and change requests.
· Actively lead information security architecture  design using
formal risk management methodologies
· Responsible for yearly PCI Audit and Certification
· Collaborate with information technology teams to implement and
maintain information security roadmap components.
· Develop and enforce information security architecture standards
(enterprise computing, Cloud, network, virtualization, etc.) and best
practices as well as enterprise technology platform standards [operating
system, database servers, application servers, application integration
(ESB), virtualization, Cloud, etc.]
· Communicate and evangelize with key stakeholders in the
organization the risks associated with information assets and the
opportunities presented by the security architecture
· Maintain general awareness of developments in the information
security marketplace including vendor strategies and report on their
potential impact on and applicability to the organization
· Assist business and technical analysts with the identification of
threats to information security, appropriate mitigating controls and
assessment of residual risks
· Assist engineers with the application of the security
architecture and the design of secure information systems solutions
· Technologies and understanding of the technologies involved in
the role include Firewall, IDS / IPS, Security Information  Event
Management tools, IT GRC, Proxies, Forensic tools, Encryption (data at rest
and in transit), VPN, web proxies.
· Even though the position is for an Information Security
Architect, there will be opportunities and challenges outside the strict
definition of the role, as needed.
· Excellent oral and written communication skills.
· Strong teamwork abilities, leadership, integrity, and
relationship-building skills.
· Time management skills are a must, as well as the ability to be
flexible and creative.
· Participates in IT Security assessments, risk analysis and
reporting
· Responds to requests for information on IT company policies,
practices, guidelines and standards.
· The ability to conceptualize complex business and technical
requirements into comprehensible models and templates.
· Ability to work well under minimal supervision.
· Coaching / mentoring junior staff

*Qualifications:*
· 7-10 years’ experience in Information Security Architecture 
Design, with a broad exposure to infrastructure/network and multiplatform
environments.
· Strong understanding of Compliance and Regulations (ISO/IEC
27001/27002, COBIT, ITAR, Sarbanes Oxley, PCI-DSS)
· Strong understanding of securing Virtualized, Cloud, Citrix
architectures
· Strong understanding of securing BYOD environments (Mobile Device
Management)
· Knowledge and experience of Network Security and Internet
Security.
· Knowledge and experience of enterprise class security tools and
their capabilities, limitations etc.
· Be able to build strong working relationships.
· Experience

OIM Security Architect || Saline, MI

2014-08-14 Thread Dev Chauhan
Hello Partners,



We are looking for *OIM Security Architect *for one of our client at
*Saline, MI*. Please let me know your interest.



*OIM Security Architect *

*Location: Saline, MI*

*Duration: 13+ Months*



*General Description:* Security Architect responsible for designing and
architecting security solutions. Heavy involvement with the implementation
of Oracle Identity and Access Management including reconciliation, access
management  application integration



*Requirements/Must Have: *

· *Experience with Oracle Identity Management 11gR2 *

· *Oracle Identity Manager *

· *Oracle Access Manager including Federation *

· *Oracle Unified Directory *

· *Oracle HTTP Server *

· *WebLogic Experience integrating applications with SaaS providers
*

· *Java development *

· *Linux experience*



*Thanks  Regards*

*Dev Chauhan*

*International Technical Solutions (ITS)*

D: 206-274-4684

F: 206-319-4579

dev.chau...@i-tecsol.com himanshu.kak...@i-tecsol.com



Note: We respect your Online Privacy. This is not an unsolicited mail.
Under Bills.1618 Title III passed by the 105th U.S. Congress this mail
cannot be considered Spam as long as we include Contact information and a
method to be removed from our mailing list. If you are not interested in
receiving our e-mails then please reply with a REMOVE in the subject line
at supp...@i-tecsol.com and mention all the e-mail addresses to be removed
with any e-mail addresses, which might be diverting the e-mails to you. We
are sorry for the inconvenience.

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


IMMEDIATE NEEDED:-NETWORK SECURITY Architect,St. louis, MO

2014-08-12 Thread vicky menon
*Hello All,*
*Please go through the job description and let me know your interest.*

*Please revert back with updated resume at *

*//vi...@itscient.com vi...@itscient.com *





*Position:-NETWORK SECURITY ArchitectLocation:- St. louis, MODuration:
6+MonthsJob Description:*



   - *GOOD experience in Enterprise Security spanning Firewalls, IPS, VPN,
   and other network security technologies such as Anti-Virus, web proxy,
   content filtering solution, etc*
   - *Hard skills 3 to 4 years experience in enterprise infrastructure
   securityb*
   - *3 -4 years’ experience in managing system integration projects in
   Security field.*
   - *Experience in dealing with infrastructure projects related to
   demergers, datacenter transformations, acquisitions, etc would be preferred*
   - *Experience in technologies like Cisco ASA firewalls, Symantec
   Antivirus, Cisco Web security, Sourcefire FireAMP, Cisco ISE, Cisco ACS,
   etc would be desired*
   - *Strong stakeholder communication skills*




*Thanks and Regards,*
*_*



*Vicky Kumar Menon ll IT-SCIENT - Talent Management Group  Phone: 510
870 5083 510%20870%205083   ll Fax: 877.701.4872 877.701.4872 ll
*Email: vi...@itscient.com vi...@itscient.com **ll Web: www.itscient.com
http://www.itscient.com ll*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


New job - Network Security Architect - Phone-hire - Skype Interview - Raleigh- North Carolina

2014-07-23 Thread eJobsVille .com
A new Job, ID: 211884 http://www.ejobsville.com/display-job/211884 was
added at eJobsVille.com - For the Best Tech Jobs in Town
http://www.ejobsville.com/

Title:  Network Security Architect  posted on 2014-07-23 14:19:18

Job Description:Hi ,

Greetings from EApps Tech LLC…!!!

My name is Srikanth  we have a job opportunity for you as a *Network
Security Architec *one of our client based at  *Jersey city NJ. *

*Job Title:  Network Security Architect **at*
 *Location* *:  **Jersey city NJ.*
*Duration:  6 months*
*Start date: ASAP*

*Job Description :*

Our client need of a Information Security Architect is responsible for
developing and maintaining the enterprise information security
architecture.  Additionally they will develop and enforce information
security technology standards, roadmaps, and governance. The Security
Architect collaborates within the information technology team and the
throughout the business to develop and maintain technology roadmap
components to optimize security architecture processes. The Security
Architect is expected to demonstrate leadership expertise to execute
strategic direction as well as technical expertise in information security
management, infrastructure architecture, and an extensive knowledge of PCI
DSS requirements and validation methodologies.

Qualifications:
· 7-10 years’ experience in Information Security Architecture 
Design, with a broad exposure to infrastructure/network and multiplatform
environments.
· Strong understanding of Compliance and Regulations (ISO/IEC
27001/27002, COBIT, ITAR, Sarbanes Oxley, PCI-DSS)
· Strong understanding of securing Virtualized, Cloud, Citrix
architectures
· Strong understanding of securing BYOD environments (Mobile Device
Management)
· Knowledge and experience of Network Security and Internet
Security.
· Knowledge and experience of enterprise class security tools and
their capabilities, limitations etc.
· Be able to build strong working relationships.
· Experience in designing, developing and implementing security
policies and technical documentation for an onshore/offshore development
model
· Experience of Security Awareness programs.
· Knowledge of Outsourcing business, organization and personalities.
· Knowledge of a security-specific architecture methodology (for
example, SABSA).
· Knowledge and experience of Service Management (ITIL).
· Formal training in a relevant enterprise architecture methodology
(for example, the Zachman Framework or TOGAF).
· Professional security management certification, such as a
Certified Information Systems Security Professional (CISSP), Certified
Information Security Manager (CISM), Certified Information Systems Auditor
(CISA) or other similar credentials.
· Bachelor’s Degree or master’s degree in computer science,
information systems or other related field; or equivalent work experience.

Skills and Competencies

   - Data and Network Encryption, 2-Factor authentication, Encryption Key
   Management, Security Event Management, SSH Key Management, Web Application
   Firewalls, Network Firewalls, Proxy Servers, SPAM Filtering, Digital Rights
   Protection, Anti-Malware software


*Click here to view full job description and apply
http://www.ejobsville.com/display-job/211884  (Registration not mandatory
to apply for this job)*

--
Best regards,
eJobsVille.com - For The Best Tech Jobs In Town

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


New job - Security Architect - Phone-hire - Skype Interview - Jersey City- New Jersey

2014-07-23 Thread eJobsVille .com
A new Job, ID: 211904 http://www.ejobsville.com/display-job/211904 was
added at eJobsVille.com - For the Best Tech Jobs in Town
http://www.ejobsville.com/

Title:  Security Architect  posted on 2014-07-23 15:09:13

Job Description:*Job Title   : Security Architect*
Location   :  Jersey City, NJ
Duration  :  *Long Term*
Interview Type:  Phone and Skype
*Job Description:*
*Security Architect*

The Information Security Architect is responsible for developing and
maintaining the enterprise information security architecture.  Additionally
they will develop and enforce information security technology standards,
roadmaps, and governance. The Security Architect collaborates within the
information technology team and the throughout the business to develop and
maintain technology roadmap components to optimize security architecture
processes. The Security Architect is expected to demonstrate leadership
expertise to execute strategic direction as well as technical expertise in
information security management, infrastructure architecture, and an
extensive knowledge of PCI DSS requirements and validation methodologies.

Responsibilities:
· Determines security requirements by evaluating business
strategies and requirements; researching information security standards;
conducting system security and vulnerability analyses and risk assessments;
studying architecture/platform; identifying integration issues; preparing
cost estimates.
· Plans security systems by evaluating network and security
technologies; developing requirements for local area networks (LANs), wide
area networks (WANs), virtual private networks (VPNs), routers, firewalls,
and related security and network devices; designs public key
infrastructures (PKIs), including use of certification authorities (CAs)
and digital signatures as well as hardware and software; adhering to
industry standards.
· Verification of delivered technical solutions against previously
approved architecture specifications and change requests.
· Actively lead information security architecture  design using
formal risk management methodologies
· Responsible for yearly PCI Audit and Certification
· Collaborate with information technology teams to implement and
maintain information security roadmap components.
· Develop and enforce information security architecture standards
(enterprise computing, Cloud, network, virtualization, etc.) and best
practices as well as enterprise technology platform standards [operating
system, database servers, application servers, application integration
(ESB), virtualization, Cloud, etc.]
· Technologies and understanding of the technologies involved in
the role include Firewall, IDS / IPS, Security Information  Event
Management tools, IT GRC, Proxies, Forensic tools, Encryption (data at rest
and in transit), VPN, web proxies.
· Even though the position is for an Information Security
Architect, there will be opportunities and challenges outside the strict
definition of the role, as needed.
· Excellent oral and written communication skills.
· Strong teamwork abilities, leadership, integrity, and
relationship-building skills.
· Time management skills are a must, as well as the ability to be
flexible and creative.
· Participates in IT Security assessments, risk analysis and
reporting
· Responds to requests for information on IT company policies,
practices, guidelines and standards.
· The ability to conceptualize complex business and technical
requirements into comprehensible models and templates.
· Ability to work well under minimal supervision.
· Coaching / mentoring junior staff

Qualifications:
· 7-10 years’ experience in Information Security Architecture 
Design, with a broad exposure to infrastructure/network and multiplatform
environments.
· Strong understanding of Compliance and Regulations (ISO/IEC
27001/27002, COBIT, ITAR, Sarbanes Oxley, PCI-DSS)
· Strong understanding of securing Virtualized, Cloud, Citrix
architectures
· Strong understanding of securing BYOD environments (Mobile Device
Management)
· Knowledge and experience of Network Security and Internet
Security.
· Knowledge and experience of enterprise class security tools and
their capabilities, limitations etc.
· Experience of Security Awareness programs.
· Knowledge of Outsourcing business, organization and personalities.
· Knowledge of a security-specific architecture methodology (for
example, SABSA).
· Knowledge and experience of Service Management (ITIL).
· Formal training in a relevant enterprise architecture methodology
(for example, the Zachman Framework or TOGAF).
· Professional security management certification, such as a
Certified Information Systems Security Professional (CISSP), Certified
Information Security

New job - Security Architect - Phone-hire - Skype Interview - Jersey City- New Jersey

2014-07-22 Thread eJobsVille .com
A new Job, ID: 211090 http://ejobsville.com/display-job/211090 was added
at eJobsVille.com - For the Best Tech Jobs in Town http://ejobsville.com/

Title:  Security Architect  posted on 2014-07-22 20:15:21

Job Description:*Job Description:*


   - Security Architecture  Design, with a broad exposure to
   infrastructure/network and multiplatform environments.
   - Strong understanding of Compliance and Regulations (ISO/IEC
   27001/27002, COBIT, ITAR, Sarbanes Oxley, PCI-DSS)
   - Strong understanding of securing Virtualized, Cloud, Citrix
   architectures
   - Strong understanding of securing BYOD environments (Mobile Device
   Management)
   - Knowledge and experience of Network Security and Internet Security.
   - Knowledge and experience of enterprise class security tools and their
   capabilities, limitations etc.
   - Be able to build strong working relationships.
   - Experience in designing, developing and implementing security policies
   and technical documentation for an onshore/offshore development model
   - Experience of Security Awareness programs.
   - Knowledge of Outsourcing business, organization and personalities.
   - Knowledge of a security-specific architecture methodology (for
   example, SABSA).
   - Knowledge and experience of Service Management (ITIL).
   - Formal training in a relevant enterprise architecture methodology (for
   example, the Zachman Framework or TOGAF).
   - Professional security management certification, such as a Certified
   Information Systems Security Professional (CISSP), Certified Information
   Security Manager (CISM), Certified Information Systems Auditor (CISA) or
   other similar credentials.
   - Bachelor’s Degree or master’s degree in computer science, information
   systems or other related field; or equivalent work experience.
   - Plans security systems by evaluating network and security
   technologies; developing requirements for local area networks (LANs), wide
   area networks (WANs), virtual private networks (VPNs), routers, firewalls,
   and related security and network devices; designs public key
   infrastructures (PKIs), including use of certification authorities (CAs)
   and digital signatures as well as hardware and software; adhering to
   industry standards.




Job Requirements:
*Job Title: Security Architect *
*Location: Jersey city, NJ*
*Duration: 6Months*

*Job Description:*


   - Security Architecture  Design, with a broad exposure to
   infrastructure/network and multiplatform environments.
   - Strong understanding of Compliance and Regulations (ISO/IEC
   27001/27002, COBIT, ITAR, Sarbanes Oxley, PCI-DSS)
   - Strong understanding of securing Virtualized, Cloud, Citrix
   architectures
   - Strong understanding of securing BYOD environments (Mobile Device
   Management)
   - Knowledge and experience of Network Security and Internet Security.
   - Knowledge and experience of enterprise class security tools and their
   capabilities, limitations etc.
   - Be able to build strong working relationships.
   - Experience in designing, developing and implementing security policies
   and technical documentation for an onshore/offshore development model
   - Experience of Security Awareness programs.
   - Knowledge of Outsourcing business, organization and personalities.
   - Knowledge of a security-specific architecture methodology (for
   example, SABSA).
   - Knowledge and experience of Service Management (ITIL).
   - Formal training in a relevant enterprise architecture methodology (for
   example, the Zachman Framework or TOGAF).
   - Professional security management certification, such as a Certified
   Information Systems Security Professional (CISSP), Certified Information
   Security Manager (CISM), Certified Information Systems Auditor (CISA) or
   other similar credentials.
   - Bachelor’s Degree or master’s degree in computer science, information
   systems or other related field; or equivalent work experience.
   - Plans security systems by evaluating network and security
   technologies; developing requirements for local area networks (LANs), wide
   area networks (WANs), virtual private networks (VPNs), routers, firewalls,
   and related security and network devices; designs public key
   infrastructures (PKIs), including use of certification authorities (CAs)
   and digital signatures as well as hardware and software; adhering to
   industry standards.






*Click here to view full job description and apply
http://ejobsville.com/display-job/211090  (Registration not mandatory to
apply for this job)*

--
Best regards,
eJobsVille.com - For The Best Tech Jobs In Town

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com

Urgent Needed : Security Architect for KY only locals ..

2014-07-17 Thread uday
Hi,
My name is Vijay . I have great opportunity for which I need skilled
candidates . Please read through my SOW below and let me know if you have
any candidates for the open positions. on C2C. Hopefully we can build an
alliance for a great partnership.

Please send resumes to *vijay.addon...@gmail.com vijay.addon...@gmail.com*



Job Role : Security Architect
Location : Erlanger, KY
Duration : 4-6 months

*MUST have Juniper VPN and Bluecoat Proxy experience*

Role : Security Architect
Role Description : Establishes technical standards, architects system
design, configuration based on requirements and best practices. Expert in
Risk Assessment and vulnerability / threat management.
Desired Experience : 5.00 yrs.
General Description : Upgrading existing Juniper VPN and Bluecoat Proxy
server implementations to latest version. Current rule sets need to be
totally re-worked, so they are more easily managed. Architecture
considerations should include future need for expansion of SSL decryption
of web browsing and data feeds to a network DLP.
Requirements/Must Have : 1. Juniper VPN implementation and rule set
creation experien


*Thanks  Regards,*


 *Vijay *

*Contact : 908-388-1241*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


New job - Network Security Architect - Phone-hire - Skype Interview - Houston- Texas

2014-04-24 Thread eJobsVille.com Jobs
A new Job, ID: 156530 http://www.ejobsville.com/display-job/156530 was
added at eJobsVille.com - For the Best Tech Jobs in
Townhttp://www.ejobsville.com

Title:  Network Security Architect  posted on 2014-04-24 08:55:53

Job Description:Hi,
Hope you are doing great! Please find the requirement below , If you find
yourself comfortable with the requirement please reply back with your
updated resume and I will get back to you or I would really appreciate if
you can give me a call back at my contact number  609-897-9670 x 2164

Position: Network Security Architect
Location: Houston, TX
Interview:: Telephonic the skype
Duration: 12+ Months

Experienced Required:-

•  Experience designing, implementing and troubleshooting network
security for enterprise customers (preferably within a datacenter
environment)
•  Extensive experience in security configuration of network and
security devices in a large enterprise environment (routers, switches,
firewalls, intrusion detection/prevention systems)
•  Experience installing, configuring and troubleshooting one (1)
or more of the following Cisco security technologies: ISE, IPS, ASA, CSM,
VPN
•  Detailed understanding of TCP/IP protocols
•  detailed understanding of routing protocols (OSPF, RIP, EIGRP,
BGP) and layer 2 protocols and technologies
•  Experience in project management, ability to clearly communicate
security planning and technology issues verbally on both a formal and
informal basis to all levels of client staff

Recommended Certifications and Educational Background:
•  CCNP, CCSP, CCIE desired but not required.
•  One (1) or more of the following industry certifications: CISSP,
SANS GIAC, NSA IAM

REQUIRED SKILLS:
• Expert-level knowledge in network security design, architecture
and implementation.
•  In-depth knowledge of systems and network security

PREFERRED SKILLS:
•  CCNP or higher, mainly focused on Cisco ASA with NAT 8.2, 9.1,
Firewall rules, L2L VPN, AnyConnect Premium posturing with DAP’s, and Cisco
ISE 1.2 with SGT and SGA familiarization.


 Help! Preserve trees. Please don't print this e-mail unless you really
need to.





Salary: DOE


*Click here to view full job description and apply
http://www.ejobsville.com/display-job/156530  (Registration not mandatory
to apply for this job)*

--
Best regards,
eJobsVille.com - For The Best Tech Jobs In Town

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


New job - Java Security Architect (12+Months,OH) Locals Only.. - In-Person Interview - Columbus- Ohio

2014-04-01 Thread eJobsVille.com Jobs
A new Job, ID: 140302 http://www.ejobsville.com/display-job/140302 was
added at eJobsVille.com - For the Best Tech Jobs in
Townhttp://www.ejobsville.com

Title:  Java Security Architect (12+Months,OH) Locals Only..  posted on
2014-04-01 10:39:35

Job Description:








*Position:Java Security Architect (Locals Only)Location:   Columbus,
OHDuration:   12+ Month Required:-Candidate  will be responsible for
providing Role based access and authentication protocol.The successful
candidate should have solid background in application development, broad
experience over an array of information security and technical disciplines
and be able to provide pragmatic, business-aligned security guidance. Good
Exposure to Entitlements and Authorization processUnderstanding of
cryptography. authentication, authorization, security protocols, and
security vulnerabilities.Experience with security related technologies
including encryption, PKI, SSL certificates, proxy services, DNS.*
Good Knowledge on Active Directory Methodologies
Experience providing and validating security requirements related to
information system design and implementation.
Recognizes problems by identifying abnormalities; reporting violations.
Implements security improvements by assessing current situation; evaluating
trends; anticipating requirements.


Salary: DOE


*Click here to view full job description and apply
http://www.ejobsville.com/display-job/140302  (Registration not mandatory
to apply for this job)*

--
Best regards,
eJobsVille.com - For The Best Tech Jobs In Town

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.


New job - Information Security Architect - Client: American Airlines - Dallas, TX area - Phone-hire - Dallas- Texas

2014-01-09 Thread eJobsVille.com Jobs
A new Job, ID: 92846 http://ejobsville.com/display-job/92846 was
added at eJobsVille.com
- For the Best Tech Jobs in Town http://ejobsville.com

Title:  Information Security Architect - Client: American Airlines -
Dallas, TX area  posted on 2014-01-09 06:49:31

Job Description:

Client: American Airlines


Information Security Architect
long term contract in Dallas, TX area





































*Primary responsibilities: Perform detailed risk evaluation and develop
mitigation plan for various IT projects, including but not limited to
reviewing architecture designs and providing detailed guidance on risk
mitigation. Provide consulting services to IT organization and confirm
adherence to Company's security policy and regulatory requirements such as
PCI, PII, HIPAA, and SOX.Act as a security liaison with Network team, and
play a lead role in developing and maintaining network security strategy
for the organization Serve as the subject matter expert on all matters of
Enterprise Information Security. Research and recommend enhancements to the
enterprise information security services.Review firewall change escalations
and provide technical guidance to security engineering team Understand
security policies and procedures and assist in enforcing them Research and
analyze attempted breaches of data security and rectifying security
weaknesses Assist in creating a catalog of Security standards and commonly
used patterns in the organization  Education/Experience 5-7 years
experience in Information Technology with a focus on Information
Security Bachelor's degree in Computer Science CISSP
Certification Responsibility level Exercises independent judgment with
direction from supervisor  Skills Extensive knowledge in designing network
security controls, such as firewalls, IDS/IPS, SIEM, WEb Application
Firewalls, Internet Proxy, etc.Solid networking background, and experience
with network security tools, such as network firewalls, IDs/IPS, VPN, etc.
Detailed understanding for various protocols, and applications, such as
TCP/IP stackExpert knowledge with various types of access control
mechanisms and network segmentations, such as firewall ACLs, isolated
VLANs, VRFs, VDCs, etc Capable of addressing crowds as a Security
Consultant Proficiency in key aspects of Information Security
(Confidentiality, Integrity, Accessibility, Authenticity,
Non-Repudiation) Proficiency in Information Security controls
(Administrative, Logical, Physical)  General knowledge surrounding
Information Security as applied at multiple layers (Platform, Networking,
Mobility, Application, Web, etc.)Excellent documentation and verbal
skills The ability to handle multiple projects simultaneously  CISSP
certification mustNetwork Security – 3-5 years Security Architecture 
Design – 2-3 yearsSecurity Risk Management – 2-3 yearsIdentity  Access
Management – 1-2 years*
Click here to view full job description and
applyhttp://ejobsville.com/display-job/92846
(Guest users can also apply)

--
Best regards,
eJobsVille.com - For The Best Tech Jobs In Town

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/groups/opt_out.


Need Snr Security Architect in MN

2013-11-01 Thread Shankar
*Hi Partners,*



*Greetings,*



*Hope you are doing Well!!!*



*Please forward a profiles to
**shan...@techconsultinc.com*shan...@techconsultinc.com



*Here are the requirement details***

-- 

 *Data Loss Prevention Security Architect*


3 month Contract

Plymouth

**Must pass a drug test and background check once offered the position**



The Data Loss Prevention (DLP) Architect will focus on evolving the DLP
architectures, developing an approach and strategy for data discovery and
data classification, creating new and evolving security services and
standards pertaining to DLP, consulting with internal and external
customers, and developing and documenting strategies, standards, and
roadmaps for DLP architectures.
Translate business requirements into technical requirements and assist
other team members in designing and implementing the security requirements.
Provide Technical program oversight specific to the relevant Information
Security domain
Identification of concepts and architectural areas of need specific to the
relevant Information Security domain.

*Qualifications:*
8+ years of practical experience in the field of IT is required and 5+
years Information Security experience (inclusive of the IT experience).
Must have solid experience in data security, and general IT Strategy and
Enterprise Architecture
Must have excellent communication both in person and in teleconference
situations with technical and non-technical audience and collaborators.
Individuals in this role must be well versed and experienced in common
Information Security practices and the CISSP domains, as well as possess
Data Protection based Information Technology experience in a large
organization.

They must be able to leverage these experiences and education to identify
opportunities for improvement in the present information security
architecture as well as furnish thought leadership around enacting the
necessary improvements and addressing gaps.

Individuals are expected to have a strong background across all of the
following information security domains, with industry expertise in, at
minimum, one:

Data Protection, Regulatory Compliance such as PCI, HIPAA, SoX etc.

One or more of these security certifications such as CISSP, CISM, SANS
GIAC, etc required









Looking forward to hearing from you at the earliest!!!



*Regards*



*Shankar*

Professional Recruiter

33505 State Street, Suite # 200 Farmington, MI 48335

*V* (248)-522-6879

*F* (248)-579-4454

*Linkedin: **www.linkedin.com/in/shkrajan*http://www.linkedin.com/in/shkrajan

*Email** : **shan...@techconsultinc.com* shan...@techconsultinc.com* *

*Messanger**: shankarraj...@yahoo.com*

*Minority Certified and Woman Owned Enterprise*

*TCI**- Technology Consultants inc*

*Note:** **It is not a solicitation attempt!!!*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/groups/opt_out.


Immediate Need !! Network Security Architect !! Interview ASAP !!

2013-09-23 Thread Chris Roe
Immediate Need !! *Network Security Architect* !! Interview ASAP !!

Job Title:  Network Security Architect
Location:  San Jose, CA / RTP, NC
Duration:  9+months

*Required skills/qualifications include: *

   - The ideal candidate will have technical expertise with large scale
   enterprise Unix and Linux systems service delivery, security concepts,
   strategies, tools, and implementation experience,.
   - Strong experience with one or more popular scripting languages (shell,
   perl, python, etc.), ability to write and document scripts for automation
   and reporting. Some experience with database design and querying in a
   popular database system (Oracle, MySQL, etc.)
   - Strong experience working with NFS storage systems (Netapp/EMC
   preferred), NFS client configuration, CIFS, remote data replication.





Regards,
Chris Roe - Staffing Manager
Direct::415-251-3968
ch...@itbtalent.com |chris.requireme...@gmail.com
Skype I.D :Chris.Roe 75

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/groups/opt_out.


Need Security Architect – Must be USC Or Green Card holder in TX

2013-08-12 Thread Shankar
*Hi Partners,*



*Greetings,*



*Hope you are doing Well!!!*



*Please forward a profiles to
**shan...@techconsultinc.com*shan...@techconsultinc.com



*Here are the requirement details***

-- 

 *BACKFILL: Security Architect – Must be USC Or Green Card holder*

*Location: Houston TX (downtown)*

*Duration: through 10/31/2103 – will extend or go perm thereafter*



*Project/Role:*

Security Architect to design and implement the required Security
Infrastructure for the Web Based Managed Services Environment.

*Skills Required:*

US Citizen or Green Card

Strong English communication skills.

Experience dealing with challenging client personnel.

CISSP certification required.

In-depth knowledge of VPNs (Site-to-Site, SSL, etc.), Web Application
Firewalls, Firewalls, Token Servers, Reverse Proxies, etc. will be required.

Application security experience required

End to end security architecture experience required

F5 experience required



Looking forward to hearing from you at the earliest!!!



*Regards*



*Shankar*

Professional Recruiter

33505 State Street, Suite # 200 Farmington, MI 48335

*V* (248)-522-6879

*F* (248)-579-4454

*Linkedin: **www.linkedin.com/in/shkrajan*http://www.linkedin.com/in/shkrajan

*Email** : **shan...@techconsultinc.com* shan...@techconsultinc.com* *

*Messanger**: shankarraj...@yahoo.com*

*Minority Certified and Woman Owned Enterprise*

*TCI**- Technology Consultants inc*

*Note:** **It is not a solicitation attempt!!!*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/groups/opt_out.


Security Architect – Must be USC Or Green Card holder Location: Houston TX (downtown)

2013-08-12 Thread Rajani Purushotham
Dear Friends,

Please share the resumes for the following requirement.

*BACKFILL: Security Architect – Must be USC Or Green Card holder*

*Location: Houston TX (downtown)*

*Duration: through 10/31/2103 – will extend or go perm thereafter*

*Project/Role:*

Security Architect to design and implement the required Security
Infrastructure for the Web Based Managed Services Environment.

*Skills Required:*

US Citizen or Green Card

Strong English communication skills.

Experience dealing with challenging client personnel.

CISSP certification required.

In-depth knowledge of VPNs (Site-to-Site, SSL, etc.), Web Application
Firewalls, Firewalls, Token Servers, Reverse Proxies, etc. will be required.

Application security experience required

End to end security architecture experience required

F5 experience required

Thanks and Best Regards,

Rajani

*Sun-IT Solutions, Inc.,*

7400 Baymeadows way, Suite # 315, Jacksonville, Fl 32256

T: 904-737-2046 ext:158,f: 904-448-0321

*raj...@sun-itsolutions.com jyoth...@sun-itsolutions.com ,
www.sun-itsolutions.com*



*Note:** We respect your Online Privacy. This is not an unsolicited mail.
Under Bills.1618 Title III passed by the 105th U.S. Congress this mail
cannot be considered Spam as long as we include Contact information and a
method to be removed from our mailing list. If you are not interested in
receiving our e-mails then please reply with a REMOVE in the subject line
at **rem...@sun-itsolutions.com** and mention all the e-mail addresses to
be removed with any e-mail addresses, which might be diverting the e-mails
to you. We are sorry for the inconvenience*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/groups/opt_out.




Required::: Security Architect || Lincolnshire, IL || Contract to Hire...

2013-07-30 Thread Ali Ahmed
Hello Associates,


Hope you are doing great!

*Please reply to **recruite...@exatechinc.com *


This is Ali Ahmed from Exatech Inc.We have an immediate need for below
mention requirement, if you feel that you are a perfect match to this
requirement, please forward your most updated resume along with the best
time and number to carry out further discussions.


Looking forward to hear from you...

*
*

*Role:Security Architect*

*Location:  Lincolnshire, IL*

*Duration:  Contract-to-hire*

*Salary: $/per year*

*Interview: Phone Screen and face to face.*

*GREEN CARDS OR CITIZENS PLEASE!*

*Responsibilities:*

Responsible for  ensuring the confidentiality, integrity, and availability
of computer systems, data, and network resources; working with both
internal and external development teams in an effort to validate that both
new and existing architectures and applications are developed and deployed
in a secure manner. Responsible for creating a secure computing environment
through the implementation of security standards for systems and
applications, as well as security policies and guidelines. Handles the
security of more complex environments, architectures and applications.
Develops, coaches and mentors staff level Security Architects.

· Identifies the need for new security technology solutions;
designs, reviews and collaborates on the deployment of new solutions. -
Contributes to the development and implementation of security

  technology solutions for complicated and more complex environments
and architecture.

· Conducts request for information/request for proposal (RFI/RFP)
and vendor selection and leads the technical design of the deployment.
Technologies might include:  Database security; Enterprise

  encryption - application and whole disk; Authorization and
Authentication systems such as two-factor, federated, single-sign-on,
Active Directory/Light Weight Access Protocol (AD/LDAP); Cloud

  computing / virtualization; Data leakage identification and
prevention; Network/Wireless access controls; Intrusion Detection and
Prevention; Security Incident and Event Management; Web application
firewalls; Host based controls; Application gateway security controls;
Voice over Internet Protocol (VOIP) security controls.

· Acts as a subject matter expert on the implementation and
capabilities of all existing security controls, particularly in the case of
complex and complicated security issues.

· Develops baseline system and application hardening guides based
on industry best practice and provides assistance to IT teams on current
security solutions and configurations.

· Conducts system architecture reviews for new technology to ensure
best practices, document security solutions, and enable re-use of processes.

· Assists in the ongoing documentation, development,
implementation, and maintenance of processes, procedures, and services
associated with architecture functions including ensuring requirements

  and deliverables are clearly defined.

· Works with Security Operations to ensure architectures are
appropriately assessed and able to be supported, contributing to the most
complex solutions.

· Works with Security Operations to implement new technologies and
security solutions in alignment with industry best practice and commonly
accepted principles of secure design.

· Provides emergency support to Security Operations for escalated
issues.

· Provides coaching, mentoring and development to staff level
Security Architects.


Thanks  Regards

*Ali Ahmed*

*Exatech Inc*

*4758 Forest Ridge Dr*

*Mason OH 45040*

*Phone: 513-433-5532*

*Email: recruite...@exatechinc.com   *

*Web: www.exatechinc.com*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/groups/opt_out.




Need Security Architect in IL

2012-09-18 Thread Shankar Raj
*Hi Partners,*
**
*Greetings,*
**
*Hope you are doing Well!!!*
**
*Please forward a profiles to
**shan...@techconsultinc.com*shan...@techconsultinc.com
**
*Here are the requirement details*

-- Security Architect

Location:  Lincolnshire, IL
Length: 6 months

Start: ASAP

Interview: phone – in person



Skills Required:



· Must have 5+ years of in depth knowledge and experience with
network and security technology such as:

o   IPSEC,

o   Routers,

o   Firewalls,

o   IDS/IPS,

o   DLP and WAF.

· Experience with secure design in relation to data sharing with
third parties and vendors. –

· *Experience with compliance aspects such as Privacy, HIPAA and
PCI. *

· CISSP or other applicable certifications.

· Excellent comm. skills
Regards,

Shankar
248-522-6879
Technology consultanst inc

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to sap-abap@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sap-abap?hl=en.



Urgent-: Oracle EBS Security Architect Required - Greenbay, WI

2012-05-11 Thread Achin Nigam

Hello Guys,

Hope you are doing well! we have a urgent req from our client based in 
Greenbay, WI. pls have a look and send me suitable profile ASAP.

Role -: Oracle EBS Security Architect

Location -: Greenbay, WI

Duration -: 1+ year

Tasks/Responsibilities:
·   Security Architect:
o   Review and evaluate current Oracle R11 Custom 
Menus/functions/responsibilities approach and structure and recommend 
model/strategy
o   Review custom responsibility  recommend Oracle R12 migration
§   Seeded versus Custom Mapping
§   Strategy for developing custom responsibilities
§   Implementation of RBAC
o   Assist with development of R11 to R12 migration path based on newly 
developed strategy
o   Knowledge transfer to Customer IS security team
o   Assist with development of project plan
·   Security Administration:
o   Build new Oracle R12 security
·   Timing
o   Targeting 5/21 start date

thanks

-
-- 
Achin 
IDC Technologies, Inc1851 McCarthy Blvd, Milpitas, CA 95035

E-: HYPERLINK mailto:ac...@idctechnologies.comac...@idctechnologies.com
P-: +1-408-852-7192
W-:http://www.idctechnologies.com/
Connect me : G- nigamachin Y- achin_quest

--
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to sap-abap@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sap-abap?hl=en.



Need Network Security Architect -Firewall Rapid 7 Expert 12 mo - MN - Minneapolis

2012-04-10 Thread Shankar Raj
*Hi Partners,*
**
*Greetings,*
**
*Hope you are doing Well!!!*
**
*Please forward a profiles to
**shan...@techconsultinc.com*shan...@techconsultinc.com
**
*Here are the requirement details*

This is more on the analyst role and there could be another one coming yet.
The manager/team are looking for an individual that has strong hands on
engineering experience with Firewalls. Key words to focus on are: Rapid 7 -
penetration testing and vulnerability management, VPN. They need someone
who is well rounded in infrastructure/network projects.

* *

*MN - Minneapolis*

*Database Architect - Expert (1722356) *

*12 mo*



Senior Network Security Architect – Consultant:

Client is seeking an experienced Network Security Architect to design and
implement network security solutions.

Utilities have been named by the Department of Homeland Security as one of
the primary targets for cyber threats. As a critical infrastructure
provider, our job is to protect our systems from deliberate threats to our
power grid. Similarly, we protect our corporate and customer's information
against data loss. Due to the rise in cyber security threats and increased
regulations, we're looking for an individual that has a wide base of
experience in helping to protect the delivery of reliable energy to our
customers.



*Position Summary:*

The position is for a lead security architect to re-design and re-engineer
the enterprise firewall and VPN solutions to protect Xcel Energy’s network,
cyber assets, power grid and customer data.

· Apply expert level business and technical acumen while defining
security solutions that deliver best practices for building and monitoring
controls for information protection and threat management

· Protect the company against risks of data loss and vulnerability
management as well as drive initiatives to ensure compliance with
regulatory requirements from agencies such as FERC, NERC, and Department of
Homeland Security (such as CIP, HIPAA, SOX, PCI).



*Essential Responsibilities*:

• Design and implement enterprise wide security solutions to ensure
deployed solutions minimize security and privacy risks.

• Provide expert level knowledge and expertise on firewalls, VPN, IDP,
information risk management, compliance and other security related
expertise.

• Provide consulting expertise to all stakeholders to ensure plans are
integrated into overall strategic and operational plans.

• Provide architecture guidance for security and direction.

• Evaluate vendor and internal security technologies for security
capabilities and integration into a service delivery environment

• Document and communicate security assessments and product security
reviews.

• Interpret business, compliance, and security requirements, operational
requirements, enterprise/customer requirements, conduct rigorous analysis,
assess security of the code/system, create recommendations, prioritize
solutions, and work with business to mitigate exposure to achieve the
desired risk posture.

• Actively partner with infrastructure, application and other stakeholders
to ensure deployed solutions minimize security and privacy risks.

• Contribute to industry practices, and stay current on trends.

• Provide threat assessment, analysis and risk mitigation for
infrastructure and applications.

• Stay abreast of industry and technology trends and best practices to
advise leadership on when to innovate and when to use traditional
approaches. Also, keep abreast of current and potential threats and risks
for security related information protection and compliance

• Ensure proper alignment of controls related to infrastructure and
information systems and distribution of information to prevent theft,
misuse and compliance with all regulatory requirements.

• Analyze risks and make educated decisions about how to best protect the
company against those risks.

• Understand regulatory requirements and best practice solutions to build
and manage controls to manage security risks

• Communicate effectively with senior management, key leadership, business
peers, IT peers and vendors to solve business/technical problems and
provide technical solutions.




-- 
Regards,

Shankar
248-522-6879
Technology consultanst inc

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to sap-abap@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sap-abap?hl=en.



SAP Security Architect--DIRECT CLIENT

2012-02-16 Thread Ravi Kumar
Hi There,

Please forward Resumes to
sur...@addonusa.comblocked::mailto:sur...@addonusa.com



SAP Security Architect

Location: Maplewood, MN

Duration: 12+ months

Rate; market



*Required Skills:*



· 10+ years of Strong SAP Security experience, capable of handling
a technical team lead position

· Strong hands-on experience in at least three of the following
skillsets: ERP (and/or) HR Security / BI Security / EP Security / GRC

· SAP Security Technical Consulting and Client Interaction Skills
are mandatory

· Experience in at-least two End-to-End SAP Technical
Implementations

· Strong Exposure to SAP Security Architecture, Strategy, Design
and Implementation

· Work with SAP Business Process Owners to identify SAP Security
Requirements and translate them to SAP Authorizations and Roles

· Experience in SOX Compliance  Audit Activities is mandatory

· Experience in SAP NetWeaver Identity Management / 3rd Party
compliance tools will be an added advantage

 SAP GRC Access Control 5.3 and 10.0 [SPM/CUP/RAR/ERM] Module
implementation experience with at-least two end to end project
implementation experience.

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to sap-abap@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sap-abap?hl=en.



BACKFILL JOB:Sr. Security architect, MN, IMMEDIATE INTERVIEW

2011-09-06 Thread Guna beyondtekit
*Reply to:v...@beyondtekit.com*

Hi,

Client is looking for a *Sr. Security architect* for a 12+ months Project in
* MN*. They are looking for GC and citizens only.

Location: Minneapolis, MN**

Duration : 12+ months **

*Following is the job description.*

Target has secure network segments to house Secure Handling Required data
related to GLBA, PCI, SOX, HIPAA and proprietary information. Each of the
firewalls is configured with point to point connections defined between
source and destination systems. This architecture is new to many Target
application teams and requires a great deal of training and facilitation
when performing a new application build behind the firewall or migrating an
existing system behind one of the firewalls. There are secure access rules,
procedures, firewall rules, network diagrams and other documentation that
needs to be created and kept up to date related to this environment.

*Specific functions include:*
 Working with the Technical Architects in the Secure Build Engineering Team
to understand Targets Segmentation Strategy and create process and
procedures for segmentation decisions
 Work across multiple Target Technology Teams including network, database,
application development and server technology to collect data for
segmentation projects and define firewall rules.
 Provide technical assistance to the Segmentation On-Boarding Project
Manager including working technical issue resolution with other TTS teams
 Create required documentation including physical/logical data flow
diagrams, application design documents and security design documents
 Identify segmentation issues, perform problem analysis, identify root
cause and outline resolution options

*Technical Skills:*
 Experience with firewall configuration and networking (eg Checkpoint VSX
Firewalls and Cisco routers and switches)
 Engineering logical and physical network flow diagrams using MS Visio
 Understanding Systems Architecture including interrelationships between
server operating systems, database, network traffic and port management and
impacts of systems and applications upon the enterprise wide technical
environment
 Firewall Rule Analysis experience
 Security experience interfacing with Security.

*Please complete the following skills-matrix and send back with your updated
resume.*



*Full Name:*

*Degree Major:*

*Total experience as a Sr. Security architect:*

*Total experience with Handling Required data related to GLBA, PCI, SOX,
HIPAA and proprietary information:*

*Total experience with secure access rules, procedures:*

*Total experience with firewall rules :*

*Total experience with network diagrams :*

*Total experience with physical/logical data flow diagrams:*

*Total experience with security design documents:*

*Total experience with firewall configuration and networking (eg Checkpoint
VSX Firewalls and Cisco routers and switches) :*

*Total experience with Engineering logical and physical network flow
diagrams using MS Visio:*

*Total experience with Understanding Systems Architecture including
interrelationships between server operating systems:*

*Total experience with database, network traffic and port management:*

*Total experience with Firewall Rule Analysis :*

*Total experience with interfacing with Security : *

*Expected Hourly:*

*Whether is it c2c/W-2? If c2c, specify the corporate name:*

*Day Phone #:*

*Evening Phone #:*

*Cell Phone #:*

*Availability:*

*Current City/State:*

*Work Status (US Citizen / Green Card )*

*Have you applied recently for this requirement earlier through anyone else?
Y/N:*

*Are you ready to relocate on your own expenses (Yes/No)? *



Warm Regards,
*
Vasu *
Tel: 714-857-2002 Ext:815 | Fax: 714-364-9705
*v...@beyondtekit.com** *| *www.BeyondTekIT.com
Alternate E.Mail:vasu.beyondte...@gmail.com
*

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to sap-abap@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sap-abap?hl=en.



Need Security Architect in MN

2011-02-09 Thread Shankar raj
*Hi Partners,*
**
*Greetings,*
**
*Hope you are doing Well!!!*
**
*Please forward a profiles to
**shan...@techconsultinc.com*shan...@techconsultinc.com
**
*Here are the requirement details*
**

Contract Application Security Architect

Eden Prairie, MN



*Additional Information:***

Strong project management and security process and goals knowledge.

Was not strong enough in development facing skills, shown below, with
special emphasis on lack of hands on skills in providing C# developers for
WPF/WCF web services with specific security implementation guidance:

· Has participated in threat modeling sessions with application
teams

· Led application security architecture design sessions

· Driven security design reviews with application and infrastructure
teams

· Participated and led security code reviews to identify coding
vulnerabilities

· Has led initiatives to work with development staff to prevent
OWASP related vulnerabilities

· Knowledge of .Net Security architecture in particularly with C#

· Has proven experience designing secure applications that are
Internet Facing.

· Experience designing secure applications with .Net/C#/WPF,SQL



-- 
Regards,

Shankar
248-522-6879
Technology consultanst inc

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to sap-abap@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sap-abap?hl=en.



**Immediate Hire Of Network Security Architect (CISSP) Based At Detroit, MI**

2011-02-08 Thread Shirley P
*Please send resumes to **shirley @datagrp.com shirley.datagr...@gmail.com
***


**

*Job Title: Network Security Architect (CISSP)*

*Location: Detroit, MI*

*Duration: 6+ Months*

* *

*Need only EAD/GC/US Citizens!!!*



*Details From Manager**: *

1) Application Development Background.

2) Must understand how Application Security plays a part in the application.

3) Must have knowledge of where applications are going, how they are
developed, how they are managed, and how they are maintained.

4) Needs to have a CISSP.

5) Excellent communication skills (both verbal and written).

6) Must know the differences between the different databases.

7) A good understanding of how the Oracle database functions is very helpful
(but not a must).



*Summary**:*

Application Security Architect is responsible for assuring that IT
application software and infrastructure is designed, implemented, and
operated in accordance with applicable security standards and practices.

Primary responsibilities include applications security, risk assessment,
validation of security pen test results, problem resolution, system
documentation, and system security management and support.



*Essential Duties and Responsibilities**:*

Good understanding of the architecture and the various web application tier
and database tier components: underlying objects, schemas/products, database
objects, file system structure, tables, views, packages, procedures,
sequences, indexes, and constraints.

Conduct information security threat analyses on new and changed application
development initiatives towards design, review, and incident response
planning.

Provide in-depth assistance with the integration of information security
within the application development life cycle.

Review security requirements at relevant phases for both technical and
operational perspective.

Reviews remediation activities for completeness.

Identifying security requirements and recommending appropriate solutions to
IT and business problems.

Review application source code for vulnerabilities, using both manual and
automated code scanning techniques aka White box Testing.

Perform vulnerability scanning and penetration testing at all application
tiers using appropriate tools (network scanners, web scanners, database
scanners, etc.) aka Blackbox Testing.

Knowledge of operating systems (Windows, UNIX) and common COTS products used
to deliver web services, including IIS, Apache, Tomcat, Oracle Application
Server, WebSphere, etc.

Identify and convincingly explain the risks associated with common
application vulnerabilities, demonstrate exploitation, and recommend
mitigation options.

Discern, document, and setup standard practices for application security
audits.

Partner with operations, audit, legal, and compliance and administration
teams to support the information security needs of their projects and ensure
that risks are accurately identified and appropriately managed to the
enterprise's accepted level of risk.

Participate in developing standards for information technology security
practices.

Identify and evaluate tools and techniques to be used for capture, modeling
and analysis of information security architecture.

Analyze, review, customize and recommend security architectures for internal
projects and initiatives.

Identifies, implements, and monitors best practices for information security
architecture.

Determine and clearly communicate - quantitatively where possible - the
information security risks to the application development teams.

Assure compliance to security policies, standards, and procedures, including
HIPPA, SOX, and CMS compliance.

Monitor and recommend changes in standards that affect application security,
especially in the area of privacy and identity theft.

Initiate and promote activities to foster information security awareness and
education among application development.

Work with Information security peers and manager to assure standards
compliance on various platforms (e.g., OS’s, databases, networks, etc.) upon
which application development group relies for the operation of its
applications.

Identify threats and risks to the confidentiality, integrity and
availability of all data residing on information systems platforms.



*Education And/Or Experience**:*

Bachelors Degree in Computer Science, Management Information Systems or
related discipline required.

Master's Degree in related field preferred.

A minimum of 5-7 years experience working with core Oracle and SQL
databases, and 5+ years experience in Unix/Linux. **



*Qualifications**:*

To perform this job successfully, an individual must be able to perform each
essential duty satisfactorily.

The requirements listed below are representative of the knowledge, skill,
and/or ability required.

Reasonable accommodations may be made to enable individuals with
disabilities to perform the essential functions.

In-depth understanding of common operating systems

SAP Security Architect-VA

2010-12-20 Thread anand bandarupally
Hi Partner,

Please send resumes to an...@nihaki.com

I need a SAP Security Architect for my  client in Cooktown, VA.

The project is 6-8+ weeks and begins on January 15, 2011.

I deally, I need an SAP technical architect to assess and evaluate client’s
current roles enabled in SAP to design future state architecture for
re-implementation of controls based on findings using SAP or other tools
such as Securinfo.  Must have in-depth knowledge of SAP Controls  and
ability to understand and assess controls within a large and complex SAP
FICO environment.  Knowledge of SAP Financials, SAP Security user profiles
and permissions, and concepts of separation of duties and least privileges
required and ability to translate these concepts into recommended user
profile setups and security setups based on best practices. Good
documentation skills and communication skills also required.

I can pay $Open/hr plus expenses on a C2C.

I am wondering if you, or perhaps a colleague, would be interested. If so,
please send me your updated resume in Word format, and your contact
information.





Please send the updated resume of the consultant along with the rate,
location and contact information. Please make sure the Consultant's skills
match the requirement.  After reviewing the resume I will contact you if I
need more information.

Thanks,

Anand Bandarupally
Nihaki Systems Inc
346 Georges Road, Suite # 1, Dayton, NJ 08810.
Direct: 732-645-1215
Phone:  732-823-6471/6472 Extn: 111
Fax :   732-438-6973
www.nihaki.com
an...@nihaki.com

Note: Under Bill s.1618 Title III passed by the 105th U.S. Congress this
mail cannot be considered Spam as long as we include contact information and
a remove link for removal from our mailing list. Click here to REMOVE from
the mailing list

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to sap-a...@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sap-abap?hl=en.



Immediate need of Oracle DBA/ with Security Architect EXP,(6+M),Jersey city,NJ.

2010-09-17 Thread Bhanu (svit Inc)
Hi, This is BHANU PRASAD from SVIT INC,
Please let me know if you have any good resources having all the skills 
mentioned. Please feel free to call or mail me with updated resume and best 
rate ASAP.

 

Title: Oracle DBA/ with Security Architect EXP.

Location: NJ Jersey City
Duration: (6+months)



JOB DESCRIPTION:

 

Looking for someone experienced with implementing database level security on an 
Oracle 11g database.  

Security Tools to Configure:

Oracle Label Security (OLS)

Oracle Advanced Security Option (ASO)

Oracle Virtual Private Database (VPD)

Oracle Data Masking Pack

Oracle Database Vault 



Thanks  Regards



Bhanu Prasad

SVIT Inc 

(CELEBRATING 8th ANNIVERSARY 2002-2010)

Technical Recruiter  

Voice: 347-863-7983 || Alt: 646-898-6227 || Fax: 516-977-0618

E-mail: bh...@svitinc.com || G-mail: bhanu.svit...@gmail.com || URL:  
www.svitinc.com

 

 Svit Inc is an Equal Opportunity Employer. Qualified 
applicants will receive consideration for employment without regard to race, 
color, religion, sex, national origin, ancestry, citizenship, disability, age, 
military or veteran status, and other characteristics 
 

We help our clients, employees  partners compete and win!

 

***

If wanted to be Removed, Plz reply in the subject line Remove. Sorry for the 
inconvenience caused

 

|| SVIT INC || NEW YORK ||


-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to sap-a...@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sap-abap?hl=en.



Need SharePoint Security Architect:

2010-08-04 Thread Peter
*Hello,***

*Hope everything fine with you; kindly help me in filling this Requirement.*
**

*Please send resume with contact details and rate to *
pe...@turingsystems.com* ***

*Work Location:  **Warren MI,*

*Duration: 6 Months ***

*Need SharePoint Security Architect:*

*Job Description:*

*Must be able to Design a security model around SharePoint 2010 *

*Must have experience identifying the requirements for LDAP directory for
SharePoint 2010*

*Skills : *

*SharePoint 2010 *

*C#*

*In depth LDAP knowledge*

*WEB*

*HTML*

*CSS*

*XSL*

*XSLT*

*JavaScript*

*Experience with Claims based authentification setting up SharePoint User
Groups/ SUN 1 and building security systems in a enterprise environment.***

Peter James

*Turing Systems Inc *

(732) 597-9493

yhmsngr:-peterdngr

NOTE: We respect your online privacy. This is not an unsolicited mail. Under
bill 1618 title III passed by the 105th  us congress this mail cannot be
considered Spam as long as we include contact information and a method to be
removed from our mailing list. If you are not interested in receiving our
e-mails, please reply with a REMOVE in the subject line. We apologize for
any inconvenience caused by this mail.

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to sap-a...@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sap-abap?hl=en.



Need SharePoint Security Architect:

2010-08-04 Thread Peter
*Hello,***

*Hope everything fine with you; kindly help me in filling this Requirement.*
**

*Please send resume with contact details and rate to *
pe...@turingsystems.com* ***

*Work Location:  **Warren MI,*

*Duration: 6 Months ***

*Need SharePoint Security Architect:*

*Job Description:*

*Must be able to Design a security model around SharePoint 2010 *

*Must have experience identifying the requirements for LDAP directory for
SharePoint 2010*

*Skills : *

*SharePoint 2010 *

*C#*

*In depth LDAP knowledge*

*WEB*

*HTML*

*CSS*

*XSL*

*XSLT*

*JavaScript*

*Experience with Claims based authentification setting up SharePoint User
Groups/ SUN 1 and building security systems in a enterprise environment.***

Peter James

*Turing Systems Inc *

(732) 597-9493

yhmsngr:-peterdngr

NOTE: We respect your online privacy. This is not an unsolicited mail. Under
bill 1618 title III passed by the 105th  us congress this mail cannot be
considered Spam as long as we include contact information and a method to be
removed from our mailing list. If you are not interested in receiving our
e-mails, please reply with a REMOVE in the subject line. We apologize for
any inconvenience caused by this mail.

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to sap-a...@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sap-abap?hl=en.



Need SharePoint Security Architect:

2010-08-04 Thread Peter
*Hello,***

*Hope everything fine with you; kindly help me in filling this Requirement.*
**

*Please send resume with contact details and rate to *
pe...@turingsystems.com* ***

*Work Location:  **Warren MI,*

*Duration: 6 Months ***

*Need SharePoint Security Architect:*

*Job Description:*

*Must be able to Design a security model around SharePoint 2010 *

*Must have experience identifying the requirements for LDAP directory for
SharePoint 2010*

*Skills : *

*SharePoint 2010 *

*C#*

*In depth LDAP knowledge*

*WEB*

*HTML*

*CSS*

*XSL*

*XSLT*

*JavaScript*

*Experience with Claims based authentification setting up SharePoint User
Groups/ SUN 1 and building security systems in a enterprise environment.***

Peter James

*Turing Systems Inc *

(732) 597-9493

yhmsngr:-peterdngr

NOTE: We respect your online privacy. This is not an unsolicited mail. Under
bill 1618 title III passed by the 105th  us congress this mail cannot be
considered Spam as long as we include contact information and a method to be
removed from our mailing list. If you are not interested in receiving our
e-mails, please reply with a REMOVE in the subject line. We apologize for
any inconvenience caused by this mail.

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to sap-a...@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sap-abap?hl=en.



Need SharePoint Security Architect

2010-08-04 Thread Peter
*Hello,***

*Hope everything fine with you; kindly help me in filling this Requirement.*
**

*Please send resume with contact details and rate to *
pe...@turingsystems.com* ***

*Work Location:  **Warren MI,*

*Duration: 6 Months ***

*Need SharePoint Security Architect*

*Job Description:*

*Must be able to Design a security model around SharePoint 2010 *

*Must have experience identifying the requirements for LDAP directory for
SharePoint 2010*

*Skills : SharePoint 2010 ,C#, In depth LDAP knowledge, WEB, HTML, CSS,XSL,
XSLT, JavaScript*

*Experience with Claims based authentification setting up SharePoint User
Groups/ SUN 1 and building security systems in a enterprise environment.*

* *

Peter James

*Turing Systems Inc *

(732) 597-9493

yhmsngr:-peterdngr

NOTE: We respect your online privacy. This is not an unsolicited mail. Under
bill 1618 title III passed by the 105th  us congress this mail cannot be
considered Spam as long as we include contact information and a method to be
removed from our mailing list. If you are not interested in receiving our
e-mails, please reply with a REMOVE in the subject line. We apologize for
any inconvenience caused by this mail.

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to sap-a...@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sap-abap?hl=en.



Need SharePoint Security Architect

2010-08-04 Thread Peter
*Hello,***

*Hope everything fine with you; kindly help me in filling this Requirement.*
**

*Please send resume with contact details and rate to *
pe...@turingsystems.com* ***

*Work Location:  **Warren MI,*

*Duration: 6 Months ***

*Need SharePoint Security Architect*

*Job Description:*

*Must be able to Design a security model around SharePoint 2010 *

*Must have experience identifying the requirements for LDAP directory for
SharePoint 2010*

*Skills : SharePoint 2010 ,C#, In depth LDAP knowledge, WEB, HTML, CSS,XSL,
XSLT, JavaScript*

*Experience with Claims based authentification setting up SharePoint User
Groups/ SUN 1 and building security systems in a enterprise environment.*

* *

Peter James

*Turing Systems Inc *

(732) 597-9493

yhmsngr:-peterdngr

NOTE: We respect your online privacy. This is not an unsolicited mail. Under
bill 1618 title III passed by the 105th  us congress this mail cannot be
considered Spam as long as we include contact information and a method to be
removed from our mailing list. If you are not interested in receiving our
e-mails, please reply with a REMOVE in the subject line. We apologize for
any inconvenience caused by this mail.

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to sap-a...@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sap-abap?hl=en.



[Client : HP ] security architect

2010-04-16 Thread mahende...@gmx.com
Location : Boston, MA

Duration : 6 months

Client : HP

*   Understand and define the security architecture discipline,
processes, concepts and best practices 
*   Define and document architecture modeling, practices, governance and
reference patterns as they pertain to Enterprise Security. 
*   Solid understanding of system security, security architecture,
network security with architectural oversight of current state and future
state as it aligns to business strategy documenting this information in an
EA Framework. 
*   Provide technical leadership at the enterprise level for the design
of information technology systems with a core focus on Security 
*   Architect, design and oversee administration of EIM footprints 
*   Experience or knowledge of object/component development, n-tier
applications, cross system integration, securing web services, UDDI, etc and
identify how this will apply to our future state. 
*   Knowledge and understanding of conceptual architectures and how they
will apply to our future state. 
*   In depth understanding of enterprise architecture standards and the
demonstrated
ability to advocate and enforce their use as part of our Architecture Review
Board. 
*   Ability to analyze, diagnose and resolve complex architectural
problems using industry standard engineering principles around EIM and
Identity provisioning. 
*   Ability to see IT patterns and applies industry and internal
patterns in solution delivery. 
*   Knowledge and understanding of the business implications of
introducing (or displacing) solutions. 

Experience and Education:
Key Requirements 

*   Bachelor's Degree in Computer Science, Engineering, or related field
required and 10+ years of experience as an IT Architect. 
*   CISSP certified 
*   Experience with security solutions such as SSO, Identity Management,
Federated Identity Management, Network access control, endpoint enforcement
products, proxy servers, infrastructure and desktop firewalls, IDS/IPS,
encryption solutions, vulnerability assessments tools, identify access
management, etc. 
*   Experience with security-related hardware, software, external
interfaces, commercial security products, and architecture/design practices
for SOA 
*   Experience HIPAA security requirements highly desirable 
*   Knowledge and understanding of IT strategy and planning aligned to
business strategies. 
*   Experience with large and complex security infrastructures as well
as complex application integration environments. 
*   Experience with VPN and encryption related technologies that apply
to requested solutions (AES, DES/DES3, FWZ, ISAKMP, PGP, IPSEC, HTTPS) 
*   Proficient in architecture modeling, practices, governance and
reference patterns. 
*   In depth understanding of enterprise architecture standards and the
demonstrated ability to advocate and enforce their use. 
*   Knowledge and understanding of prevailing methodologies. (OOAD,
RUP). 
*   Broad-based knowledge of the IT industry and trends. 
*   Excellent consulting and influencing skills. 
*   Formal and informal leadership and mentoring skills. 
*   Excellent communication skills - verbal, written, presentation. 
*   Excellent collaboration skills (with other architects, analysts,
managers, business). 
*   Certification or experience with TOGAF, Zachman, FEAF, COBIT, ITIL
or Gartner Framework a plus. 
*   Possess appropriate security certifications (CISSP, CISA, SCNA,
SCNP). 

 

 

Thanks  Regard's

Mahi A.
Accounts Manager,
Manchester, NH, 03104. 
E-mail:  mailto:m...@tek-linx.com m...@tek-linx.com
Direct: (603) 263 0323

Please do not print this email unless it is absolutely necessary. Spread
environmental awareness. 
This e-mail and any attached files may contain confidential and/or
privileged material for the sole use of the intended recipient. Any review,
use, distribution or disclosure by others is strictly prohibited. If you are
not the intended recipient (or authorized to receive this e-mail for the
recipient), you may not review, copy or distribute this message. Please
contact the sender by reply e-mail and delete all copies of this message.

We respect your Online Privacy. 
This is not an unsolicited mail. Under Bills.1618 Title II passed by the
105th U.S. Congress this mail cannot be considered Spam as long as we
include Contact information and a method to be removed from our mailing
list. If you are not interested in receiving our e-mails then please reply
with a remove in the subject line and mention all the e-mail addresses to be
removed with any e-mail addresses which might be diverting the e-mails to
you. We are sorry for the inconvenience.

 

 

-- 
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to sap-a...@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr

Need Network Security Architect in CT-Rate- $55/HR

2009-06-09 Thread Shankar raj
 *Hi Partners,*
**
*Greetings,*
**
*Hope you are doing Well!!!*
**
*Please forward a profiles to
**shan...@techconsultinc.com*shan...@techconsultinc.com
**
*Here are the requirement details*



Start Date:7/6/09

Location: Windsor, CT

Title: Network Security Architect

Description:

Own the long-term architecture of the Information Security Solution from the
Application perspective. Evolve a rolling 3 year technical strategy and
maintain corresponding Roadmaps. Promote Information Security solutions and
building blocks in all I relevant initiatives. Makes independent, creative
technical contributions related to implementing interface and infrastructure
designs from the security perspective, ensuring coherence across
applications and services. Analyzes business models and maps/integrates
security components into a unified infrastructure construct using a risk
management approach. Ensures that Information Security is embedded into the
IT services, applications and applications from the security architecture
perspective, works closely with Project Managers, Architecture, Application
Development, Risk Management, Security Monitoring, and Security Operations
teams.

Infrastructure

Network Communications

Application Design (including SaaS Security) XML Appliances (Schema
Validation, Authentication, etc) Operating Systems (Unix, Windows,
Mainframe) Authentication (Active Directory, LDAP, IWA, SSO, IDM, Kerberos)
Key Management Multifactor Authentication (Consumer, 802.1x, OTP)

Security Monitoring

Support tools (Cristal Reports, Share Point) Security Information and Event
Management (ArcSight, Symantec) Host Intrusion Prevention (Third Brigade,
ISS) Database Security Monitoring (Guardium, Access Control) Security
Operation Center (Balance Scorecard, Dashboard, KRI)

Development Tools

Database Security (Oracle, MSSQL, Sybase, UDB) Data Protection (DLP, Data
Masking, Data Obscuring) SAML 1.1 and 2.0 (Federation and Delegation) WS
Security

C++, JEE, VB, C# (Best practices OWASP, OASIS)

JAX-WS, EJB, AJAX

Integrate Fire-ID  Privilege Usage Control (Fortefi, Power Broker, Cyber

Ark)

Education: Bachelor's Degree in Computer Science, Engineering, or a directly
related field. Master Degree preferred.

Certifications: CISSP (Required), CISSP-ISSAP (Preferred), MSSD (Required),
CEH (Preferred) CISM (Desired), MSSE (Desired),

Location: CT Relocation offered: No

Does the incumbent in this job have direct accountability for staff
supervision/management? No Does the incumbent in this job have budget
accountability? No

Is travel expected to perform this job? Yes If so, what percentage of
time will be spent traveling? 25%

Thanks
Shankar
248-522-6879

--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to SAP-ABAP@googlegroups.com
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/SAP-ABAP
-~--~~~~--~~--~--~---



(Job) Security Architect Strategy - Middletown, CT

2009-03-02 Thread suresh
*Reply to sur...@beyondtekit.com*



Hi,

How are you doing today?

This is my direct client opening for *Security Architect  Strategy -
Middletown, CT. This is a 5 months position*. The Hourly rate is *DOE*.



*Job Description:*

Required skills

ISO27002, DIACAP knowledge is a plus, Threat Modeling with specific
experience around OCTAVEs Threat Profiling and Microsoft’s Threat Modeling
frameworks a plus

Description:  Client is seeking a security consultant with strategic and
technical skills to assist client*s Security Architecture group. The
consultant will become part of the existing team and provide architecture
services focused on the security requirements of client*s business units.

- Security Architect:
- Document all requirements according to Client standards
- Ensure that all security designs and recommendations conform to Clients
security policies, frameworks, and industry best practices.
- Meet individual project security-related deadlines and milestones
according to project dates and timelines.
- Provide the Security Manager a written status and discuss in person on a
weekly basis.
- The consultant*s primary responsibilities will be to assist Client in
determining their current and future requirements concerning:
- Trust Zones * Creating a trust zone strategy and implementation
deliverables. This includes but is not limited to
- knowledge around physical zones, logical zones and tying zones back to
frameworks such as ISO27001/2 and corporate strategy. Knowledge of the
Liberty Alliance*s trust zone guidance.
- Knowledge of Enterprise cryptography key management. Ability to create a
requirements document and vet potential technology vendors. Emphasis on
technology vendors will be core Public Key Infrastructure  (PKI) core
services. Knowledge of digital certificates and asymmetry of these
certificates for application developers and technology partners of the
client.
- Knowledge of secure application development and secure coding techniques
(software assurance) valuable. Knowledge of Mitre and OWASP secure coding
initiatives

Confidential Company

*Please complete the following skills-matrix and send back with your updated
resume.***

*Full Name:*

*Degree Major:*

*Total IT Experience:*

*Total Security Architect exp:*

*Total exp with Threat Modeling around OCTAVEs Threat Profiling and
Microsoft’s Threat Modeling frameworks:*

*Total knowledge / exp with physical zones, logical zones and tying zones
back to frameworks such as ISO27001/2 and corporate strategy: *

*Total knowledge / exp with Liberty Alliance*s trust zone:*

*Total knowledge / exp with Enterprise cryptography key management:*

*Total Knowledge / exp of digital certificates and asymmetry of these
certificates for application developers and technology partners of the
client:*

*Total knowledge / exp with secure application development and secure coding
techniques (software assurance) valuable:*

*Total knowledge / exp with Knowledge of Mitre and OWASP secure coding :*

*Do you have the ability to create a requirements document and vet potential
technology vendors (Y/N)?*

*Total Knowledge / exp with DIACAP:*

*Hourly rate:*

*Whether is it C2C/W2? If C2C, specify the corporate name:*

*Day Phone #:*

*Evening Phone #:*

*Cell Phone #:*

*Availability:*

*Current City/State:*

*Work Status (US Citizen/Green card/others):*

*Have you applied recently for this requirement earlier through any one
else? Y/N*



*Thanks  Regards,*

*Suresh*

*Technical Recruiter*

*Ph: 714-857-2002 x 827*

*Fax: 714-364-9705*

*sures...@beyondtekit.com*** blocked::mailto:nav...@beyondtekit.com

*www.beyondtekit.com*

--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to SAP-ABAP@googlegroups.com
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/SAP-ABAP
-~--~~~~--~~--~--~---



(JOB) - Lead MPLS/Network Security Architect - Austin, TX - long term contract position

2008-10-16 Thread Guna beyondtekit
Reply Back to [EMAIL PROTECTED] [EMAIL PROTECTED]

Hi,

*Greetings!!*

*Hope you are doing well..*

This is my direct client opening for *Lead MPLS/Network Security Architect -
Austin, TX.* This is a *long term contract position*. The Hourly rate is
DOE.

 *Minimum Requirements:*

Skills/Experience

8+ Years: Experience in providing day to day technical team leadership of
complex projects

8+ Years: Hands-on experience in communication networks and support services

8+ Years: Experience in core network routing and security

7+ Years: Experience in BGP routing protocol

6+ Years: Experience with the security requirements typical in an MPLS
Architecture

4+ Years: Hands-on experience with designing MPLS networks and security

4+ Years: IP QOS Experience

4+ Years: Experience in OSPF and DIRGP

3+ Years: MPLS QOS deployment Experience

3+ Years: Cisco 7600 series router experience

3+ Years: Cisco Catalyst 6000 series Switch experience

2+ Years: Experience in the deployment of a large scale service provider
MPLS network and connected VPN's

2+ Years: Experience on Cisco Firewall Service Module (FWSM) and Intrusion
Detection Service Module (IDSM)

2+ Years: Experience on Cisco SONET 15454 Products

1+ Years: Experience on Ciena DWDM products

1+ Years: Experience in Wireless LAN architecture and deployment

* Preferences:*

Skills/Experience

4+ Years: Bachelor's degree in electronics and communication engineering, or
related discipline

1+ Years: Knowledge of and experience with data center architecture

1+ Years: Experience with Inter-AS MPLS design

 *Please complete the following skills-matrix and send back with your
updated resume.*

Full Name:

Degree Major:

Total IT Exp:

Total Lead MPLS/Network Security Architect exp:

Total exp in providing day to day technical team leadership of complex
projects:

Total exp in communication networks and support services:

Total exp in core network routing and security:

Total exp in BGP routing protocol:

Total exp with the security requirements typical in an MPLS Architecture:

Total exp with designing MPLS networks and security:

Total IP QOS Exp:

Total exp in OSPF and DIRGP:

Total MPLS QOS deployment Exp:

Total Cisco 7600 series router exp:

Total Cisco Catalyst 6000 series Switch exp:

Total exp in the deployment of a large scale service provider MPLS network
and connected VPN's:

Total exp on Cisco Firewall Service Module(FWSM) and Intrusion Detection
Service Module(IDSM):

Total exp on Cisco SONET 15454 Products:

Total exp on Ciena DWDM products:

Total exp in Wireless LAN architecture and deployment:

Total exp with data center architecture:

Total exp with Inter-AS MPLS design:

Hourly Rate:

Whether is it C2C/1099/W2?

Day Phone #:

Evening Phone #:

Cell Phone #:

Availability:

Current City/State:

Have you applied recently for this requirement earlier through any one else?
Y/N



** If you qualify for this position, are available immediately and are
interested, please send your resume, rate and contact information to *

*mailto: [EMAIL PROTECTED][EMAIL 
PROTECTED]/Network%20Security%20Architect%20-%20Austin,%20TX
**?subject=Lead MPLS/Network Security Architect - Austin, TX
[EMAIL PROTECTED]/Network%20Security%20Architect%20-%20Austin,%20TX
*

   - *Please ensure you complete and copy/paste the above-completed matrix
   with your response*

* *

*Thanks and Regards*
*KUMAR*
*BeyondTekIT*
*Tel: 714-857-2002 - Ext -823*
*Fax: 714-364-9705*
[EMAIL PROTECTED] [EMAIL PROTECTED]
*www.beyondtekit.com* http://www.beyondtekit.com/

--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to SAP-ABAP@googlegroups.com
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at http://groups.google.com/group/SAP-ABAP
-~--~~~~--~~--~--~---



URG REQ Network Security Architect

2008-09-30 Thread prashant goud
**

Hi,

Please find the requirement and send me updated resume ASAP

Please send resumes to [EMAIL PROTECTED]


 This position is for a Senior Network Architect who has
experience designing Network Security solutions and has led Network Security
Project Teams.



*Location: Foster City, CA*

*Duration: Minimum 6 months*

*Industry: Finance/Credit Cards*
Requirements:
- Expert knowledge of Cisco and Nokia Check Point Firewall products
- Cisco CCIE, CCNA or CCNP Routing and Switching certifications

- Minimum 7 years experience administering enterprise networks in
mission-critical, 7x24 production environments.
- The person will need to understand Security Policy experience and
understanding. Cisco Routing and switching experience.
- Complex firewall and security design or support, troubleshooting with
specific experience in Cisco IOS, PIX, Check Point.



Thanks for sending your qualified candidate's resumes, rates and contact
information.

-- 
Warm Regards,

Prashant G
OSAIR Technologies.
Phone: 408-649-5536
Fax: 732-289-6076
[EMAIL PROTECTED]
www.osairtech.com
We Want to be your Trusted , Preferred  long Term Partner

Note: If you are not interested in receiving our e-mails then please reply
to [EMAIL PROTECTED] with a remove in the subject line and mention
all the e-mail addresses to be removed with any e-mail addresses, which
might be diverting the e-mails to you. Apologies for the inconvenience
caused

--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups SAP 
ABAP group.
To post to this group, send email to SAP-ABAP@googlegroups.com
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at http://groups.google.com/group/SAP-ABAP
-~--~~~~--~~--~--~---