Hello,


Please go through the following requirement and let me know your interests
on the same

Please respond with an updated resume to vidya.sa...@inentinc.com or can
call me at desk for further queries…….



Title: IT Security Architect with Fortify Exp

Duration: 12+ Months

Location: Horsham, PA

Interview: Telephonic & F2F



·         6 or more years of experience providing technical leadership and
operational support for complex enterprise security projects/programs for
large enterprise organizations

·         6 or more years of experience in network/applications/database
security architecture, engineering, and technical oversight for large
enterprise systems with PII/PHI/PCI/FISMA related data flows

·         Experience conducting and applying threat modeling to large and
complex and virtualized architectures

·         Knowledge of infrastructure, application, and data security
architecture best practices

·         Fluency with IT governance standards including NIST, COBIT, ISO
27001, OCTAVE, ITIL

·         Experience complying with regulatory guidance at the State and
Federal level to include but not limited to SOX, HIPAA, HITRUST, GLBA,
PCI-DSS, CMS/HHS and/or CFR Part 11

·         Experience executing security architecture processes within agile
methodologies.

·         Specific experience leading security programs from requirements
through implementation.

·         Experience working with large tier security vendors leading
RFI/RFP’s

·         Experience with analyzing, troubleshooting, and investigating
security-related, information systems' anomalies based on security platform
reporting, network traffic, log files, host-based and automated security
alerts.

·         Experience with some or all of the following: TCP/IP | OSI Model,
system logs (WMI, syslog, etc.), antivirus, IDS/IPS, packet analysis,
configuration standards, Group Policy, Vulnerability analysis, Event
Correlation, Forensics, IDS/IPS rule sets and signature creation, web
application security, pen-testing, reverse engineering, Honeypots, IOC,
advanced threat detection, code analysis. Data Loss Prevention (DLP), Log
Indexing and Correlation platform, Network Access Control (NAC), Physical
access control systems

What skills/attributes are nice to have?

·         Industry-specific certifications, including one or more of the
following: C|CISO, CISSP, CISA, CISM, CGEIT or current JCNE/CCIE lab passed
with a valid certification number.

·         Master’s degree in Information Security, Software Engineering



Regards,

Vidya Sagar| Inent Inc (Innovative Enabling Technologies Inc )

Tel: 909-610-3103 Extn.126

Fax No: : 310-388 -0405

E-mail: vidya.sa...@inentinc.com

Hangouts: vdsg...@gmail.com

Yahoo ID: Sagar.virtue

-- 
You received this message because you are subscribed to the Google Groups 
"American Vendor--IT Consulting" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-vendor+unsubscr...@googlegroups.com.
To post to this group, send email to sap-vendor@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-vendor.
For more options, visit https://groups.google.com/d/optout.

Reply via email to