Hi,
Please let em know any consultant available for below position.
*6mo RTH Security Architect Needed * *Princeton, NJ.*
The Enterprise Architecture Office within IT/ETS needs to fill a 6-month
Security Architect position. The candidate with the necessary knowledge,
skills and abilities will need to start as soon as possible.
*Work Summary***
The Security Architect works as a member of the Enterprise Architecture
Office in the Information Technology (IT) division. The individual provides
overall direction, life cycle management and leadership for all Information
Security architecture and technology. The individual performs the lead role
in the identification, analysis, evaluation, life-cycle management and
adoption of security technologies. The Security Architect is a key
consultant regarding security features of technologies in the corporate
environment, working closely with other security functions to ensure that
there is coordination with their activities in technology choices. Being an
informed buyer of technology assets and services from External Service
Providers (ESP) in addition to internal provisioning is a key
responsibility.
*Responsibilities - *The ideal candidate will be responsible for:
* Primary Accountability*
· Manage the life cycle of all security technologies.
· Works closely with the other technology architects to ensure that
security is properly provisioned in their technology domains
· Assist other technology architects in defining the variance
processes and making variance decisions
· Evaluates and assess risk as part of the life-cycle analysis
· Creation and maintenance of enterprise security standards
applicable to all technologies in the ETS portfolio
* Responsibilities*
· Provides leadership to extend the organization’s ability to
optimize use of emerging technologies
· Stays current with security technologies and make recommendations
for use based on business value
· Participates in setting strategic direction.
· Architects, prioritizes, coordinates and communicates the choice
of security technologies necessary to ensure a highly secure yet usable
computing environment.
· Participates in management of customer satisfaction, best
practices and benchmarking
· Assists in the evaluation of overall risk for IT systems and the
data they contain and process, accounting for the people, processes, and
technologies that provide security controls.
· Maintains an expert knowledge in the field of Information Security
and the related issues, systems, processes, products, and services.
· Assists in the audit process.
· Advises leadership on Information Security issues, systems,
processes, products, and services.
· Maintains oversight of the design and implementation of IT systems
to ensure appropriate and effective security controls are included.
· Serving as an Information Security expert, contributes to the
definition of overall IT architecture.
* *
*Experience, Knowledge, Skills, and Abilities*
*Experience:*
· Ten to fifteen years of progressively responsible Information
Technology positions in a midsized to large IT organization
· Experience with security technologies
· Experience with developing proactive security patch level, virus
protection, and similar processes
· Experience with security architecture
· Experience with VPN, SSL and similar network based communications
encryption technologies
· Experience managing technology life cycle
· Experience determining technology needs based on business
objectives
· Experience evaluating and making purchasing decisions of
technology
· Experience analyzing new technology and making technology
recommendations
· Experience managing technology deployment projects and effective
use of project planning tools and techniques
· Experience with technical architecture.
· Experience working with and managing technology suppliers
*Knowledge, Skills, and Abilities***
· Demonstrated competence security technologies
· Demonstrated skills for identifying and responding to IT security
threats
· Demonstrated ability to establish security processes that minimize
business disruption
· Demonstrated ability to assess IT trends of importance to business
direction
· Demonstrated ability to assist applications developers in the
design of secure applications
· Demonstrated ability as a informed buyer of technology services
· Demonstrated ability to proactively manage technology life cycles
· Demonstrated ability to manage according to a budget
· Strong understanding of the applications development
· Demonstrated ability to integrate various security technologies
and controls into a cohesive architecture that sufficiently mitigates risk
to the company.
· Deep technical understanding of and experience with security
technologies including, but not limited to, intrusion detection/prevention,
event correlation, firewall, antivirus, anti spam, policy enforcement,
patch/configuration management, usage monitoring, audit, secure application
development, etc.
· Thorough understanding of the security controls provided in common
platforms and applications in the corporate environment including, but not
limited to, Unix, Linux, Windows, IBM Mainframe (ACF2), Oracle, MS SQL
Server Microsoft Outlook, J2EE and .NET applications, etc.
· Familiarity with hosted and “cloud” services, especially SaaS and
IaaS services, and the related security implications and control approaches
· Ability to communicate clearly end effectively with the technical
and business stakeholders
· Leading and/or participation in teams.
· Convincingly articulates vision and strategy for complex technical
undertakings.
· Ability to use personal influence and communications processes to
align technology to business objectives
· Self motivated without the need for signification management
oversight
· Strong analytical and conceptual skills
· Ability to deal with ambiguity and make expert judgments in
situations for which little to no precedent exists
· Familiarity with the business and its security posture.
· Excellent verbal and written communication skills including the
ability to author and present materials ranging from detailed technical
specifications to high-level presentations.
· Experience with applicable control frameworks and compliance
mandates, including PCI, FISMA, HIPAA, and CoBIT. **
*Education *
A Bachelor's degree in computer science or an equivalent combination of
education and experience from which comparable knowledge and abilities have
been acquired is necessary. Security certification is highly desirable
--
Thanks & Regards
Ramana
Email:[email protected]
Web:http://www.maxilglobal.com http://www.maxiltechnology.com
--
You received this message because you are subscribed to the Google Groups
"Business Objects User Group" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to
[email protected].
For more options, visit this group at
http://groups.google.com/group/businessobjects?hl=en.