>
> Hi,
>>
>> Hope doing great…!!!
>>
>> I have an urgent requirement below, please go through it and  share your
>> updated profile ASAP at *a
>> <[email protected]>[email protected]
>> <[email protected]>*
>>
>>
>>
>>
>> The Enterprise Security Architect will work as a member of the
>> Information Security team whose team is focused on improving
>> decision-making through collaboration with management, staff and customers
>> on technology strategy, enterprise architecture, and investments in
>> strategic technology.
>>
>> The individual provides overall direction, life cycle management and
>> leadership for all Information Security architecture and technology. The
>> individual performs the lead role in the identification, analysis,
>> evaluation, life-cycle management and adoption of security technologies.
>> The Security Architect is a key consultant regarding security features of
>> technologies in the corporate environment, working closely with other
>> security functions to ensure that there is coordination with their
>> activities in technology choices.?
>>
>> *Essential Job Function*
>>
>>    1. Provide strategic consultation to business customers in defining
>>    or designing business processes, functions and organizational structures,
>>    as well as in researching, identifying and internally marketing enabling
>>    technologies based on customer capability requirements. Facilitate
>>    development of enterprise business solutions that combine knowledge of
>>    particular business processes and issues, general technological options,
>>    and process facilitation techniques. Participate in enterprise strategy
>>    development, including environmental analysis, opportunity identification,
>>    value cases and business innovation portfolio development.
>>    2. Specifies and designs large or complex systems, solutions,
>>    networks, infrastructure elements, or processes. Selects appropriate 
>> design
>>    standards, methods and tools and ensures that they are applied 
>> effectively.
>>    Reviews others' system design to ensure selection of appropriate
>>    technology, efficient use of resources and integration of multiple systems
>>    and technology. Establishes policy for selection of architecture
>>    components. Evaluates and undertakes impact analysis on major design
>>    options. Ensures that the system architecture balances functional, service
>>    quality and systems management requirements.
>>    3. Uses appropriate tools, including models of components and
>>    interfaces, to contribute to the development of architectures. Produces
>>    detailed component requirements, specifications and translates these into
>>    detailed solutions/designs for implementation using selected products.
>>    Provides advice on technical aspects of system development, integration
>>    (including requests for changes, deviations from specifications, etc.) and
>>    processes. Ensures that relevant technical and business strategies,
>>    policies, standards and practices are applied correctly.
>>    4. Selects and uses tools and methods to establish, clarify, and
>>    communicate the functional and non-functional requirements of system 
>> users,
>>    their characteristics, and tasks. Identifies the technical, 
>> organizational,
>>    and physical environment in which complex products or systems will 
>> operate.
>>    Identifies, proposes, initiates, and leads significant improvement
>>    programs, taking responsibility for the quality and appropriateness of the
>>    work performed and the realization of measurable business benefits.
>>    Modifies existing process improvement approaches and/or develops new
>>    approaches to achieving improvement.
>>    5. Ensures the resolution of a variety of architecture and business
>>    problems and serves as a technical or business lead for highly complex
>>    project initiatives.
>>
>>
>>    - Communicates effectively will all levels of organization
>>    - Manages expectations of customers, partners and management
>>    - Participates in customer walkthroughs and plans; design and
>>    technical walkthroughs; and problem resolution and decision making
>>    - Interacts with departments across the organization as necessary,
>>    including the development and interpretation of highly complex 
>> requirements
>>    for peers and other staff.
>>
>> 6. Maintains an in-depth knowledge of specific technical aspects in area
>> of expertise and provides expert advice regarding their application. The
>> area of specific expertise may be any aspect of information or
>> communication technology, technique, method, process, product, or
>> application area.
>>
>> 7. Provides leadership and mentoring in the areas of expertise and
>> architecture to their peers, developers, management and business users
>> including technical expertise, coaching, and ad-hoc training by:
>>
>>    - Preparing presentations on complex issues on the area of expertise
>>    - Presenting to their peers to ensure consistency to Highmark's
>>    strategic direction.
>>
>> *Required Qualifications*
>>
>>    - Bachelor's Degree
>>    - At least six (6) years of experience architecting solutions with a
>>    concentrated focus on security, performance, scalability, and reliability.
>>    - At least three (3) years of experience with security technologies,
>>    such as intrusion detection/prevention, event correlation, firewall,
>>    antivirus, anti-spam, policy enforcement, patch/configuration management,
>>    audit, secure application development.
>>    - Expertise in data-protection mechanisms including an in
>>    understanding of cryptographic algorithms such as AES, 3DES, RSA, ECC, SHA
>>    etc.
>>
>> *Preferred Qualifications*
>>
>>    - Master's Degree
>>    - Expertise in data-protection software and hardware solutions
>>    including Application, Database, and File level encryption and 
>> tokenization
>>    solutions
>>    - Big Data Security including Hadoop security and emerging
>>    technologies such as im-memory and NoSQL
>>    - Strong experience in Threat Modeling of complex security systems
>>    - Experience in delivering comprehensive architecture specifications
>>    for complex security?.
>>    - Thorough understanding of the security controls provided in common
>>    platforms and applications in the corporate environment including, but not
>>    limited to, Unix, Linux, Windows, IBM Mainframe (zTPF, MVS), Oracle, MS 
>> SQL
>>    Server Microsoft Outlook, J2EE applications.
>>
>> Experience with applicable control frameworks and compliance mandates
>> like PCI, FISMA, HIPAA, and CoBIT is highly preferred
>>
>>
>>
>>
>>
>
>> *Amith*
>>
> *Sr. Recruitment Manager*
>>
>> *Zenith tech Solutions*
>> *Desk: **518-621-004* <518-621-0048>*6*
>> *Fax: **518-244-4977* <518-244-4977>
>> *3 park Hill*
>>
>> *Albany, NY 12204*
>> *zenithtechsolutions.com <[email protected]>*
>>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>

-- 
You received this message because you are subscribed to the Google Groups "Hot 
List" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at https://groups.google.com/group/directclienteq.
For more options, visit https://groups.google.com/d/optout.

Reply via email to