> > Hi, >> >> Hope doing great…!!! >> >> I have an urgent requirement below, please go through it and share your >> updated profile ASAP at *a >> <[email protected]>[email protected] >> <[email protected]>* >> >> >> >> >> The Enterprise Security Architect will work as a member of the >> Information Security team whose team is focused on improving >> decision-making through collaboration with management, staff and customers >> on technology strategy, enterprise architecture, and investments in >> strategic technology. >> >> The individual provides overall direction, life cycle management and >> leadership for all Information Security architecture and technology. The >> individual performs the lead role in the identification, analysis, >> evaluation, life-cycle management and adoption of security technologies. >> The Security Architect is a key consultant regarding security features of >> technologies in the corporate environment, working closely with other >> security functions to ensure that there is coordination with their >> activities in technology choices.? >> >> *Essential Job Function* >> >> 1. Provide strategic consultation to business customers in defining >> or designing business processes, functions and organizational structures, >> as well as in researching, identifying and internally marketing enabling >> technologies based on customer capability requirements. Facilitate >> development of enterprise business solutions that combine knowledge of >> particular business processes and issues, general technological options, >> and process facilitation techniques. Participate in enterprise strategy >> development, including environmental analysis, opportunity identification, >> value cases and business innovation portfolio development. >> 2. Specifies and designs large or complex systems, solutions, >> networks, infrastructure elements, or processes. Selects appropriate >> design >> standards, methods and tools and ensures that they are applied >> effectively. >> Reviews others' system design to ensure selection of appropriate >> technology, efficient use of resources and integration of multiple systems >> and technology. Establishes policy for selection of architecture >> components. Evaluates and undertakes impact analysis on major design >> options. Ensures that the system architecture balances functional, service >> quality and systems management requirements. >> 3. Uses appropriate tools, including models of components and >> interfaces, to contribute to the development of architectures. Produces >> detailed component requirements, specifications and translates these into >> detailed solutions/designs for implementation using selected products. >> Provides advice on technical aspects of system development, integration >> (including requests for changes, deviations from specifications, etc.) and >> processes. Ensures that relevant technical and business strategies, >> policies, standards and practices are applied correctly. >> 4. Selects and uses tools and methods to establish, clarify, and >> communicate the functional and non-functional requirements of system >> users, >> their characteristics, and tasks. Identifies the technical, >> organizational, >> and physical environment in which complex products or systems will >> operate. >> Identifies, proposes, initiates, and leads significant improvement >> programs, taking responsibility for the quality and appropriateness of the >> work performed and the realization of measurable business benefits. >> Modifies existing process improvement approaches and/or develops new >> approaches to achieving improvement. >> 5. Ensures the resolution of a variety of architecture and business >> problems and serves as a technical or business lead for highly complex >> project initiatives. >> >> >> - Communicates effectively will all levels of organization >> - Manages expectations of customers, partners and management >> - Participates in customer walkthroughs and plans; design and >> technical walkthroughs; and problem resolution and decision making >> - Interacts with departments across the organization as necessary, >> including the development and interpretation of highly complex >> requirements >> for peers and other staff. >> >> 6. Maintains an in-depth knowledge of specific technical aspects in area >> of expertise and provides expert advice regarding their application. The >> area of specific expertise may be any aspect of information or >> communication technology, technique, method, process, product, or >> application area. >> >> 7. Provides leadership and mentoring in the areas of expertise and >> architecture to their peers, developers, management and business users >> including technical expertise, coaching, and ad-hoc training by: >> >> - Preparing presentations on complex issues on the area of expertise >> - Presenting to their peers to ensure consistency to Highmark's >> strategic direction. >> >> *Required Qualifications* >> >> - Bachelor's Degree >> - At least six (6) years of experience architecting solutions with a >> concentrated focus on security, performance, scalability, and reliability. >> - At least three (3) years of experience with security technologies, >> such as intrusion detection/prevention, event correlation, firewall, >> antivirus, anti-spam, policy enforcement, patch/configuration management, >> audit, secure application development. >> - Expertise in data-protection mechanisms including an in >> understanding of cryptographic algorithms such as AES, 3DES, RSA, ECC, SHA >> etc. >> >> *Preferred Qualifications* >> >> - Master's Degree >> - Expertise in data-protection software and hardware solutions >> including Application, Database, and File level encryption and >> tokenization >> solutions >> - Big Data Security including Hadoop security and emerging >> technologies such as im-memory and NoSQL >> - Strong experience in Threat Modeling of complex security systems >> - Experience in delivering comprehensive architecture specifications >> for complex security?. >> - Thorough understanding of the security controls provided in common >> platforms and applications in the corporate environment including, but not >> limited to, Unix, Linux, Windows, IBM Mainframe (zTPF, MVS), Oracle, MS >> SQL >> Server Microsoft Outlook, J2EE applications. >> >> Experience with applicable control frameworks and compliance mandates >> like PCI, FISMA, HIPAA, and CoBIT is highly preferred >> >> >> >> >> > >> *Amith* >> > *Sr. Recruitment Manager* >> >> *Zenith tech Solutions* >> *Desk: **518-621-004* <518-621-0048>*6* >> *Fax: **518-244-4977* <518-244-4977> >> *3 park Hill* >> >> *Albany, NY 12204* >> *zenithtechsolutions.com <[email protected]>* >> > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >
-- You received this message because you are subscribed to the Google Groups "Hot List" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at https://groups.google.com/group/directclienteq. For more options, visit https://groups.google.com/d/optout.
