,


Please send resume to [email protected]



1. SAP Security Candidate and 1 Network Security candidate with CISSP and
CISM.



Location: Temple Terrace FL

Best Rate

Duration: 6 months



REQUIREMENTS OF THE POSITION

-Overall 7+ years of experience in production support, data center
operation, network setup, security certificates configuration; firewalls,
load-balancer, Web filters configuration, Security vulnerabilities detection
& remediation, and managing application security review process.
-Solid understanding of the principals of cryptography, operating systems,
software development, and network security technologies.
-Deep understanding of the mechanisms of exploitation, common security
pitfalls, and past examples of exploitation; and the ability to communicate
this understanding to others at all levels of the organization.
-High level understanding of SAP's Security / Authorizations architecture.
-Ability to accurately prioritize the severity of vulnerabilities and
effectively manage mitigation efforts on a tactical level.
-Strong leadership and project management skills;
-Demonstrated skill to Interact with Internal security auditors/teams to
meet all the compliance requests and requirements.
-Strong experience in user authentication mechanisms, different ways of
implementing SSO, and granting authorizations at OS, database and
application levels.
-Must work well effectively in a multi-disciplinary global team environment.

-Excellent written and verbal communication skills; interpersonal and
collaborative skills; and the ability to communicate security and
risk-related concepts to technical and non technical audiences.
-Security certification like CISSP, CISM is desired but not required

JOB DUTIES AND RESPONSIBILITIES

-Demonstrates the knowledge of IT Security practices, and contribute in
application security planning and ensuring that security & audit related
deliverables meet project schedules.
-Provide technical leadership and direction to deliver a consistent and
secure enterprise approach for application security strategies, procedures
and standards.
-Help application and Production support teams to follow the security
guidelines and processes.
-Work with Production security team in change management mechanisms in
production system landscapes and protect system administration tools from
misuse
-Interact with Internal auditors to manage and deliver all the security
compliance requests and requirements.
-Coordinates review of existing application data for compliance with
corporate security and privacy policies; and compiles project status
reports.
-Coordinates Security review project schedules and manages project meetings,
and identifies security problems.
-Analyses and documents existing compliance and compliance gaps and ensures
all project phases are documented appropriately.



* *

*Have a blessed day!***

*Thanks & Regards*

*Annie Mark **|*Aim Computer Consulting | 734-591-3562 EXT: 1+180|Fax
: 734-418-2603

Mail id: [email protected] Yahoo IM: [email protected] Visit our Website at
www.aim-cc.com

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google
Groups "Microsoft DOTNET ASP, C++, SQL SERVER" group.




-------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------
For stunning photoshop tutorials, visit: 
www.psd-help.blogspot.com
-------------------------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------------------------
-~----------~----~----~----~------~----~------~--~---

Reply via email to