*Please send profiles to [EMAIL PROTECTED] 248-436-1972*


Dear Partners,

We have a hot requirement on Technology Specialist, Sr (Application Security
Engineer),* *if you have any Suitable consultants for below requirements
Please... Send the resumes/Rate and contact details. I really appreciate for
your time and help.



Job Title: Technology Specialist, Sr (Application Security Engineer)

Location: Detroit, MI


Desired Start Date: 11/17/2008
Estimated End Date: 5/15/2009



*SUMMARY*

Application Security Engineer is responsible for assuring that IT
application software and infrastructure is designed, implemented, and
operated in accordance applicable security standards and practices.  Primary
responsibilities include database & applications security, risk assessment,
problem resolution, system documentation, and system security management and
support.

*ESSENTIAL DUTIES AND RESPONSIBILITIES*

1.                 Good understanding of the architecture and the various
application tier and database tier components: underlying objects,
schemas/products, database objects, file system structure, tables, views,
packages, procedures, sequences, indexes, and constraints

2.                 Conduct information security threat analyses on new and
changed application development initiatives towards design, review, and
incident response planning.

3.                 Provide in-depth assistance with the integration of
information security within the application development life cycle.

4.                 Review projects at relevant phases for both technical and
operational information security vulnerabilities providing specific and
prioritized recommendations for remediation. Reviews remediation activities
for completeness.

5.                 Identifying security requirements and recommending
appropriate solutions to IT and business problems.

6.                 Review application code for vulnerabilities, using both
manual and automated code scanning techniques aka Whitebox Testing.

7.                 Perform vulnerability scanning and penetration testing at
all application tiers using appropriate tools (network scanners, web
scanners, database scanners, etc.) aka Blackbox Testing.

8.                 Knowledge of operating systems (Windows, Unix) and common
COTS products used to deliver web services, including IIS, Apache, Tomcat,
Oracle Application Server, WebSphere, etc.

9.                 Identify and convincingly explain the risks associated
with common application vulnerabilities, demonstrate exploitation, and
recommend mitigation options.

10.             Discern, document, and setup standard practices for
application security audits.

11.             Partner with operations, audit, legal, compliance and
administration teams to support the information security needs of their
projects and ensure that risks are accurately identified and appropriately
managed to the enterprise's accepted level of risk.

12.             Participate in developing standards for information
technology security practices.

13.             Identify and evaluate tools and techniques to be used for
capture, modeling and analysis of information security architecture.

14.             Analyze, review, customize and recommend security
architectures for internal projects and initiatives.

15.             Identifies, implements, and monitors best practices for
information security architecture.

16.             Determine and clearly communicate – quantitatively where
possible – the information security risks to the application development
teams.

17.             Assure compliance to security policies, standards, and
procedures, including HIPPA, SOX, and CMS compliance.

18.             Monitor and recommend changes in standards that affect
application security, especially in the area of privacy and identity theft.

19.             Initiate and promote activities to foster information
security awareness and education among application development.

20.             Work with Information security peers and manager to assure
standards compliance on various platforms (e.g., OSs, databases, networks,
etc.) upon which application development group relies for the operation of
its applications.

21.             Identify threats and risks to the confidentiality, integrity
and availability of all data residing on information systems platforms.



*EDUCATION AND/OR EXPERIENCE*

1.                 Bachelors Degree in Computer Science, Management
Information Systems or related discipline required.  Master's Degree in
related field preferred.

2.                 A minimum of 5-7 years experience working with core
Oracle and SQL databases, 5+ years experience as an Oracle Applications DBA
and/or SQL DBA, and 5+ years experience in Unix/Linux.

*QUALIFICATIONS*

To perform this job successfully, an individual must be able to perform each
essential duty satisfactorily.  The requirements listed below are
representative of the knowledge, skill, and/or ability required.  Reasonable
accommodations may be made to enable individuals with disabilities to
perform the essential functions.

1.                 In-depth understanding of common operating systems
(UNIX/Windows), networking protocols, databases, and Internet applications
development.

2.                 Must have thorough knowledge in IS security components,
principles, standards, procedures and practices.

3.                 Must have a thorough knowledge with web application and
Internet security.  Must have a broad knowledge in information technology
trends.

4.                 Experience as SQL Server Database Administrator as well
as Database Developer

1.     Strong knowledge in application security and limited network and
server security.

1.                 Advanced knowledge of the application development, credit
card data storage and encryption technologies required for transferal of
data in and out of the organization.

2.                 Advanced knowledge and understanding of a range of
computer and networking software related technologies.

3.                 Ability to navigate within the applications with respect
to the security environment, configure, and maintain the application
security roles.

4.                 Ability to analyze and assess application security
requirements and determine optimum, cost-effective solutions.

5.                 Ability to communicate technical information to
non-technical personnel.

6.                 Strong interpersonal and communication skills and the
ability to work effectively with a wide range of constituencies in a diverse
community.

7.                 Knowledge of computer security systems, applications,
procedures and techniques.

8.                 Ability to analyze complex problems and
recommend/negotiate solutions.

9.                 Strong knowledge of computers and related technologies.

10.             Maintains a broad knowledge of current and emerging
application security threats.

11.             Ability to communicate security objectives orally and in
writing to a variety of audiences.

12.             Ability to work independently in a self-directed manner and
collaboratively as a member of security team.

13.             Ability to create and implement detailed action plans for
security solutions.

14.             Ability to understand legal and regulatory requirements and
business drivers and priorities, and integrate these requirements into
overall security design.

15.             Familiarity with project management lifecycle and providing
security consulting to project teams.

16.             Ability to write security requirements and design documents.




*OTHER SKILLS AND ABILITIES*

1.  Excellent analytical, organizational, verbal and written communication
skills.

2.  A high proficiency level in specific job related skills is required.

3.  Other related skills and/or abilities may be required to perform this
job.







*With Regards,***



Naresh V



Technical Recruiter

ReCache, Inc

*ROCHESTER HILLS**, MI 48307** *

*Ph: **248-436-1972*

Fax: 248-565-2054

[EMAIL PROTECTED]

*www.recache.com*

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"ORACLE DWH DBA" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/ORACLE-DWH-DBA?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to