Please reply to [email protected] along with the resume, contact details and
rate confirmation.
*NEED CANDIDATES WHO CAN FURNISH 2 PROFESSIONAL REFERENCES FROM THEIR
PROJECTS*
Location: Chicago,IL
Duration: 3-6 months
Rate: 55 plus
Face to face must
Work with the Security workstream PM to plan all project task that need to
be completed by the IS Risk Management team in support of DCII project.
- Review technology solutions of other DCII workstreams to determine what
IS services need to be delivered to support them (e.g. IS Security
Consulting service, IS Identity Management capability, IS Risk Assessment
service, etc.)
- Where appropriate, participate in the technical solution design efforts
of other DCII workstreams to ensure that security requirements are
addressed.
- Work with DCII workstreams and the IS Security Consulting service
resources to help the workstreams implement appropriate technical security
controls.
- Work with the operations teams of existing technical security services
(e.g. SEM/HIDS) and the project teams of technical security services under
development to plan the expansion of the services to DCII.
- Assist IS RM service owners in expanding existing process-focused IS
services (i.e. IS Incident Response, IS Security Validation, etc.) to
include DCII technology footprint.
*QUALIFICATIONS:*
In-depth expertise in analyzing a wide spectrum of IT solutions,
ascertaining their technical security control (authentication,
authorization, access control, audit cryptography) needs, and making
practical recommendations to address them.
- Experience in hands-on technical security control architecture and
design, information security solution engineering, security technology
implementation, and security service delivery role.
- Experience with inner workings and security aspects of a variety of
application servers, web servers, media/content servers, messaging servers,
database servers, integration servers, etc.
- In depth hands-on experience in as many of the following technologies
as possible:
- Application frameworks and their built-in security services & API’s:
J2EE, Web Sphere, COM+, .NET, or others.
- General application security API’s and protocols: GSS-API, MS
CryptoAPI, PAM, Kerberos, DCE Security Service, SSL/TLS, SAML,
S/MIME, PKCS
API’s, or others.
- Built-in security functions and services of application
infrastructure components: Oracle, DB2/UDB, MS IIS, MS BizTalk Server, MS
Integration Server, IBM WebSphere, iPlanet Directory, MS Active
Directory,
SAP R/3, Vitria BusinessWare, IBM MQSeries, MSMQ, MS Exchange,
BEA WebLogic,
or others.
- Imbedded Operating Systems security controls including Windows XP,
Windows 2003, AIX, Solaris, Z/OS, AS/400, and others
- Excellent negotiating and influencing skills.
- Good understanding of the information technology and information
security industries, their current developments, trends, issues, and
fundamental concepts.
- Stellar written, visual, and verbal communication skills.
- Prior experience in a sales engineering or a “Big 4” consulting role is
highly desirable.
Bachelors degree or equivalent required
______________
With Kind regards
ABHI | Technical Recruiter |
Cigniti Inc ®
[email protected]
1304 W Walnut Hill Lane. Ste 240 Irving TX 75038
Iowa | Texas | Pennsylvania | Hyderabad (India) |
--
You received this message because you are subscribed to the Google Groups
"ORACLE DWH DBA" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to
[email protected].
For more options, visit this group at
http://groups.google.com/group/oracle-dwh-dba?hl=en.