** ** ** ** ** ** ** Greetings,****
** ** I have seen your resume on the web and I would like to contact you regarding a contract opportunity with one of our clients in *****Chicago****, IL****** * **** VIVA USA INC. (www.viva-it.com), an Equal Opportunity Employer, is an IT consulting firm headquartered in ****Rolling Meadows**, **IL**** servicing clients nationwide. We provide services in IT, Telecom, Finance & Accounting, Clerical/Admin and Engineering categories. **** ** ** *Position Title: Information Security - Security Specialist* *Job Location: Chicago, IL* *Duration: 3-**4 Months * * * *RESPONSIBILITIES:* **v **Execute a process to develop application security architecture for a workflow component of two large customer facing portals. The security architecture must compliant with the existing enterprise technical security control requirements model. Produce a gap analysis documentation to identify any gaps between specific technical security requirements and the architecture of the system and provide detailed technical recommendations on appropriate mitigation measures. **** **v **Advise and consult internal clients responsible for the architecture, design, implementation, and deployment of technical security controls on appropriate application of existing security services to solve their problems or enable new business opportunities. **** **v **Research and evaluate new security technologies to be used as point solutions to gaps where the project is unable to take advantage of or needing greater functionality than reusable enterprise security services. * *** ** ** *QUALIFICATIONS:* **v **Expert knowledge in web application standards and their implementation**** **v **In-depth expertise in analyzing a wide spectrum of technical systems and services (including but not limited to COTS applications, databases, and integration technologies, ascertaining their technical security control (authentication, authorization, access control, audit cryptography) robustness and needs, and making practical recommendations to address them.**** **v **Experience in hands-on technical security control architecture and design, information security solution engineering, security technology implementation, and security service delivery role, including in-depth hands-on experience in complex enterprise architectures lock downs.**** **v **Experience with inner workings and security aspects of a variety of application servers, web servers, media/content servers, messaging servers, database servers, integration servers, etc. **** **v **In depth hands-on experience in as many of the following technologies as possible:**** **v **Application frameworks and their built-in security services & API’s: J2EE, Web Sphere, COM+, .NET, or others.**** **v **General application security API’s and protocols: GSS-API, MS CryptoAPI, PAM, Kerberos, DCE Security Service, SSL/TLS, SAML, S/MIME, PKCS API’s, or others.**** **v **Built-in security functions and services of application infrastructure components: Oracle, DB2/UDB, MS IIS, MS BizTalk Server, MS Integration Server, IBM WebSphere, iPlanet Directory, MS Active Directory, SAP R/3, Vitria BusinessWare, IBM MQSeries, MSMQ, MS Exchange, BEA WebLogic, or others.**** **v **Imbedded Operating Systems security controls including Windows XP, Windows 2003, AIX, Solaris, Z/OS, AS/400, and others**** **v **Network infrastructure and security functionality: Switches, routers, firewalls, IDS/IPS, VPN’s**** **v **Excellent negotiating and influencing skills.**** **v **Good understanding of the information technology and information security industries, their current developments, trends, issues, and fundamental concepts**** **v **Stellar written, visual, and verbal communication skills.**** **v **Minimum of 5 years of prior experience in hands-on technical security control architecture, design, information security solution engineering, security technology implementation, and security service delivery role**** **v **Prior experience in a “Big 4” consulting role is highly desirable **** **v **Financial services industry (Insurance, Banking, Investments) experience a plus**** **v **Bachelor’s degree or equivalent required.**** ** ** *ADDITIONAL SKILLS:* **v **Combine knowledge of service-oriented architecture concepts with experience in security engineering, including security testing and evaluation, requirements, logical and physical architecture design. **** **v **Apply oral and written communication skills to interface with clients and IT staff. Co-lead the development and integration of the enterprise security services for large-scale system, network, or infrastructure solutions. **** **v **Apply expertise in developing conceptual, logical, and technical security architecture artifacts, knowledge of a variety of hardware and software security capabilities and features, and an ability to resolve security and non-security requirement conflicts. **** **v **Collaborate with team leads, clients, engineers, and developers to appropriately translate functional needs into technical security requirements.**** ** ** *Main Skill* *Skill* *Specification* ** ** General application security API’s **** GSS-API, MS CryptoAPI, PAM**** ** ** Imbedded Operating Systems security controls **** Windows XP, Windows 2003, AIX, Solaris, Z/OS**** ** ** Built-in security functions and services**** Oracle, DB2/UDB, MS IIS, MS BizTalk Server**** ** ** ** ** Please respond to [email protected] along with your resume, hourly rate, current employment status, availability, contact details and a convenient time for you to talk to us. **** **** If you qualify for the position, we will be requesting you the following – *1) Exclusive authorization from you to represent your resume to our Client 2) 2 Professional References***** **** Kindly disregard this mail if the above job description is not suitable for you or if you are not looking out for new opportunities at this time. Please feel free to refer anyone you know who may be interested and qualified for this position. If you refer anyone, we will thank you with a referral bonus if your referral is hired. **** ** ** ** ** ** ** *Thanks and Regards,* * * *Madhan Mohan B* *madhanb*@viva-it.com <[email protected]>**** <http://www.viva-it.com/index.asp>**** *(847) 261-9275 Office* *(847) 483-1317 Fax* www.viva-it.com**** *VIVA USA INC.* System Integration and Outsourcing Services**** ********3601 Algonquin Road, Suite 425******, ****Rolling Meadows****, **** IL**** ****60008****** ** ** ** Linkedin: *http://www.linkedin.com/in/madhan82*<http://www.linkedin.com/in/madhan82> **** YIM: *chnmaddy***** ** ** 2008 Fast 50 Asian American Business in the ****US**** Regional IT Firm of the Year 2007, INC 5000 Company 2007 CRN Fast Growth 100 Company in US for 2006, Chicago IT Firm of the Year 2005 2004, 2003 and 2002 Chicagoland Fast 50 Company ISO 9001:2000 and CMMI Level 3 Certified, 8 (a) Certified, M/WBE Certified IBM Partner, Microsoft Certified Partner, Oracle Certified Partner, Business Objects Partner, Siebel Consulting Partner**** P *Please consider the environment before printing this email***** **** ** ** -- You received this message because you are subscribed to the Google Groups "Oracle Users" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/oracle-users?hl=en.
<<image001.jpg>>
