** ** ** ** ** ** **

Greetings,****

** **

I have seen your resume on the web and I would like to contact you regarding
a contract opportunity with one of our clients in *****Chicago****, IL******
*

 ****

VIVA USA INC. (www.viva-it.com), an Equal Opportunity Employer, is an IT
consulting firm headquartered in ****Rolling Meadows**, **IL**** servicing
clients nationwide. We provide services in IT, Telecom, Finance &
Accounting, Clerical/Admin and Engineering categories. ****

* *

*Position Title: Information Security - Master Security Architect*

*Job Location:  Chicago, IL*

*Duration: **4+ Months  *

* *

*RESPONSIBILITIES:*

**Þ     **Execute a process to develop application security architecture for
a workflow component of two large customer facing portals.  The security
architecture must compliant with the existing enterprise technical security
control requirements model.  Produce a gap analysis documentation to
identify any gaps between specific technical security requirements and the
architecture of the system and provide detailed technical recommendations on
appropriate mitigation measures. ****

**Þ     **Advise and consult internal clients responsible for the
architecture, design, implementation, and deployment of technical security
controls on appropriate application of existing security services to solve
their problems or enable new business opportunities. ****

**Þ     **Research and evaluate new security technologies to be used as
point solutions to gaps where the project is unable to take advantage of or
needing greater functionality than reusable enterprise security services.  *
***

** **

*QUALIFICATIONS:*

**Þ     **Expert knowledge in web application standards and their
implementation****

**Þ     **In-depth expertise in analyzing a wide spectrum of technical
systems and services (including but not limited to COTS applications,
databases, and integration technologies, ascertaining their technical
security control (authentication, authorization, access control, audit
cryptography) robustness and needs, and making practical recommendations to
address them.****

**Þ     **Experience in hands-on technical security control architecture and
design, information security solution engineering, security technology
implementation, and security service delivery role, including in-depth
hands-on experience in complex enterprise architectures lock downs.****

**Þ     **Experience with inner workings and security aspects of a variety
of application servers, web servers, media/content servers, messaging
servers, database servers, integration servers, etc.    ****

**Þ     **In depth hands-on experience in as many of the following
technologies as possible:****

**Þ     **Application frameworks and their built-in security services &
API’s: J2EE, Web Sphere, COM+, .NET, or others.****

**Þ     **General application security API’s and protocols: GSS-API, MS
CryptoAPI, PAM, Kerberos, DCE Security Service, SSL/TLS, SAML, S/MIME, PKCS
API’s, or others.****

**Þ     **Built-in security functions and services of application
infrastructure components: Oracle, DB2/UDB, MS IIS, MS BizTalk Server, MS
Integration Server, IBM WebSphere, iPlanet Directory, MS Active Directory,
SAP R/3, Vitria BusinessWare, IBM MQSeries, MSMQ, MS Exchange, BEA WebLogic,
or others.****

**Þ     **Imbedded  Operating Systems security controls including Windows
XP, Windows 2003, AIX, Solaris, Z/OS, AS/400, and others****

**Þ     **Network infrastructure and security functionality:  Switches,
routers, firewalls, IDS/IPS, VPN’s****

**Þ     **Excellent negotiating and influencing skills.****

**Þ     **Good understanding of the information technology and information
security industries, their current developments, trends, issues, and
fundamental concepts****

**Þ     **Stellar written, visual, and verbal communication skills.****

**Þ     **Minimum of 5 years of prior experience in hands-on technical
security control architecture, design, information security solution
engineering, security technology implementation, and security service
delivery role****

**Þ     **Prior experience in a “Big 4” consulting role is highly desirable*
***

**Þ     **Financial services industry (Insurance, Banking, Investments)
experience a plus****

**Þ     **Bachelor’s degree or equivalent required.****

** **

*ADDITIONAL SKILLS:*

**Þ     **Combine knowledge of service-oriented architecture concepts with
experience in security engineering, including security testing and
evaluation, requirements, logical and physical architecture design. ****

**Þ     **Apply oral and written communication skills to interface with
clients and IT staff. Co-lead the development and integration of the
enterprise security services for large-scale system, network, or
infrastructure solutions. ****

**Þ     **Apply expertise in developing conceptual, logical, and technical
security architecture artifacts, knowledge of a variety of hardware and
software security capabilities and features, and an ability to resolve
security and non-security requirement conflicts. ****

**Þ     **Collaborate with team leads, clients, engineers, and developers to
appropriately translate functional needs into technical security
requirements.****

** **

*Main Skill*

*Skill*

*Specification*

** **

Web application standards & their implementation****

 ****

** **

Technical security control architecture and design****

 ****

** **

J2EE, Web Sphere, COM+, .NET****

 ****

** **

GSS-API, MS CryptoAPI, PAM, Kerberos, DCE Security****

 ****

** **

SSL/TLS, SAML, S/MIME, PKCS API’s****

 ****

** **

* *

Please respond to [email protected] along with your resume, hourly rate,
current employment status, availability, contact details and a convenient
time for you to talk to us. ****

 ****

If you qualify for the position, we will be requesting you the following –

*1) Exclusive authorization from you to represent your resume to our Client
2) 2 Professional References*****

 ****

Kindly disregard this mail if the above job description is not suitable for
you or if you are not looking out for new opportunities at this time. Please
feel free to refer anyone you know who may be interested and qualified for
this position. If you refer anyone, we will thank you with a referral bonus
if your referral is hired. ****

** **

** **

*Thanks and Regards,*

* *

*Madhan Mohan B*

*madhanb*@viva-it.com <[email protected]>****

  <http://www.viva-it.com/index.asp>****

*(847) 261-9275 Office*

*(847) 483-1317 Fax*

www.viva-it.com****

*VIVA USA INC.* System Integration and Outsourcing Services****

********3601 Algonquin Road, Suite 425******, ****Rolling Meadows****, ****
IL**** ****60008******
**

** **

Linkedin: 
*http://www.linkedin.com/in/madhan82*<http://www.linkedin.com/in/madhan82>
****

YIM: *chnmaddy*****

** **

2008 Fast 50 Asian American Business in the ****US****
Regional IT Firm of the Year 2007, INC 5000 Company 2007
CRN Fast Growth 100 Company in US for 2006, Chicago IT Firm of the Year 2005
2004, 2003 and 2002 Chicagoland Fast 50 Company
ISO 9001:2000 and CMMI Level 3 Certified, 8 (a) Certified, M/WBE Certified
IBM Partner, Microsoft Certified Partner, Oracle Certified Partner,
Business Objects Partner, Siebel Consulting Partner****

P *Please consider the environment before printing this email*****

 ****

** **

-- 
You received this message because you are subscribed to the Google Groups 
"Oracle Users" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/oracle-users?hl=en.

<<image001.jpg>>

Reply via email to