Location : Boston, MA

Duration : 6 months

Client : HP

*       Understand and define the security architecture discipline,
processes, concepts and best practices 
*       Define and document architecture modeling, practices, governance and
reference patterns as they pertain to Enterprise Security. 
*       Solid understanding of system security, security architecture,
network security with architectural oversight of current state and future
state as it aligns to business strategy documenting this information in an
EA Framework. 
*       Provide technical leadership at the enterprise level for the design
of information technology systems with a core focus on Security 
*       Architect, design and oversee administration of EIM footprints 
*       Experience or knowledge of object/component development, n-tier
applications, cross system integration, securing web services, UDDI, etc and
identify how this will apply to our future state. 
*       Knowledge and understanding of conceptual architectures and how they
will apply to our future state. 
*       In depth understanding of enterprise architecture standards and the
demonstrated
ability to advocate and enforce their use as part of our Architecture Review
Board. 
*       Ability to analyze, diagnose and resolve complex architectural
problems using industry standard engineering principles around EIM and
Identity provisioning. 
*       Ability to see IT patterns and applies industry and internal
patterns in solution delivery. 
*       Knowledge and understanding of the business implications of
introducing (or displacing) solutions. 

Experience and Education:
Key Requirements 

*       Bachelor's Degree in Computer Science, Engineering, or related field
required and 10+ years of experience as an IT Architect. 
*       CISSP certified 
*       Experience with security solutions such as SSO, Identity Management,
Federated Identity Management, Network access control, endpoint enforcement
products, proxy servers, infrastructure and desktop firewalls, IDS/IPS,
encryption solutions, vulnerability assessments tools, identify access
management, etc. 
*       Experience with security-related hardware, software, external
interfaces, commercial security products, and architecture/design practices
for SOA 
*       Experience HIPAA security requirements highly desirable 
*       Knowledge and understanding of IT strategy and planning aligned to
business strategies. 
*       Experience with large and complex security infrastructures as well
as complex application integration environments. 
*       Experience with VPN and encryption related technologies that apply
to requested solutions (AES, DES/DES3, FWZ, ISAKMP, PGP, IPSEC, HTTPS) 
*       Proficient in architecture modeling, practices, governance and
reference patterns. 
*       In depth understanding of enterprise architecture standards and the
demonstrated ability to advocate and enforce their use. 
*       Knowledge and understanding of prevailing methodologies. (OOAD,
RUP). 
*       Broad-based knowledge of the IT industry and trends. 
*       Excellent consulting and influencing skills. 
*       Formal and informal leadership and mentoring skills. 
*       Excellent communication skills - verbal, written, presentation. 
*       Excellent collaboration skills (with other architects, analysts,
managers, business). 
*       Certification or experience with TOGAF, Zachman, FEAF, COBIT, ITIL
or Gartner Framework a plus. 
*       Possess appropriate security certifications (CISSP, CISA, SCNA,
SCNP). 

 

 

Thanks & Regard's

Mahi A.
Accounts Manager,
Manchester, NH, 03104. 
E-mail:  <mailto:[email protected]> [email protected]
Direct: (603) 263 0323

Please do not print this email unless it is absolutely necessary. Spread
environmental awareness. 
This e-mail and any attached files may contain confidential and/or
privileged material for the sole use of the intended recipient. Any review,
use, distribution or disclosure by others is strictly prohibited. If you are
not the intended recipient (or authorized to receive this e-mail for the
recipient), you may not review, copy or distribute this message. Please
contact the sender by reply e-mail and delete all copies of this message.

We respect your Online Privacy. 
This is not an unsolicited mail. Under Bills.1618 Title II passed by the
105th U.S. Congress this mail cannot be considered Spam as long as we
include Contact information and a method to be removed from our mailing
list. If you are not interested in receiving our e-mails then please reply
with a remove in the subject line and mention all the e-mail addresses to be
removed with any e-mail addresses which might be diverting the e-mails to
you. We are sorry for the inconvenience.

 

 

-- 
You received this message because you are subscribed to the Google Groups 
"project managment" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/project-managment?hl=en.

Reply via email to