Location : Boston, MA Duration : 6 months
Client : HP * Understand and define the security architecture discipline, processes, concepts and best practices * Define and document architecture modeling, practices, governance and reference patterns as they pertain to Enterprise Security. * Solid understanding of system security, security architecture, network security with architectural oversight of current state and future state as it aligns to business strategy documenting this information in an EA Framework. * Provide technical leadership at the enterprise level for the design of information technology systems with a core focus on Security * Architect, design and oversee administration of EIM footprints * Experience or knowledge of object/component development, n-tier applications, cross system integration, securing web services, UDDI, etc and identify how this will apply to our future state. * Knowledge and understanding of conceptual architectures and how they will apply to our future state. * In depth understanding of enterprise architecture standards and the demonstrated ability to advocate and enforce their use as part of our Architecture Review Board. * Ability to analyze, diagnose and resolve complex architectural problems using industry standard engineering principles around EIM and Identity provisioning. * Ability to see IT patterns and applies industry and internal patterns in solution delivery. * Knowledge and understanding of the business implications of introducing (or displacing) solutions. Experience and Education: Key Requirements * Bachelor's Degree in Computer Science, Engineering, or related field required and 10+ years of experience as an IT Architect. * CISSP certified * Experience with security solutions such as SSO, Identity Management, Federated Identity Management, Network access control, endpoint enforcement products, proxy servers, infrastructure and desktop firewalls, IDS/IPS, encryption solutions, vulnerability assessments tools, identify access management, etc. * Experience with security-related hardware, software, external interfaces, commercial security products, and architecture/design practices for SOA * Experience HIPAA security requirements highly desirable * Knowledge and understanding of IT strategy and planning aligned to business strategies. * Experience with large and complex security infrastructures as well as complex application integration environments. * Experience with VPN and encryption related technologies that apply to requested solutions (AES, DES/DES3, FWZ, ISAKMP, PGP, IPSEC, HTTPS) * Proficient in architecture modeling, practices, governance and reference patterns. * In depth understanding of enterprise architecture standards and the demonstrated ability to advocate and enforce their use. * Knowledge and understanding of prevailing methodologies. (OOAD, RUP). * Broad-based knowledge of the IT industry and trends. * Excellent consulting and influencing skills. * Formal and informal leadership and mentoring skills. * Excellent communication skills - verbal, written, presentation. * Excellent collaboration skills (with other architects, analysts, managers, business). * Certification or experience with TOGAF, Zachman, FEAF, COBIT, ITIL or Gartner Framework a plus. * Possess appropriate security certifications (CISSP, CISA, SCNA, SCNP). Thanks & Regard's Mahi A. Accounts Manager, Manchester, NH, 03104. E-mail: <mailto:[email protected]> [email protected] Direct: (603) 263 0323 Please do not print this email unless it is absolutely necessary. Spread environmental awareness. This e-mail and any attached files may contain confidential and/or privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive this e-mail for the recipient), you may not review, copy or distribute this message. Please contact the sender by reply e-mail and delete all copies of this message. We respect your Online Privacy. This is not an unsolicited mail. Under Bills.1618 Title II passed by the 105th U.S. Congress this mail cannot be considered Spam as long as we include Contact information and a method to be removed from our mailing list. If you are not interested in receiving our e-mails then please reply with a remove in the subject line and mention all the e-mail addresses to be removed with any e-mail addresses which might be diverting the e-mails to you. We are sorry for the inconvenience. -- You received this message because you are subscribed to the Google Groups "project managment" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/project-managment?hl=en.
