*Dear Candidate,*

*We have an urgent opening for **Information Security Solution Engineer**
for major And I have sent you a  job description ,Please go through it and
let me know if  you are comfortable with it and also send me your
consultant's updated*



*Title: Information Security Solution Engineer*

*Location: Raleigh, NC*

*Duration: 12 Months*

*Mode: Phone and Webex*



*Professional Primary Purpose: *

·         *Derive and implement security infrastructure solution
specifications from business requirements, and design security solutions
that support core organizational functions, and assure their
confidentiality, integrity and high availability. *

·         *Gain organizational commitment for security infrastructure
systems and software plans, as well as assist to evaluate and select
security technologies required to complete those plans. *

·         *Provide integrated infrastructure-related technical expertise
across the organization, from conceptualization and project planning to the
post-implementation support level. *

·         *Principally works, under limited supervision, with Corporate
Information Security (CIS) personnel, Line of Business (LOB) personnel,
external vendors, and internal IT Services personnel including Enterprise
Architects, Application & Data Services personnel and other IT Operations
Services teams, to develop solution specifications, in compliance with
corporate standards for architecture adherence and performance guidelines. *



*Essential Duties and Responsibilities:  *

*1.       **Design and oversee development and implementation of end-to-end
integrated security infrastructure solutions.*

*2.       **Provide security infrastructure solution expertise,
requirements, and assistance to Systems Analysts, Systems Engineers, other
Solutions Architects, and application development teams.*

*3.       **Confer with end-users, clients, or senior management to define
security infrastructure requirements for complex systems and infrastructure
development.*

*4.       **Document the company's existing solution architecture and
technology portfolio; make recommendations for improvements and/or
alternatives.*

*5.       **Develop, document, and communicate needs for investing in
infrastructure evolution, including analysis of cost reduction
opportunities.*

*6.       **Liaison with Enterprise Architects to conduct research on
emerging technologies, and recommend technologies that will provide
right-sized security posture, operational efficiency, infrastructure
flexibility and operational stability. *

*7.       **Develop, document, communicate, and enforce a policy for
standardizing systems and software as necessary. *

*8.       **Create and maintain system security context and preliminary
system security concept of operations and define baseline system security
requirements in accordance with applicable regulations and standards.*

*9.       **Demonstrate comprehensive experience and skill in Information
Security (InfoSec) technology and practices necessary to negotiate and
persuade technology direction on security principals and tenets such as
confidentiality, integrity, availability, authentication and
non-repudiation.*

*10.   **Document reference architectures, patterns, templates, and
roadmaps.*

*11.   **Ensure security product lifecycles are managed proactively.*

*12.   **Create/maintain domain specific strategies aligned with business
drivers and higher level strategies*

*13.   **Document design specifications, installation instructions and
other system security-related information.*

*14.   **Perform security reviews, identify gaps in security architecture
and develop security risk management plans.*

*15.   **Evaluate existing or emerging technologies to consider factors
such as cost, security, compatibility and usability.*



*Required Skills and Competencies:  *

*1.       **Bachelor's degree in a technical or business field, or
equivalent education and related training.*

*2.       **Six years of demonstrated experience of systems engineering
and/or architecture in at least two of the information security areas:
network security, access management, end point protection, data loss
prevention, vulnerability management, application security, forensics, web
security, mainframe, incident response and/or cyber threat management in a
medium to large corporation.*

*3.       **Comprehensive experience in network security architecture,
including design tools, methods, and techniques and the application of
Defense-in-Depth principles; knowledge of network design processes,
including understanding of security objectives.*

*4.       **Comprehensive hands on experience implementing complex security
solutions. Will include the design and building of security infrastructure
including, but limited to Firewalls, IDS, Proxy, Remote Access, ETC.*

*5.       **Thorough knowledge of The Open Group Architecture Framework
(TOGAF), including infrastructure, data, information security,
applications, architectural concepts, and associated disciplines*

*6.       **Knowledge of:*

*a.       **Mainframe security, including access control, monitoring,
integration with non-mainframe technologies, and virtualization;*

*b.       **Authentication and authorization technologies including remote
access;*

*c.        **Application security and the security development lifecycle
and ability to apply to client-server and web-based application development
environments;*

*d.       **Enterprise databases and database security, including database
activity monitoring and database access control technologies;*

*e.       **Encryption methods and technologies for data-in-transit and
data-at-rest scenarios;*

*f.        **Incident response processes;*

*g.       **Denial of Service prevention mechanisms;*

*h.       **Firewall technologies and intrusion prevention methods;*

*i.         **Cloud technologies and hosting;*

*j.         **Operating system hardening;*

*k.       **Virtualization technologies;*

*l.         **Mobile technologies;*

*m.     **Encryption and key management technologies;*

*n.       **Endpoint Protection (includes malware);*

*o.       **Data Loss Protection technologies*

*7.       **Experience with peripheral component interconnect and other
security audit processes, evidence gathering and development/management of
remediation plans used in resolution of findings*

*8.       **Knowledge of risk management processes, including steps and
methods for assessing risk*

*9.       **Ability to derive technical specifications from business
requirements and express complex technical concepts in terms that are
understandable to multi-disciplinary teams (verbal and written form).*

*10.   **Ability to grasp the 'big picture' for a solution by considering
all potential options and impacted areas.*

*11.   **Aptitude to understand and adapt to newer technologies.*

*12.   **Excellent understanding of client service models and customer
orientation in service delivery.*

*13.   **Excellent PC skills, including Microsoft Office products.*

*14.   **Ability to travel as needed.*



*Desired Skills:*

*1.       **Degree in a related field from an accredited program or
equivalent experience.*

*2.       **Industry certifications in cyber security and forensics, such
as CISSP, CFCE, GCFE, GCFA, GCIH and other related credentials preferred.*

*3.       **Industry certifications in general technology (MCP, MCSE,
Network+, etc).*

*4.       **Industry certifications in networking, such as CCNA, CWNA
and/or Net+ preferred. *







*Rohit Bhasin |* Module lead Recruiter | Apetan Consulting LLC

Tel: 201-620-9700* |121| Fax:2015266869 | *Mail *: 72 van reipen ave
pmb#255, Jersey City, NJ 07306|

*Corp. Office:*  15 Union Avenue,  office # 6,  Rutherford, New Jersey
07070|

[email protected]| www.apetan.com |

*“Forget all the reasons why it won’t work and believe the one reason it
will work**"*

<http://www.facebook.com/Apetanconsulting>
<http://www.linkedin.com/company/apetan-consulting-llc?trk=top_nav_home>
<http://twitter.com/ApetanLLC>

*Disclaimer:* We respect your Online Privacy. This e-mail message,
including any attachments, is for the sole use of the intended recipient(s)
and may contain confidential and privileged information. Any unauthorized
review, use, disclosure or distribution is prohibited. If you are not the
intended recipient, please contact the sender by reply e-mail and destroy
all copies of the original message. If you are not interested in receiving
our e-mails then please reply with a "REMOVE" in the subject line at
[email protected] and mention all the e-mail addresses to be removed with
any e-mail addresses, which might be diverting the e mails to you. We are
sorry for the inconvenience.

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at https://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.

Reply via email to