*Dear Candidate,* *We have an urgent opening for **Information Security Solution Engineer** for major And I have sent you a job description ,Please go through it and let me know if you are comfortable with it and also send me your consultant's updated*
*Title: Information Security Solution Engineer* *Location: Raleigh, NC* *Duration: 12 Months* *Mode: Phone and Webex* *Professional Primary Purpose: * · *Derive and implement security infrastructure solution specifications from business requirements, and design security solutions that support core organizational functions, and assure their confidentiality, integrity and high availability. * · *Gain organizational commitment for security infrastructure systems and software plans, as well as assist to evaluate and select security technologies required to complete those plans. * · *Provide integrated infrastructure-related technical expertise across the organization, from conceptualization and project planning to the post-implementation support level. * · *Principally works, under limited supervision, with Corporate Information Security (CIS) personnel, Line of Business (LOB) personnel, external vendors, and internal IT Services personnel including Enterprise Architects, Application & Data Services personnel and other IT Operations Services teams, to develop solution specifications, in compliance with corporate standards for architecture adherence and performance guidelines. * *Essential Duties and Responsibilities: * *1. **Design and oversee development and implementation of end-to-end integrated security infrastructure solutions.* *2. **Provide security infrastructure solution expertise, requirements, and assistance to Systems Analysts, Systems Engineers, other Solutions Architects, and application development teams.* *3. **Confer with end-users, clients, or senior management to define security infrastructure requirements for complex systems and infrastructure development.* *4. **Document the company's existing solution architecture and technology portfolio; make recommendations for improvements and/or alternatives.* *5. **Develop, document, and communicate needs for investing in infrastructure evolution, including analysis of cost reduction opportunities.* *6. **Liaison with Enterprise Architects to conduct research on emerging technologies, and recommend technologies that will provide right-sized security posture, operational efficiency, infrastructure flexibility and operational stability. * *7. **Develop, document, communicate, and enforce a policy for standardizing systems and software as necessary. * *8. **Create and maintain system security context and preliminary system security concept of operations and define baseline system security requirements in accordance with applicable regulations and standards.* *9. **Demonstrate comprehensive experience and skill in Information Security (InfoSec) technology and practices necessary to negotiate and persuade technology direction on security principals and tenets such as confidentiality, integrity, availability, authentication and non-repudiation.* *10. **Document reference architectures, patterns, templates, and roadmaps.* *11. **Ensure security product lifecycles are managed proactively.* *12. **Create/maintain domain specific strategies aligned with business drivers and higher level strategies* *13. **Document design specifications, installation instructions and other system security-related information.* *14. **Perform security reviews, identify gaps in security architecture and develop security risk management plans.* *15. **Evaluate existing or emerging technologies to consider factors such as cost, security, compatibility and usability.* *Required Skills and Competencies: * *1. **Bachelor's degree in a technical or business field, or equivalent education and related training.* *2. **Six years of demonstrated experience of systems engineering and/or architecture in at least two of the information security areas: network security, access management, end point protection, data loss prevention, vulnerability management, application security, forensics, web security, mainframe, incident response and/or cyber threat management in a medium to large corporation.* *3. **Comprehensive experience in network security architecture, including design tools, methods, and techniques and the application of Defense-in-Depth principles; knowledge of network design processes, including understanding of security objectives.* *4. **Comprehensive hands on experience implementing complex security solutions. Will include the design and building of security infrastructure including, but limited to Firewalls, IDS, Proxy, Remote Access, ETC.* *5. **Thorough knowledge of The Open Group Architecture Framework (TOGAF), including infrastructure, data, information security, applications, architectural concepts, and associated disciplines* *6. **Knowledge of:* *a. **Mainframe security, including access control, monitoring, integration with non-mainframe technologies, and virtualization;* *b. **Authentication and authorization technologies including remote access;* *c. **Application security and the security development lifecycle and ability to apply to client-server and web-based application development environments;* *d. **Enterprise databases and database security, including database activity monitoring and database access control technologies;* *e. **Encryption methods and technologies for data-in-transit and data-at-rest scenarios;* *f. **Incident response processes;* *g. **Denial of Service prevention mechanisms;* *h. **Firewall technologies and intrusion prevention methods;* *i. **Cloud technologies and hosting;* *j. **Operating system hardening;* *k. **Virtualization technologies;* *l. **Mobile technologies;* *m. **Encryption and key management technologies;* *n. **Endpoint Protection (includes malware);* *o. **Data Loss Protection technologies* *7. **Experience with peripheral component interconnect and other security audit processes, evidence gathering and development/management of remediation plans used in resolution of findings* *8. **Knowledge of risk management processes, including steps and methods for assessing risk* *9. **Ability to derive technical specifications from business requirements and express complex technical concepts in terms that are understandable to multi-disciplinary teams (verbal and written form).* *10. **Ability to grasp the 'big picture' for a solution by considering all potential options and impacted areas.* *11. **Aptitude to understand and adapt to newer technologies.* *12. **Excellent understanding of client service models and customer orientation in service delivery.* *13. **Excellent PC skills, including Microsoft Office products.* *14. **Ability to travel as needed.* *Desired Skills:* *1. **Degree in a related field from an accredited program or equivalent experience.* *2. **Industry certifications in cyber security and forensics, such as CISSP, CFCE, GCFE, GCFA, GCIH and other related credentials preferred.* *3. **Industry certifications in general technology (MCP, MCSE, Network+, etc).* *4. **Industry certifications in networking, such as CCNA, CWNA and/or Net+ preferred. * *Rohit Bhasin |* Module lead Recruiter | Apetan Consulting LLC Tel: 201-620-9700* |121| Fax:2015266869 | *Mail *: 72 van reipen ave pmb#255, Jersey City, NJ 07306| *Corp. Office:* 15 Union Avenue, office # 6, Rutherford, New Jersey 07070| [email protected]| www.apetan.com | *“Forget all the reasons why it won’t work and believe the one reason it will work**"* <http://www.facebook.com/Apetanconsulting> <http://www.linkedin.com/company/apetan-consulting-llc?trk=top_nav_home> <http://twitter.com/ApetanLLC> *Disclaimer:* We respect your Online Privacy. This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. If you are not interested in receiving our e-mails then please reply with a "REMOVE" in the subject line at [email protected] and mention all the e-mail addresses to be removed with any e-mail addresses, which might be diverting the e mails to you. We are sorry for the inconvenience. -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at https://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/d/optout.
