Hello Associates,
Hope you are doing great! *Please reply to **[email protected] * This is Ali Ahmed from Exatech Inc.We have an immediate need for below mention requirement, if you feel that you are a perfect match to this requirement, please forward your most updated resume along with the best time and number to carry out further discussions. Looking forward to hear from you... * * *Role: Security Architect* *Location: Lincolnshire, IL* *Duration: Contract-to-hire* *Salary: $/per year* *Interview: Phone Screen and face to face.* *GREEN CARDS OR CITIZENS PLEASE!* *Responsibilities:* Responsible for ensuring the confidentiality, integrity, and availability of computer systems, data, and network resources; working with both internal and external development teams in an effort to validate that both new and existing architectures and applications are developed and deployed in a secure manner. Responsible for creating a secure computing environment through the implementation of security standards for systems and applications, as well as security policies and guidelines. Handles the security of more complex environments, architectures and applications. Develops, coaches and mentors staff level Security Architects. · Identifies the need for new security technology solutions; designs, reviews and collaborates on the deployment of new solutions. - Contributes to the development and implementation of security technology solutions for complicated and more complex environments and architecture. · Conducts request for information/request for proposal (RFI/RFP) and vendor selection and leads the technical design of the deployment. Technologies might include: Database security; Enterprise encryption - application and whole disk; Authorization and Authentication systems such as two-factor, federated, single-sign-on, Active Directory/Light Weight Access Protocol (AD/LDAP); Cloud computing / virtualization; Data leakage identification and prevention; Network/Wireless access controls; Intrusion Detection and Prevention; Security Incident and Event Management; Web application firewalls; Host based controls; Application gateway security controls; Voice over Internet Protocol (VOIP) security controls. · Acts as a subject matter expert on the implementation and capabilities of all existing security controls, particularly in the case of complex and complicated security issues. · Develops baseline system and application hardening guides based on industry best practice and provides assistance to IT teams on current security solutions and configurations. · Conducts system architecture reviews for new technology to ensure best practices, document security solutions, and enable re-use of processes. · Assists in the ongoing documentation, development, implementation, and maintenance of processes, procedures, and services associated with architecture functions including ensuring requirements and deliverables are clearly defined. · Works with Security Operations to ensure architectures are appropriately assessed and able to be supported, contributing to the most complex solutions. · Works with Security Operations to implement new technologies and security solutions in alignment with industry best practice and commonly accepted principles of secure design. · Provides emergency support to Security Operations for escalated issues. · Provides coaching, mentoring and development to staff level Security Architects. Thanks & Regards *Ali Ahmed* *Exatech Inc* *4758 Forest Ridge Dr* *Mason OH 45040* *Phone: 513-433-5532* *Email: [email protected] * *Web: www.exatechinc.com* -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/sap-abap. For more options, visit https://groups.google.com/groups/opt_out.
