*Hi,***

*Please go through the below requirement and send me updated resume of your
consultants with the contact details to **[email protected].***

*In this hands-on role you will provide strategy, vision, communication,
and direction regarding security risks to safeguard information systems and
critical data. The IS Security Architect will provide consulting, technical
expertise, support and education on Information Security industry trends,
standards, and best practices regarding data security. This individual is
responsible for developing and managing the Information Security Policy.
This position directly interacts with key business owners and groups
promoting the importance of data security to the organization, as well as,
analyzing the impact security procedures have on our operations. This
person will research and communicate to the organization all changes in
technical, legal and regulatory arenas affecting information security and
computer crime.*

*Duties of the role include: *

*Tactical:*

   - *Coordinate security activities to ensure operational effectiveness *
   - *Manage security controls and monitoring processes *
   - *Communicate security breaches to the organization when security
   issues occur  *
   - *Provide education on security issues and trends to the organization  *
   - *Manage the adoption and implementation of critical security patches  *
   - *Complete a quarterly security scorecard of all infrastructure areas
   using the standard ITIL scoring framework  *
   - *Distribute security policies on an annual basis to all partners to
   foster understanding of the company's security requirements  *
   - *Implement projects that enhance or improve current data security
   utilizing the process excellence framework *

*Strategic:*

   - *Lead the development, adoption, and maintenance of an Information
   Security policy*
   - *Lead an Information Security Committee that incorporates key business
   owners to ensure security risks and the effect of mitigating these risks
   are understood, accepted, and communicated throughout the organization *
   - *Raise awareness of security best practices through the development of
   internal security training programs  *
   - *Evaluate and recommend new information security technologies and
   tools to reduce our risk against threats to critical information.*

*Technical: *

   - *Provide internal security consulting and analysis services for
   existing and proposed applications and infrastructures to ensure best
   practices are followed and security risks are mitigated *
   - *Recommend server hardening best practices to reduce the risk of
   unauthorized access to key Information Systems  *
   - *Recommend and implement network design best practices to reduce the
   risk of outside penetration to the SFI network. Technical areas include
   firewall configurations and monitoring, DMZ design concepts, and wireless
   network protection  *
   - *Provide guidance to help determine the extent to which key business
   areas and infrastructure comply with statutory and regulatory requirements.
   *

*Leadership: *


   - Provide project and technical leadership to multiple complex projects
   utilizing standard project methodologies and resource management
   - Ensure professional growth through participation in professional
   organizations, seminars, user groups and industry networking
   - Quickly learn and adapt to business security needs and drivers to
   deliver risk mitigation to the organization
   - Effectively use and manage outside consultants

*Technical Skills*

·         Tech Skills (products):

o    McAfee ePO

o    RSA Netwitness

o    Cisco ASA Firewall and SSM

o    BlueCoat ProxySG

o    Salto/Prowatch

o    Microsoft TMG 2010

o    Citrix NetScaler WAF

·         Tech Skills (general):

o    Log Analysis

o    Incident Response/Reporting

o    Server Hardening

o    General Auditing

We're looking for leaders who thrive in fast-paced, hands-on environments.
The successful candidate will have:

   - Bachelor's degree in Computer Science, MIS, CIS, related business or
   technical field
   Information Systems with a background supporting and implementing a
   variety of technical architectures in a large enterprise environment.

   - Proven background in network and operating system security is
   required. Successful track record of leading projects and driving results.

   - Experience formulating and implementing security policies and
   procedures a plus.

   - 5 plus years’ experience in an enterprise IS environment working with
   network security, mainstream technology, and leading security projects.

   - Desire to grow and take on new challenges and opportunities



Thanks and Regards

Sandeep

Talent Acquisition Team  *Glomark International LLC  *Direct: 908-838-4407
Fax: 908-688-8831 Email: [email protected]

G-Talk:sandeepglomark   YM: mutyala.hemasandeep



Notice of Confidentiality:

The information contained herein is intended only for the confidential use
of the recipient. If the reader of this message is neither the intended
recipient, nor the person responsible for delivering it to the intended
recipient, you are hereby notified that you have received this
communication in error, and that any review, dissemination, distribution,
or copying of this communication is strictly prohibited. If you receive
this in error, please notify the sender immediately by telephone, and
destroy this e-mail message OR reply with the subject “REMOVE” such that
your email would be taken out of our distribution list. OR Please click on
the unsubscribe Tab.

-- 
You received this message because you are subscribed to the Google Groups "SAP 
BASIS" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/sap-basis.
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to