Hi,
      This is Hareesh from Sriven Infosys Inc. Kindly send me your consultants 
updated Resumes for the below requirement ASAP. 

Please reply me at : hare...@sriveninfosys.com

Job Title: Security Architect

Location: Syracuse, NY

Duration: 2 months

Phone screen followed by In-person interview
Local candidates strongly preferred, Beside state consultants preferred
Need two professional references from recent project 

Send 100% matching resumes, rate, contact details ASAP



CISSP, CISA, SANS GIAC, or relevant security certification(s) desired. 
Additional certifications such as MCSE, CCNA/CCNP, etc. preferred

  Job Description: 

. Provide consulting and operational support to cross functional security 
activities and project teams including infrastructure compliance, vulnerability 
identification and remediation, policy development, and application security. 
. Provide technical guidance on security/privacy policies and standard 
development. 
. Work closely with information technology teams and other lines of business, 
vendors, and with other systems professionals to identify innovative security 
solutions and actively apply these solutions. 
. Advise management on specific technologies that enable secure business 
growth. 
. Assist with the development and operation of information security processes. 
. Develop and implement action plans to address security issues and enhance the 
security architecture 
. Design and architect solutions related to security, including intrusion 
detection and prevention, remote access, firewalls, encryption, data 
protection, and identity management. 
. Research current trends and emerging technologies related to the security 
industry. 
. Work with development teams to integrate the security architecture with 
applications including single sign-on and role based access control. 

Skills: 
Strong background in IS service delivery with a proven track record of ability 
to meet business requirements and deadlines within budget. 
Conversant in a broad number of security subjects such as: 
. system audit 
. policy enforcement 
. cryptography 
. data protection 
. common authentication practices and protocols 
. communication systems and protocols 
. software security and common security issues associated with new technologies 
. network security 
. security testing practices 
The job holder will be expected to have the following experience: 
. Experience developing and deploying new technologies for large enterprises 
. Experience designing and implementing Network security including firewalls, 
intrusion detection, and VPN. 
. Experience designing and implementing network architectures including 
wireless networks. 
. Have experience of business analysis and proven ability to work with business 
leaders on how security (techology and process) meet their needs. 
. Ability to weigh security and business risk, provide respective options, and 
present such findings and recommendations to all levels within the 
organization. 
. Sound knowledge of mission-critical control & IS systems (infrastructure, 
application, security and network aspects) 
. Detailed understanding of project management with hands on experience. 
. Experience with the following is strongly preferred: Oracle databases, Web 
applications servers, SAML, XML, SOAP, and web services 
. Network topology design, security, performance and fault tolerant 
architecture experience is a plus 
. CISSP or similar certification required 
. Self-learning and a very analytical background are essential pre-requisites. 
. 5+ years relevant information security experience. 
. CISSP, CISA, SANS GIAC, or relevant security certification(s) desired. 
Additional certifications such as MCSE, CCNA/CCNP, etc. preferred. 
. Hands-on experience with 2 or more varieties of Unix/AIX/Solaris, Windows, 
network services, ethical hacking and vulnerability scanning, firewall and 
intrusion detection technologies, hands-on experience with policy compliance 
tools and control processes. 
. Other complimentary skills include: application development background and 
strong working knowledge of security code review processes. 
. High degree of proficiency MS Office Suite, Outlook & Internet applications 
. Strong analytical, prioritizing, interpersonal, problem-solving, and 
presentation, budgeting, project management (from conception to completion) & 
planning skills 
. Strong verbal and written communication skills 
. Strong negotiation/mediation skills. 
. Demonstrated collaborative skills and ability to work well within a team 
. Ability to work with and influence senior management 
. Ability to work in a fast-paced and deadline-oriented environment 
. Self-motivated with critical attention to detail, deadlines and reporting. 

Education: 
B.S. Degree required in Computer Science, Information Technology, or related 
field. Advanced degree (Master's, MBA) preferred.

 

 

Thanks & Regards

Hareesh
Technical Recruiter
Sriven Infosys INC
Ph: (212)-999-6251 Ext: 218 || Alt: 646-644-2894
Fax: 212-658-9460
Email: hare...@sriveninfosys.com
Web: www.sriveninfosys.com 





 

Sriven Infosys Inc is an Equal Opportunity Employer. Qualified applicants will 
receive consideration for employment without regard to race, color, religion, 
sex, national origin, ancestry, citizenship, disability, age, military or 
veteran status, and other characteristics. We help our clients, employees & 
partners compete and win!
**************************************************************************************************************************
If wanted to be Removed, Please reply in the subject line "Remove". Sorry for 
the inconvenience caused.

 

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"zilliontechnologies" group.
To post to this group, send email to zilliontechnologies@googlegroups.com
To unsubscribe from this group, send email to 
zilliontechnologies+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/zilliontechnologies?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to