Hello, Please let me know if you have any consultant for this position.
USA, CA Palo Alto 3+ Months Rate: Depends on Experience "Security Systems - Specialist" ***Epic Certification or Epic Experience is now required*** Designs, develops or recommends security systems solutions that will ensure proprietary/confidential data and systems are protected. Provides technical services for the support of integrated security systems and solutions. Participates with the client in the strategic design process to translate security and business requirements into processes and systems. The Security Systems Specialist typically participates in technical projects needed to upgrade security requirements for both internal and external clients of Perot Systems. Designs, develops, implements, and tests security products for possible inclusion in corporate and client programs. Works with clients and managers to satisfy client and Perot Systems annual Information Security Strategic Plan. Provides knowledge and expertise to less experienced Analysts. Requires 5-10 years of progressive directly related experience in *Information Security operations*, access control or the equivalent combination of pertinent applicable education and experience in the following areas: Electronic encryption, key management, E-commerce and secure EDI Smartcards Unix (Sun OS, Solaris, NeXT) Windows NT desktop and server Compaq PC hardware/software Novell Netware 3.1x Firewalls IBM mainframe security ACF2 , RACF, Top Secret, MVS/TSO, and ISPF IBM midrange security AS400 Database (Oracle, Sybase, SQL Server) and applications (MS Office Suite) Financial applications development and operations. Professional certification in area of expertise is desirable, along with participation in nationally recognized information security organizations. Typical Duties Designs and conducts technical programs that include systems upgrades, migrations, and modifications to increase client and Perot Systems’ security. Develops and documents processes which enhance information security business-entity wide. Searches external sources for leading edge security tools to enhancing client and Perot Systems’ current capabilities. Conducts audits of existing information security accounts, summarizes data, and manages outcomes to highest level of risk avoidance. Participates in annual Disaster Recovery planning and testing activities. Perot Systems Corporation is a worldwide provider of information technology services and business solutions to a broad range of clients. Required Skills: *Epic Certification or Extensive Epic Experience 5+ years applied experience implementing various security mechanisms for across the systems stack*: applications, databases, multi-platforms and operating systems *3+ Programming and scripting experience using Microsoft technologies (C#, VB, WMI, XML, workflow)* 2+ years applied experience managing security mechanisms for clinical systems Demonstrated knowledge of enterprise-level IT infrastructure design, management, and security Hands-on experience in tools to perform capacity planning, traffic engineering, peering, intrusion detection, network audits and security Desired Skills: Excellent organizational skills Strong communication skills – written and oral Skilled in Microsoft Office products including MS Project Skilled at problem solving and identifying creative solutions to complex problems Minimum Educational Requirements: Degree in Computer Science, Information management or Healthcare related field Experience in-lieu of education acceptable Minimum Certifications or Other Professional Credentials: CISSP, CISM, GIAC, Security + or other recognized Security certifications preferred, but not required 1. Works with the IT Security Team Lead and Technical Project Manager to design, develop or recommend security systems solutions that will ensure proprietary/confidential data and systems are protected. 2. Participate in enterprise security planning, development and testing activities. Plan and perform vulnerability assessments. 3. Plan and perform vulnerability testing to identify security risks, define appropriate safeguards and ensure their implementation. 4. Ensure compliance with policies and procedures / Evangelize security processes. 5. Over see audit schedules and perform security audits. -- Thanks&Regards Madhukar.Doppalapudi [email protected] 678-799-8602 --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "US_IT.Groups" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.co.in/group/us_itgroups?hl=en -~----------~----~----~----~------~----~------~--~---
