Hello,

Please let me know if you have any consultant for this position.







USA, CA Palo Alto

3+ Months

Rate: Depends on Experience



"Security Systems - Specialist"

***Epic Certification or Epic Experience is now required***

Designs, develops or recommends security systems solutions that will ensure
proprietary/confidential data and systems are protected. Provides technical
services for the support of integrated security systems and solutions.
Participates with the client in the strategic design process to translate
security and business requirements into processes and systems.

The Security Systems Specialist typically participates in technical projects
needed to upgrade security requirements for both internal and external
clients of Perot Systems. Designs, develops, implements, and tests security
products for possible inclusion in corporate and client programs. Works with
clients and managers to satisfy client and Perot Systems annual Information
Security Strategic Plan. Provides knowledge and expertise to less
experienced Analysts. Requires 5-10 years of progressive directly related
experience in *Information Security operations*, access control or the
equivalent combination of pertinent applicable education and experience in
the following areas:
Electronic encryption, key management, E-commerce and secure EDI
Smartcards
Unix (Sun OS, Solaris, NeXT)
Windows NT desktop and server
Compaq PC hardware/software
Novell Netware 3.1x
Firewalls
IBM mainframe security ACF2 , RACF, Top Secret, MVS/TSO, and ISPF
IBM midrange security AS400
Database (Oracle, Sybase, SQL Server) and applications (MS Office Suite)
Financial applications development and operations.
Professional certification in area of expertise is desirable, along with
participation in nationally recognized information security organizations.
Typical Duties
Designs and conducts technical programs that include systems upgrades,
migrations, and modifications to increase client and Perot Systems’
security.
Develops and documents processes which enhance information security
business-entity wide. Searches external sources for leading edge security
tools to enhancing client and Perot Systems’ current capabilities.
Conducts audits of existing information security accounts, summarizes data,
and manages outcomes to highest level of risk avoidance. Participates in
annual Disaster Recovery planning and testing activities.
Perot Systems Corporation is a worldwide provider of information technology
services and business solutions to a broad range of clients.



Required Skills: *Epic Certification or Extensive Epic Experience 5+ years
applied experience implementing various security mechanisms for across the
systems stack*: applications, databases, multi-platforms and operating
systems *3+ Programming and scripting experience using Microsoft
technologies (C#, VB, WMI, XML, workflow)* 2+ years applied experience
managing security mechanisms for clinical systems Demonstrated knowledge of
enterprise-level IT infrastructure design, management, and security Hands-on
experience in tools to perform capacity planning, traffic engineering,
peering, intrusion detection, network audits and security Desired Skills:
Excellent organizational skills Strong communication skills – written and
oral Skilled in Microsoft Office products including MS Project Skilled at
problem solving and identifying creative solutions to complex problems
Minimum Educational Requirements: Degree in Computer Science, Information
management or Healthcare related field Experience in-lieu of education
acceptable Minimum Certifications or Other Professional Credentials: CISSP,
CISM, GIAC, Security + or other recognized Security certifications
preferred, but not required



1. Works with the IT Security Team Lead and Technical Project Manager to
design, develop or recommend security systems solutions that will ensure
proprietary/confidential data and systems are protected.

2. Participate in enterprise security planning, development and testing
activities. Plan and perform vulnerability assessments.

3. Plan and perform vulnerability testing to identify security risks, define
appropriate safeguards and ensure their implementation.

4. Ensure compliance with policies and procedures / Evangelize security
processes.

5. Over see audit schedules and perform security audits.


-- 
Thanks&Regards
Madhukar.Doppalapudi
[email protected]
678-799-8602

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"US_IT.Groups" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.co.in/group/us_itgroups?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to