Hi Business Partners,
Hope you are doing great!!

We have an urgent requiremen *Security Architec in  Warren, MI  *for
** **with one of our clients. Please go through the job description
and if you
find it interesting then please send me an updated copy of your resume and
below details to [email protected]
*
* Position:  Security Architect
 Location:  Warren, MI
  Duration: 4 years (Present to December 31, 2015)

Rate:          $11,900 monthly

*Candidates should have a general IT architect background (development and
oversight) with previous experience with at least one of the following
technologies: JEE, SAP, mainframe, SOA.*

*Summary Role Description*
Accountable for the quality and cohesion of a domain security architecture
including Identity and Access management infrastructures  (such as single
sign on, public key infrastructures, web access management, federated access
management) and enterprise directories, their conformance to approved
standards, and alignment with target (future-state) enterprise architecture
goals.  Responsible for guiding domain architects on effective reuse of
security architecture building blocks, and supporting domain efforts in
creating security architecture components that can be reused across the
enterprise.
*Education*
Bachelor’s degree in a technical discipline required.  A graduate degree
with an information technology specialization is preferred. CISSP
certification is also preferred.
*Major Duties and Responsibilities *
a. Accountable for approval and enforcement of all security standards within
the domain.
b. Ensures that all applications within the domain are fully secure against
unauthorized access, inappropriate penetration, web intrusion, denial of
service attacks and all other vulnerabilities.
c. Reviews and evaluates domain solutions from a security architecture
perspective.  Conducts these reviews in a timely manner in order to support
project timing requirements while balancing the need for architectural
conformance with business needs.
d. Accountable for providing approval recommendation to GM for all security
related artifacts resulting from development and sustain activities.
e. Accountable for the quality and integrity of the domain security
architecture to meet General Motors corporate standards and policies
including but not limited to;
General Motors Information Security Policies and Practices (ISP&P).
General Motors Information Technology Standards (It Standards)
General Motors Information LifeCycle Management (ILM) and Record Retention
Policies
f. Responsible for the quality and integrity of a security architecture that
addresses all information security requirements of the business customer
while maintaining adherence to GM corporate standards and policies.
g. Responsible for guiding the deployment of Identity & Access management
architectures and infrastructures within the domain (including Single Sign
on, Public Key Infrastructure, Web Access management, Federated Access
Management) and Enterprise Directories.
h. Responsible for developing security architectures around Role Based
Access Control (RBAC) entitlements to web applications, implementing role
resolution, role mining, attestation, workflows, and role administration
user interfaces.
i. Responsible for auditing of end user access privileges to domain systems,
identification of violations and inadequacies and development of remediation
plans.  Oversees the implementation of any remediation plans to ensure
compliance.
j. Provide architecturally driven guidance to IT portfolio and investment
planning activities.
k. Provide oversight and architecturally driven guidance to the development
& sustain organizations regarding domain specific security compliance with
enterprise standards and architectural direction.
l. Represents the domain interests in the evaluation and selection of GM
information security standards from a technical architecture perspective.
Supports development of the domain strategic security architecture roadmap.
m. Contributes to the identification and development of enterprise-wide
security requirements based on industry experience and best practices.
 Qualifications
Success in this role will be measured by demonstrated ability to ensure the
security and continuity of the domain application portfolio through
conformance to GM security standards and policies and the deployment of
security related industry best practices.
*Architecture Skills:*
a. Deep hands-on practical experience developing security architectures to
support a large scale global user community with complex information
authorization rules and requirements.
b. Ability to conduct fact-based evaluations of security architecture
alternatives, mediate opposing viewpoints and negotiate equitable outcomes
that ensure stable solutions.
c. Practical experience with enterprise architecture support tools (e.g.,
Orbus, Troux, System Architect) or MS-Office toolset (Visio, Excel, Word) as
applied to architecture deliverables.
d. Practical application of TOGAF or equivalent framework/method in
establishing, governing, and executing enterprise-level architecture work.
*Technical Skills:*
a. Hands on experience and industry recognized expertise with SAML, SPML ,
XACML , Single Sign On, Federation, Microsoft Active Directory Suite, Sun
Identity Suite, Tivoli Identity Suite, Oracle Identity Suite, ESSO products
and other security related information technologies.
b. The ability to troubleshoot, evaluates, assess and recommend remediation
of technical security architectures and applications in a crisis management
situation.  Proven ability to diagnose and remediate large scale
multi-tiered application systems, including the underlying infrastructure is
essential.
c. Ability to identify and appropriately apply current information security
technologies across multiple projects and platforms driving business focused
results.
*Experience*
a. Minimum 10 years experience in security governance, security architecture
development and implementation, industry accepted security technologies, and
integration of security requirements into architecture components used by
systems engineers and developers.
b. Hands on experience in the administration of identity access control
solutions.
c. Demonstrated experience in successfully translating business strategy,
objectives, and future-state capabilities into implied security requirements
while maintaining traceability between them through deployment and benefits
realization.
d. Demonstrated experience in developing contextual and conceptual security
architecture deliverables at a domain or enterprise level – not just
technical solution architecture deliverables.
e. Demonstrated ability to solve complex technical IT security problems
through appropriate and cost effective application of current technological
components.
f. Demonstrated experience in successfully engaging IT leadership in
defining and elaborating architecture requirements.

 If you interested in this job position mentioned please response with your
resume in MS word format with these details:
Full Name:
Current Location:
Contact No (Cell and Landline):
Email ID:
Visa Status:
Availability:
Currently on Project (Y/N):
Open to relocate:
Total Exp
US Exp.
SSN(Last4Digits):
2 Reference
Employer details:


Thanks&Regards,
Smith
Alpha Synopsys Inc.
Direct: 254 235 6554
Fax:586-203-9726
Email: [email protected]
URL: www.alphasynopsys.com

-- 
You received this message because you are subscribed to the Google Groups 
"US_IT.Groups" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/us_itgroups?hl=en.

Reply via email to