All, I currently have a requirement for one of my clients north of Boston. The job description follows. Keep in mind that the technology aspect of the position is just as important as the security aspect of the position. This is a contract position and the need is urgent. Has responsibility for application level security design related to technology, infrastructure and architecture strategies of the company. Determines which information security strategies and procedures are implemented at an application level to ensure that information is controlled and secured based on its value, risk of loss or compromise, and ease of recoverability. Confers with programmers, auditors, and other personnel to identify and plan security for data, software applications and hardware/infrastructure implementations. Candidate should possess expertise in interoperability requirements between the various computing platforms and infrastructure (IBM mainframe, UNIX midrange, Network and desktop). The position requires technical expertise in distributed computing systems and transaction based systems. Responsibilities: ¨ Work with the IS Security team to ensure selection and use of realistic enforcement mechanisms. ¨ Support the information asset classification method by working with project teams. ¨ Participate actively in the technology architecture planning process in the areas of platform and application security. ¨ Consult with application development projects to ensure the proper fit to the security architecture and identify when it is necessary to modify the technical architecture to accommodate project/business needs. Skills and Knowledge: ¨ Ability to relate business requirements and risks to technology implementation for security-related issues. ¨ Knowledge of risk assessment procedures, role-based authorization methodologies, and authentication technologies. ¨ Ability to function as a consultant to other IT groups on security matters as a recognized technical expert. Security development environments may include the following; · Mainframe: ACF2, MVS, VSAM, COBOL, IMS, CICS, DB2, JCL, TSO, SAS · Midrange: AIX, DEC UNIX, ORACLE · Client/Server: NT Server, Netware, RS/6000, AIX, UNIX, Internet, Intranet, GUI's (PowerBuilder, Visual Basic) · Desktop: Windows NT, Windows 95, Microsoft Office Suite, Lotus Notes, Microsoft Exchange, Visual Basic, C++, McAfee ¨ Demonstrated experience in effectively communicating with a broad base of end-users and multiple management layers. ¨ Must understand the concepts involved in using multiple exterior network zones as a basis for Internet Security Architecture. ¨ Ability to effectively adapt to rapidly changing technology and apply it to business needs. ¨ Must be able to convert technical concepts into system designs that can be implemented. ¨ Ability to anticipate user requirements and identify and resolve complex problems with minimal supervision. ¨ Strong customer service orientation. ¨ Excellent oral and written communication skills; ability to present and explain technical information in a way that establishes rapport, persuades others, and gains understanding is critical to success in this position. ¨ Ability to foster teamwork. ¨ Strong judgement, analytical and decision-making skills. ¨ Strong follow-up and organizational skills. Experience: ¨ 5 plus years experience in Information Technology field with exposure to information security concepts and practices. Working Relations: ¨ Reports to the I.S. Security Team Lead. ¨ Builds relationships with clients. ¨ Has effective working relationships with peers in other internal and external IT areas. ¨ Has frequent interactions with application development and operations staff. Doug MacNeil Whitridge Associates Inc. Sales Manager 744 E. Squantum St. Office: (617) 472-2292 x138 Quincy, MA 02171 Mobile: (617) 212-9173 www.whitridge.com dougat_private
This archive was generated by hypermail 2b30 : Mon Dec 10 2001 - 12:46:29 PST