This job takes a lead role in executing a process to develop a security architecture that processes information of various levels of sensitivity. The security architecture must be compliant with an existing enterprise technical security control requirements model. Produce a gap analysis documentation to identify any gaps between specific technical security requirements and the architecture of the system and provide detailed technical recommendations on appropriate mitigation measures. Advise and consult clients responsible for the architecture, design, implementation, and deployment of technical security controls on appropriate application of existing security services to solve their problems or enable new business opportunities. Research and evaluate new security technologies to be used as point solutions to gaps where the project is unable to take advantage of or needing greater functionality than reusable enterprise security services. The security architecture work will include network security, network defense, operating system security identity, authentication and authorization, data protection, application security, activity audit and monitoring, mobile computing security, and partner/vendor access to corporate systems/data. Mentors team members.
Enhance security team accomplishments and competence by leading delivery of solutions; answering technical and procedural questions for less experienced team members; teaching improved processes; mentoring team members. Determine most complex security requirements by evaluating business strategies and requirements; conducting system security and vulnerability analyses and risk assessments; identifying integration issues; preparing cost estimates. Lead security systems by evaluating network and security technologies. Implement security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures. Implement security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures. Enhance department and organization reputation by accepting ownership for accomplishing new and different requests; exploring opportunities to add value to job accomplishments. Provide leadership and mentoring in the areas of expertise and architecture to peers, developers, management and business users including technical expertise, coaching, and ad-hoc training. Support assurance compliance to required standards, procedures, guidelines and processes. Other duties as assigned or requested.
Bachelor’s Degree - Information Systems, Computer Science, Information Security, or Engineering
Master’s Degree – Computer Science, Information Security, or related field
7-10 years' experience architecting solutions
Experience communicating with business partners
Use of security patterns and security best patterns such as threat modeling.
At least three (3) years of experience with security technologies, such as intrusion detection/prevention, event correlation, firewall, antivirus, anti-spam, policy enforcement, patch/configuration management, audit, secure application development.
Expertise in data-protection mechanisms including an in understanding of cryptographic algorithms such as AES, 3DES, RSA, ECC, SHA etc
10-15 years' experience in Information Security
Expertise in data-protection software and hardware solutions including Application, Database, and File level encryption and tokenization solutions
Big Data Security including Hadoop security and emerging technologies such as im-memory and NoSQL
Strong experience in Threat Modeling of complex security systems
Experience in delivering comprehensive architecture specifications for complex security.
Thorough understanding of the security controls provided in common platforms and applications in the corporate environment including, but not limited to, Unix, Linux, Windows, IBM Mainframe (zTPF, MVS), Oracle, MS SQL Server Microsoft Outlook, J2EE applications.
Experience with applicable control frameworks and compliance mandates like PCI, FISMA, HIPAA, and CoBIT is highly preferred
The Pittsburgh Business Times recently named CompuGroup Technologies as the overall fastest growing privately held Professional Services company and #7 overall on the Pittsburgh top 100 listing of our area’s fastest-growing, privately held companies for 2013.
CompuGroup Technologies Mission:
To help our customers create practical business benefits from IT Solutions and Provide high quality and... cost effective Consulting services (ERP, Infrastructure, Web Applications, Mainframe Systems) in all Industries domain.
CompuGroup Technologies Offerings
CompuGroup Technologies delivers senior information technology consultants to clients who need them for critical projects.
Our clients say we consistently deliver the highest quality consultants and the fastest turnaround times in the industry.
Areas of Expertise
• Project Management and Business Analysis
• ERP: SAP, Oracle, PeopleSoft
• Business Intelligence: SAP, Oracle, PeopleSoft, Business Objects,Cognos, Informatica
• Customer Relationship Management: SAP, Oracle, PeopleSoft
• Supply Chain Management: SAP, Oracle, PeopleSoft
• Database Administration: Oracle, Microsoft SQL Server, IBM DB2
• Application Development: Java/J2EE, .NET, C#, C++, Visual Basic, PL/SQL
• Mainframe Systems: COBOL, IMS, JCL, CICS