Openings by keralaguest

VIEWS: 3 PAGES: 5

									Application Security:

Level: SE/SSE/TL

Key Responsibilities of Position:

      Perform application assessments using a tool based and manual assessments to
       determine the security posture
      Recommend Remeditaion measures for the projects
      Support Consultant /Team Lead in carrying out vulnerability assessments
      Relevant Experience ranging between 2 to 8 yrs

BMC- Atrium:

Levels : SSE/TL


BMC Event Management:

   Atrium Orchestrator: Working knowledge and the ability to develop and implement
   automated workflows using BMC’s Atrium Orchestrator.

   BEM: Working knowledge and the ability to create rules using BMC's Master Rules
   Language. Working knowledge and the ability to create correlation events and send the root
   cause to the BEM console.
   Working knowledge on coding rules for BEM Logfile adapters and SNMP adapter.

   ProactiveNet/BPM:
   ProactiveNet - Working knowledge and ability to use the tool to set thresholds and create
   alerts to send to the BEM console for events that are outside of the thresholds.
   BPM – Working knowledge and ability to use the tool to develop and implement BPM
   monitors to monitor infrastructure and applications. Create customized monitors using the
   tool for exceptions that are not out of the box.

   MQ Software Qnami: Working knowledge and ability to use the product. Ability to
   understand the application decomposition and be able to determine what data needs to be
   provided. Upon receipt of the data, validate it and create Qnami models including all the
   required touch points within an application. This would require detailed knowledge of JAVA
   constructs, IIS, .net, JBOSS and WAS. Using the models created, apply that information to
   the Qnami monitor. Set thresholds for each touch point and create alerts to the BEM console
   or email/page support.

   BladeLogic: Working knowledge and ability to create and deploy software packages to the
   server community using the BladeLogic product.

   ITSM: Using the Remedy product, be able to create change tickets, service calls, and
   incidents.

BMC (Remedy):

Level: SSE:

      3-4 years experience with BMC Remedy installation and configuration.
      Working knowledge of Remedy Action Request System.
      Should have worked on Remedy Administrator tool.
         Good understanding of ITIL processes. Certification is desirable.
         Should have used one module of BMC Remedy out-of-box solution or similar tool (like
          HP or Homegrown tool).
         Experience in developing technical and design specifications.
         Experience in and aptitude for troubleshooting, performance tuning, problem solving.

IBM-WebSphere-Administration:

Levels: SE, SSE

         Candidate should possess good IBM WebSphere MQ-SERIES knowledge
         Knowledge on configuration of nodes
         Knowledge on Implementing Clustering
         Creating and configuring remote and local queues in Sun-Solaris & HP-UX environment
         Creation of application domain, connection pools and datasource
         Setting up of JMS services
         Optimization and tuning of the WebSphere App server
         Fair exposure on Java/J2EE applications
         Exposure on Integration tools (preferably IBM products)

IP Telephony:

SE:

• Industry Certifications like CVOICE,CIPT, CCVP
• Ability to discuss concepts of IP Addressing , Routing , Switching and IPT basics.
• Experienced on Migration to VoIP from traditional PBX systems.
• Understanding of services offered by different types of Network Service Providers (NSPs).
• Ability to configure and discuss Cisco Call Manager and IPCC Enterprise, Voice Gateways and
Gatekeepers.
• Ability to discuss concepts of the SIP, H.323, MGCP, SCCP and related protocols.
• Ability to configure some Cisco IOS-based (and other vendor) devices.
• Ability to design and deploy high availability networks.
• Ability to assist with product selections from requirements and cost perspective.
• Understanding of fundamental concepts of networking, knowledge of product lines from major
vendors, trained on tools in network toolkit
Must have good working knowledge of network design and documentation tools like MS Visio and
productivity tools like MS Excel , Word and PowerPoint.




TL:

• Industry Certifications like CVOICE,CIPT, CCVP
• Ability to discuss concepts of IP Addressing , Routing , Switching and IPT basics.
• Experienced on Migration to VoIP from traditional PBX systems.
• Understanding of services offered by different types of Network Service Providers (NSPs).
• Ability to configure and discuss Cisco Call Manager and IPCC Enterprise, Voice Gateways and
Gatekeepers.
• Ability to discuss concepts of the SIP, H.323, MGCP, SCCP and related protocols.
• Ability to configure some Cisco IOS-based (and other vendor) devices.
• Ability to design and deploy high availability networks.
• Ability to assist with product selections from requirements and cost perspective.
• Understanding of fundamental concepts of networking, knowledge of product lines from major
vendors, trained on tools in network toolkit
• Must have good working knowledge of network design and documentation tools like MS Visio
and productivity tools like MS Excel , Word and PowerPoint.

Mercury Load-Runner:

We are looking for Candidate having

       One full life cycle implementation experience
       Exposure to Quality and CMM Level Processes and Practices

Security Privacy & Compliance Frmwrks-Other:

Level: SSE/TL:

Overall 5-6 years experience in Information and Infrastructure Security, Data Privacy and
Protection

       Good understanding and experiences with Risk assessment and management, Audit
        (both internal and external); policy, procedure and standards development, security
        strategy and security awareness campaigns
    
       A solid understanding of frameworks such as ISO 17799/27001/27002, COBIT, and other
        relevant compliance such PCI, HIPAA, SOX, NERC, FISMA, FFIEC and GLBA and
        others that are required for Export, Import and Domestic Use of information and
        information technology and Privacy.
    
       Good understanding of Data privacy and protection requirements. Knowledge of DLP
        tools such as Symantec Vontu, Guardium,RSA, Macfee etc
    
       Good understanding of information security and its impact on application development,
        operations as well as the IT Infrastructure and business process.
    
       Good analytical and problem solving skills; excellent communication and influencing
        skills.

Security Strategy/Policy/Governance:

Level: TL:

Overall 4-5 years experience in Information Security, Data Privacy and Protection

       Good understanding of IT GRC concepts and products used for IT GRC such as Archer,
        Symantec, Agilian etc
       A solid understanding of frameworks such as ISO 17799/27001/27002, COBIT, and other
        relevant compliance such PCI, HIPAA, SOX, NERC, FISMA, FFIEC and GLBA and
        others that are required for Export, Import and Domestic Use of information and
        information technology and Privacy.
       Good analytical and problem solving skills; excellent communication and influencing
        skills.

Vmware:

       Good working knowledge on Windows and Linux operating systems.
       Candidates need to have working knowledge on implementation and administration of
        ESX servers, VM’s.
       Good working knowledge on VMware Virtual centers, including VC administration.
       Good working Knowledge on P2V, V2V migrations, cloning, template creation etc.
       Candidates should be good in VMware DRS, HA etc.
       Basic knowledge on networking concepts, SAN concepts, DNS, DHCP
       Good knowledge on ITIL standards like incident and change management.
       Certifications like MCSE, VCP preferred.
       Knowledge on VMware Life cycle manager, Update manager preferred
       Candidates should be willing to work on shift timings depends upon the project
        requirement.

CA-Identity Manager:

Ideal experience would include
     Requirements Gathering, Analysis, Designing, developing, testing, deployment and
        application support of Identity and Access Management solutions.
     Participation in conceptual and technical design of Java/J2EE solutions and I&AM
        solutions
     Design and Development of security for applications using LDAP, PKI, SSSL, JNDI, RSA
        BSAFE would provide an ideal background.
     Overall IT experience between 5-8 years
     2-5 years of strong Java/J2EE design, development, testing and application support
        experience
     prior experience on CA Identity Management,
     2-5 years of CA-Identity and Access Management solutions deployment, configuration,
        customization and support. This should include integration with LDAP, deployment of
        web agents for access control, configuration of authorization models, single sign-on
        configurations, build of approval and provisioning workflows, deployment of provisioning
        adapters, SSL Configuration, configuration of user management, self-service, password
        resets, forgot password functionality

Capacity & Performance Monitoring:

Level: SSE

We are looking for the following skills in a candidate with minimum 3.6 yrs of relevant work
experience:

       Ability to Evaluate business volumetric and translate to needed resource requirements
       Exposures and understanding of various platforms and architectures
       Ability to monitor performance, diagnose performance bottlenecks and optimize system
        performance for various operating systems and hardware.
       Knowledgeable of internals of Linux, Solaris and Windows operating system.
CA-Site Minder-Web Access Mgr:

Ideal experience would include
     Requirements Gathering, Analysis, Designing, developing, testing, deployment and
        application support of Identity and Access Management solutions.
     Participation in conceptual and technical design of Java/J2EE solutions and I&AM
        solutions
     Design and Development of security for applications using LDAP, PKI, SSSL, JNDI, RSA
        BSAFE would provide an ideal background.
     Overall IT experience between 5-8 years
     2-5 years of strong Java/J2EE design, development, testing and application support
        experience
     prior experience on CA Web Access Manager
     2-5 years of CA-Identity and Access Management solutions deployment, configuration,
        customization and support. This should include integration with LDAP, deployment of
        web agents for access control, configuration of authorization models, single sign-on
        configurations, build of approval and provisioning workflows, deployment of provisioning
        adapters, SSL Configuration, configuration of user management, self-service, password
        resets, forgot password functionality

Network Performance Optimization:

       Ability to troubleshoot complex network problems including using sniffers and packet
        capture analysis.
       Experience in planning and developing core network sizing plans
       Ability to monitor performance, diagnose performance bottlenecks and optimize system
        performance for various operating systems and hardware.
       Experience with network simulation tools like Shunra will be a plus.

SAP-Security-Application Security:

Experience including SAP Security
    Deep skills in IT Security audit and compliance backed up by good understanding of
       various regulatory compliance, governance, risk and compliance strategy,
    Experience in designing and implementing SAP Security with hands-on expertise on
            o Access Control Suite
                     Compliant User Provisioning (Access Enforcer)
                     Enterprise Role Management (Role Expert)
                     Risk Analysis and Remediation (Compliance Calibrator)
            o Process Control Suites
                     End-to-End Internal Controls Solution
    Experience of SAP Authorization design, SAP security best practices

Vendor Tools for Config & Release Management:

Monitor the environments for all applications.
- Resolve Level 1 issues for any Environment related problems
- Understand the environment and provide timely communication for the team on the environment
activities
- Basic scripting on Perl, VB Script
- Good knowledge on Operating System
- Team Lead to setup the monitor the health check process for all applications across
environments.

								
To top