System Architect (f/m), Ref. Nr.: 13537 - SH

Vertragsart:
Vor Ort
Start:
07.2017
Dauer:
5 Monate (Verlängerung möglich)
Von:
Ort:
PLZ 8 - München
Eingestellt:
06.04.2017
Land:
flag_no Deutschland
Ansprechpartner:
Martina Ophälders
Projekt-ID:
1321204

Warning
Dieses Projekt ist archiviert und leider nicht (mehr) aktiv.
Sie finden vakante Projekte hier in unserer Projektbörse.
Since 1992 SD & T has offered consultancy advice and service in the field of information technology. We work in the field of staffing services and innovative workforce solutions as well as in the field of consultancy. In these areas of expertise we support our customers with IT staff and highly qualified IT consultants.

Currently we are looking for one System Architect (f/m), Ref. Nr.: 13537 - SH

Contract:: Freelance or employee
Duration: Juli 2017 till november 2017
Location: Zip code 8 - Munich

Tasks:
- Perform market evaluation to identify appropriate solutions to business requirements
- Evaluate security solutions through Proof of concepts
- Design solutions including service aspects (cf. ITIL Service design activities)
- Contribute to the definition of the security architectural blueprint
- Integrate new solutions with existing framework based on a security architectural blueprint
- Transition solutions to teams in charge of daily operations
- Balances technological opportunities with business processes requirements
- Maintains a holistic view of the organisation’s strategy, processes, information and ICT assets
- Links the business mission, strategy and processes to the ICT and Cyber Defence strategies
- Lead development and integration of components
- Acts as a team leader for developers, system engineers and technical experts
- Lead and/ or conduct system integration
- Designs, integrates and implements complex Cyber Security solutions from a technical perspective
- Security events collection architecture design
- Align Cyber Security strategy and planning with the organisation’s business goals
- Streamline business processes, functions, procedures and workflows and apply a consistent implementation approach
- Manage stakeholder engagement in the development of new processes and systems and verifies feasibility
- Conduct post-implementation reviews to evaluate benefits accrued from new processes and systems
- Recommend resolutions and improvements
- Ensures, that technical solutions, procedures and models for development are up-to-date and comply with standards
- Watches technology development and integrates into new solutions

Requirements mandatory:

Specific Practice:
- System Architect

Certifications:
At least 1 certification among:
- CISSP (Certified Information Systems Security Professional)
- CISA (Certified Information Systems Auditor)
- CISM (Certified Information Security Manager)
- SABSA Chartered Security Architect - Foundation Certificate (SCF)
- TOGAF Foundation
- CNDA (EC-Council Certified Network Defense Architect)
- or an equivalent certification recognized internationally

Methodologies:
- At least 1 of the following methodologies: TOGAF (The Open Group Architecture Framework), SABSA (Sherwood Applied Business Security Architecture) or equivalent
- At least 1 of the following Risk Assessment methodologies: EBIOS, CRAMM, PILAR or equivalent

Standards:
- ISO2700X Series

Specific Skills:
- Networking (TCP/IP, SNMP, DNS, Syslog-ng, etc.)
- Defence-in-depth Security Architecture
- Enterprise Security Architectures

Products / Tools:
- Visio
- Microsoft Project or Equivalent

Requirements for the Project:
There is an existing IDAM in place and some components must be replaced and new features need to be also introduced. For this request we need a system architect to design the service in collaboration with the technology provider professional services engineers.
- Evaluate security solutions
- Design solutions including service aspects (cf. ITIL Service design activities)
- Contribute to the definition of the security architectural blueprint
- Integrate new solutions with existing framework based on a security architectural blueprint
- Balances technological opportunities with business processes requirements
- Maintains a holistic view of the organisation’s strategy, processes, information and ICT assets
- Acts as a team leader for developers, system engineers and technical experts
- Designs, complex ID&AM solutions from a technical perspective
- Security events collection architecture design
- Align Cyber Security strategy and planning with the organisation’s business goals
- Streamline business processes, functions, procedures and workflows and apply a consistent implementation approach
- Recommend resolutions and improvements
- Ensures, that technical solutions, procedures and models for development are up-to-date and comply with standards
- Watches technology development and integrates into new solutions

Technical criterias:
Languages WEB (JSF, JVM, XML, SAML,…)
Oracle DBMS, MS SQL Server, MySQL
SAP HCM
Unix, Solaris, Windows OS
PKI - CA - SW
PKI - RFC 5280
PKI - RFC - 6484
HSM usage
Network
Cloud computing an „X“ as a service technologies
ID and Access management technologies

Requirements desired:

Standards:
STIX (Structured Threat Information Expression) with a particular focus on the following

related standards:
CybOX (Cyber Observables)
CAPEC (Attack Patterns)
MAEC (Malware)
TAXII (Threat Information Exchange)

Please send you application only via email (max. 5 MB). Contact: or