Lead Rsa Archer developer - Appleton WI - Long Term

Hi ,          
Hope you are doing well!                                                                                                                                                                                                                         
We have an opportunity for Lead Rsa Archer developer with one of our clients in Appleton WI
Please see the job details below and let me know if you would be interested in this role.
If interested, please send me a of your resume, your contact details, your availability and a good time to connect with you.
                                                                                                                                                             
Role: Lead Rsa Archer developer
Location: Appleton WI
Duration: Long term
 
Job Description:
 
The Lead Information Security Engineer will support the Information Security needs of the organization in order to continually support and improve the technologies, procedures and controls within our Information Technology environment. 
 
The Lead Information Security Engineer is viewed as an expert in at least one area of Information Security, has deep understanding of other technologies and their relationship to the protection of Organizations Information assets and delivers strong results through strong technical know-how and focused leadership. 
 
The Information Security Engineer is responsible for the engineering and development function supporting the creation and maintenance of one or more services within Organization’s Information Security Program along with the associated architecture and standards that deliver enterprise-wide Information Security services for internal and external customers. The Information Security Engineer provides subject matter expertise on one or more services within assigned Information Security Program architecture, protocols, processes, and governance and is responsible for the technical implementation and support of all aspects within assigned Information Security Program functions. 
 
Experience: 
Experience with Archer version 6.6 or above. 
Certifications in Archer (e.g., Administration, Security Analytics) is required. 
Knowledge of Governance, Risk, and Compliance (GRC) concepts. 
Proficiency with Archer core solutions, on-demand applications, and data feeds. 
Experienced in creating fields, reports, and dashboards. 
Experience in configuring access control, record permissions, events and notifications. 
Strong process flow mapping, diagramming skills (Visio application), data conversion and interface design skills. 
Expertise in many of the Archer core solutions (Audit, Business Continuity, Compliance, Enterprise, Incident, Policy, Risk, Threat and Vendor Management) desired. 
Experience in Data migration planning and content mapping. 
Proficiency with calculated fields (all functions) and Data Driven Events. 
Demonstrated ability and experience in developing improvements/changes to systems and processes to improve customer satisfaction. 
Familiarity with ServiceNow ITSM is highly desirable. 
Experience working with SQL and XML technologies is highly desirable. 
Over 5 years of professional experience working with large companies and enterprise software. 
Bachelor's Degree in management information systems, computer science, or related field 
Other relevant IT professional certification such as CISA, CISSP, CRISC, is a plus. 
Master’s degree in relevant IT or business area is a plus. 
 
Regards,
Vivek Kumar Yadav | Recruitment Specialist | VBeyond Corporation 
Phone. No: 6785070864
Note:  VBeyond is fully committed to Diversity and Equal Employment Opportunity.
 
Disclaimer: We respect your Online Privacy. This is not an unsolicited mail. Under Bill S 1618 Title III passed by the 105th US Congress this mail cannot be considered Spam as long as we include Contact information and a method to be removed from our mailing list. If you are not interested in receiving our e-mails then please reply to VivekY@vbeyond.com subject=Remove. Also mention all the e-mail addresses to be removed which might be diverting the e-mails to you. We are sorry for the inconvenience.
 

Comments

Popular Posts