Previous Job
Previous
Technology Lead | Data Security | Data Encryption, Data Tokenization
Ref No.: 18-02237
Location: Plano, Texas
Timesheet Submission Frequency:Weekly
Invoice submission frequency:Monthly
Timesheet Instructions for Consultants:Consultant will use Clients system to enter time
Job Description: Business Unit: ENG

***MANDATORY: Please include in the resume the candidate’s complete contact information (Phone number, Email address and Skype ID) as well as a set of 5 interview time slots over a 72 hour period after submitting the profile when the hiring managers could potentially reach to them. Profiles without the required details and time slots will be rejected.***

Job Title* Technology Lead | Data Security | Data Encryption, Data Tokenization
Work Location & Reporting Address* Plano TX 75024
Vendor Rate* 69.00
Contract duration (in months)* 6
Target Start Date* 14 Mar 2018
Does this position require Visa independent candidates only? No

Job Details:
Must Have Skills (Top 3 technical skills only) *
1. Five years of information security experience which includes three years of operational experience implementing and supporting encryption and key management solutions is required.
2. Minimum three years of experience implementing, configuring and supporting at least one of the following third party encryption & key management like,oGemalto Vormetri HPE Voltage Protegrity,Oracle TDE
3. Three years experience in cryptography, various infrastructure and operating systems such as
Windows, Solaris and Lin
Nice to have skills (Top 2 only)
1. Minimum three years of experience in database, networking, storage and system administration is required.
2. Minimum two years experience with Windows, Solaris and Linux operating systems....Medium to large financial services company experience is a plus.

Detailed Job Description:
Deploy and configure encryption and cryptographic key management solutions such as Vormetric, Client, HPE Voltage, Protegrity, etc. as well as using native encryption.
Participate in the encryption product selection process including planning, evaluation, design and implementation.
Identify and document use cases for encryption and key management product selection.
Participate in the definition and implementation of POCs Proof of Concept around encryption and key management.This role will collabor

Minimum years of experience*:5+
Certifications Needed: Yes
CertificationsCISSP, ECES, CEH, GIAC, CRISC, CompTIA, SSCP or similar security certification is pref

Top 3 responsibilities you would expect the Subcon to shoulder and execute*:
1. CISSP, ECES, CEH, GIAC, CRISC, CompTIA, SSCP or similar security certification is preferred.
2. CISSP, ECES, CEH, GIAC, CRISC, CompTIA, SSCP or similar security certification is preferred.
3. Good understanding of various cryptographic methods and their usage...

Interview Process (Is face to face required?)No

Any additional information you would like to share about the project specs/ nature of work:
Deploy and configure encryption and cryptographic key management solutions such as Vormetric, Client, HPE Voltage, Protegrity, etc. as well as using native encryption.Participate in the encryption product selection process including planning, evaluation, design and implementation.Identify and document use cases for encryption and key management product selection.Participate in the definition and implementation of POCs Proof of Concept around encryption and key management.This role will collabor
Drug test details: No