Curriculum Vitae. Details. Overview. Andrew Kennedy Date of Birth 11 December Phone

Size: px
Start display at page:

Download "Curriculum Vitae. Details. Overview. Andrew Kennedy Date of Birth 11 December 1974. Phone +44 7582 293 255"

Transcription

1 Curriculum Vitae Details Name Andrew Kennedy Date of Birth 11 December 1974 Location Edinburgh Phone Profile Overview 1. Development Environments Enterprise Java with JDK 1.6, ESB and SOA applications with Mule, CXF, Spring and Hibernate, Qpid, Active MQ, and MQ series JMS and AMQP messaging systems, SQL Server, PostgreSQL and Oracle, Web Applications using Tapestry, Struts and Spring MVC 2. Systems Management Web (IIS, Apache, Tomcat, IBM Websphere, Apache Geronimo, JBoss) under Windows and Unix (RedHat Linux and others, Solaris, AIX) 3. Security Engineering Penetration testing, Application security reviews, Security policies, Intrusion detection and incident management, Single sign-on, Cryptography 4. Build Environments Maven, Ant and Maven plugins, Continuous Integration (Hudson/Jenkins and Cruise Control), Automated testing with JUnit, Eclipse IDE, Version control with Git, CVS and Subversion 5. Application Architectures - ESB, SOA and Messaging systems, Web applications, Application servers (Websphere, Geronimo, JBoss, Tomcat), optimization and performance tuning 6. Open Source Apache Software Foundation developer and active Apache Qpid committer I am a skilled Java developer with experience in enterprise application architecture and design using both open source and commercial components, including IBM Websphere, Apache Geronimo, JBoss and Tomcat. I have used Spring MVC, Struts and Tapestry as the main front end technologies, with Spring, Hibernate and EJBs as the middle tier components, as well as web services and XML for interprocess communication. I am able to easily embrace new and important technologies, such as ESB and SOA designs, and have used them in large projects, along with additional technologies such as jbpm, JAXB, CXF and JMS. As part of a technical project team, my particular emphasis is on the engineering and architecture of enterprise software applications, and the production of high quality software using test-driven processes. I am able to document and communicate software designs effectively, and have been part of the high level decision making process on many large applications. I have created and maintained build environments using Maven with continuous integration using Hudson and Continuum, and integrated automated testing suites for both services and user interfaces. My background in Security gives me the ability to produce highly secure applications and to appreciate and mitigate risks effectively. I am an experienced information security consultant, with practical experience of implementing and assessing secure systems. This requires a variety of IT, project management, systems design, risk management and technical skills, which I believe, will be of value to any employer. During my time working in the City of London with the IT and IS departments of major investment banks I have been involved in the design, implementation and rollout of many different pieces of security and banking software. This includes working with, installing, upgrading, maintaining and optimizing operating systems, particularly Solaris, Linux and Windows. I can write programs fluently in C, C++, Perl, Ruby and Python as well as Tcl and other scripting languages, and can also create Unix shell scripts and Windows batch files for system automation.

2 Employment J P Morgan Chase Bank (February 2010 ) Senior Software Engineer I worked a one year contract with the Firmwide Engineering and Architecture department as part of a team maintaining and supporting the Apache Qpid JMS messaging broker, used in many back office and trading applications throughout the bank. Qpid is an open source JMS broker, using the industry standard AMQP protocol between Java,.NET, C++ and python clients and both Java and C++ broker implementations. This involved both supporting production application issues and consulting with application developers on architecture and other issues encountered during development. I also continued the development of Apache Qpid for the 0.6, 0.8 and 0.10 releases, with concurrent internal development based on the 0.5 release. Many features developed for the broker are the result of JPMC internal customer requirements, as well as public requests and discussions on the Apache mailing lists. As part of this work, I became an Apache committer, and have been actively contributing to the Qpid source code and documentation. Large contributions include an implementation of ACLs for the broker, implementing the 0-10 AMQP protocol over Mina transport, rearchitecting the network layer and diagnosing and fixing bugs reported both in the bank and by external users on the Apache JIRA system. As an Apache committer, I liased with Red Hat, Microsoft and other companies, as well as independent developers. I am also active on the public developer and user mailing lists, and have been involved in the SOAP-JMS W3C standards process. This role required an in-depth knowledge of messaging systems, the JMS and AMQP standards, concurrency and threading issues and financial application architectures in order to support and develop the Qpid broker. Yell Adworks (January 2009 January 2010) Software Engineer / Architect I worked a one year contract as part of a team that was developing a new workflow application to replace legacy systems. This application was Java 1.6 based and was built using the Mule ESB with JBoss application server. My responsibilities involved design, architecture and development, including the build process and developer training. My role was to produce the base application infrastructure and framework for further development, assist in implementation of business logic, as well as being a member of the architecture board which had control of all technology and design decisions. The system was designed using the Iconix modeling process using Enterprise Architect and UML, and was use-case driven, with an emphasis on testability. The development model used was an agile testdriven process, and I created a system testing framework for black-box evaluation of the use-cases, using JUnit. I also developed much of the build environment using Maven and the Hudson continuous integration server, and automated deployment of the application and execution of system tests. I created a modular framework for the service layer using Spring 2 and Hibernate 3 with the JBPM workflow engine, which was integrated into the ESB using Active MQ JMS and CXF web services. My team implemented the business logic for the server side of the application, and provided an API for development of client systems using XML messaging based on schemas and JAXB. After the base system was completed and tested, I wrote and presented a series of training sessions for the offshore maintenance teams, to familiarize them with the applications design, development methodology, tools and technologies used. During system development I was also responsible for producing technical documentation and reports on system features and evaluations of design decisions. My final tasks during this handover phase involved performance tuning and analysis of the application. This encompassed SQL query optimization, Hibernate configuration, application profiling and algorithm analysis. CIGNA International (July 2006 December 2008) Senior Enterprise Java Developer page 2 of 7

3 I have been instrumental in setting up the latest iteration of the Companies Internet facing and intranet sites, by moving to a full Java and J2EE based architecture. This involves IBM Websphere application servers (Community Edition, the IBM modified open source versions of Apache Geronimo, both version 1.x and 2.x). The websites run using Tapestry 4.x as a front end, linked to a mid-tier shared by all applications which uses Spring and Hibernate, as well as Apache ActiveMQ for message services. The whole system communicates with a master IBM DB2 database running on an AS/400 which is replicated using the database s native audit trails, negating the need for contention on the actual database tables or having to constantly poll for changed records. I also maintain the company coding standards, and take part in regular code reviews with fellow developers and have also been instrumental in carrying out detailed data forensics work on potentially compromised production machines to ensure damage limitation, working with other developers, Compliance and Legal. Freelance (September 2005 July 2006) Freelance Developer I have been working as a freelance Java, PHP and Web developer, bidding on projects posted on freelance websites such as Rent A Coder and other, similar sites. Projects to date have included writing client software for ebay and Betfair (the latter being an automated robot betting system) as well as websites and web applications using PHP, Struts and JSP services. Most projects are of a short duration (around one month) for individuals with small/home businesses. Most clients have little to no programming skills, so communication of what is and is not possible within the time and monetary constraints available is very important, as is translating their requests into a viable functional specification that can be used as the basis for agreeing deliverables. The nature of this work means that I also write the documentation, including fully commented source code, and translating technical concepts into simple English is essential to properly communicate what has been done. The varied nature of the work means I have learned several new APIs and language features while producing an application, particularly working with web services and XML-RPC. For web applications, I have used XHTML, JavaScript/DOM and CSS to produce interactive (AJAX) layouts and pages, and again this has involved learning a lot of new techniques. Betfair (April August 2005) Security and Fraud Engineer I was employed on a short-term contract to provide application security services and anti-fraud technical support and development. The security work involved application reviews of the Betfair Exchange platform and associated sites and services, producing risk-analysis reports of any exploitable holes or security issues found. My other role involved working with the Fraud team to analyse the transactional database and data warehouse for suspicious transactions, either credit card usage or betting patterns. I developed a J2EE application to interrogate the data warehouse, allowing the fraud analysts to enter queries which were translated into SQL and produced a report on suspicious or linked accounts. Additionally, scripts were developed to allow the Unix team to match parts of the Web server logs to betting transactions in the database, to allow searching by IP addresses and other information not stored in the data warehouse. I also investigated vendors of fraud analytics software to try and find a commercial solution to reduce the chargeback ratio (from stolen credit card fraud) to acceptable levels, however the industry is not very mature and the project was cancelled. Critical Spark (May November 2004) J2ME Development and Consulting I carried out development and testing work using J2ME as part of a project to develop game software for Nokia mobile phones. This gave me a good grounding in the J2ME Java APIs and programming techniques. I also implemented the obfuscation and anti-reverse-engineering mechanisms used to protect the final game. The company involved was a small Edinburgh based start-up. page 3 of 7

4 Royal Bank of Scotland Group (April May 2004) Security Consultant, Penetration Testing I was employed by the Investigation and Threat Management team, as part of the Royal Bank of Scotland Group Information Security department. My main responsibilities are for Penetration Testing and Vulnerability Assessment, and secondary duties include Alert management, Forensic examinations in support of fraud and misconduct investigations and acting in an advisory capacity on general threats to the Group IT infrastructure. I manage the day to day running of the contacts with external penetration testing service providers, and control and supervise any third party security testing that occurs on Group systems. This includes the technical review and management of a pool of suppliers to determine those most suitable to provide services to the Bank. I also carry out penetration tests of internal systems that do not warrant a third party test. This involves usage of a comprehensive suite of tools, from vulnerability scanners to network mapping utilities, web protocol analysers and active proxies for HTTP modification, and custom scripts to perform ad-hoc testing or one-off tasks. Vulnerability analysis of systems is carried out using automated tools, which I manage and control, generating reports and statistics about the overall security posture of the externally facing Group systems. I have attended training courses on the encase Forensic software, as used by most Police forces in the UK and other countries. This is used to perform forensic examinations of PCs in support of internal investigations into employee misconduct or fraud. Freelance (January 2002 February 2003) Freelance Java Developer I worked as a freelance Java developer. I have completed several projects for small business clients in the Edinburgh area. These include custom add-on packages for Sage Accounting and Payroll systems and visualisation software for industrial dataloggers, using Java 2 with Swing and JDBC. ABN Amro Bank (November 2001 January 2002) Security Engineer / Developer I worked part time as a developer, taking over an existing in house project to augment the monthly and weekly Intrusion Detection reports. This performed network state monitoring and information gathering to provide additional information in a report designed to aid vulnerability assessment. The software used Unix tools such as Whisker and Nessus, and Perl and Shell scripting to scan the Bank s systems and networks, and collate and process the information to produce a weekly HTML report, detailing any changes to the network state and highlighting security issues discovered. This informed both senior management as well as network and system administrators, who were able to obtain detailed information about specific issues. I completely rewrote the existing codebase to make the scanner modular, allowing plug-ins to be added for new scanning or monitoring tools. I also created a file based configuration system, which allowed individual scans to be described using a simple scripting language, thereby allowing scans and reports to be pre-defined and saved. ABN Amro Bank (May 2001 October 2001) Senior Security Consultant I was part of the Global Information Security Department, working as a Senior Security Consultant. I was responsible for Risk Analysis for several projects assigned to the Security Consulting Group. This primarily involved carrying out Risk Assessments against Systems, both new, during implementation, in development and existing projects as part of an audit and review process. My main responsibility was for Risk Assessment of the Global Equities Toolkit project, a Client Relationship Management System using Siebel and Oracle on HP-UX and NT, that was being deployed and rolled out in London, Singapore and North America. I worked closely with the project management team, liasing with the acceptance testing and quality assurance staff to integrate security assessments, tests and metrics into their testing program. At each stage of the project I carried out a series of security tests, including database and system penetration tests, network and operating system vulnerability scanning, user account and role auditing and a review of operating, administration and page 4 of 7

5 user processes and procedures. I produced the Risk Assessment reports and checklists to record the level of compliance with the Bank s policies and standards. This documentation was used to inform the further stages of development of the system and to improve the security until full compliance with the required policies was achieved. I also carried out Risk Assessments of Web applications, including a Java Enterprise (J2EE) powered Loan Pricing System, and outsourced Document Management System for OTC Derivatives Contracts and a Portfolio Management Tool. These systems were being developed for various Business Units within the bank, however I also assessed individual Infrastructure components and systems, including one of the Internet Banking Gateways and its associated Firewall and Router systems, and several Oracle and SQL Server database applications. As part of the Penetration Testing team I carried out testing and attacks against Bank systems to determine their susceptibility to compromise by malicious internal and external threat agents. To do this I used both commercial software, such as ISS Internet and Database Scanner, free tools such as NMAP and Nessus, publicly available and custom written exploits and attack scripts and several of my own tools developed in house. Systems tested included Lotus Domino Web servers, Microsoft IIS Web servers, Databases, UNIX, Windows NT and 2000 servers and network infrastructure (routers) and Firewalls. I used the information obtained during the testing process to produce documentation of the details of systems compromised, weaknesses detected and vulnerabilities exploited, and worked with the System Administrators to secure any vulnerable systems. In a reactive role, I was involved in Incident Response and Forensics, in particular during large-scale worm attacks, such as the recent Code Red and Nimda attacks. During these attacks, I carried out damage assessment and limitation. This involved detecting infected systems and then disinfecting and recovering data, using software and scanners I have written for each specific attack. I also contributed to the development of the CIRT Incident Response plan, which was updated due to the additional threats posed by such Internet worm attacks, and produced reports and a white paper outlining strategies and technological solutions for future security issues the Bank might face. Deutsche Bank (May December 2000) Security Engineer I was project lead for the design, implementation and deployment of the bank s security monitoring infrastructure, using Axent Enterprise Security Manager. This involved a global rollout of the ESM agent software and regional implementations of the security management systems. I also installed a pilot version of UNIX Privilege Manager, a distributed version of SUDO, which was used to broker privileged access requests from developers on production systems. I carried out research into a host-based intrusion detection system for the bank, which included evaluations of current commercial and military systems, including CyberSafe Centrax, ISS RealSecure System Agent, SRI International project EMERALD and Litton PRC Précis. This evaluation produced a set of formal requirements for testing and comparing security systems which are used as a model for product evaluation. I worked on the bank s UNIX and other security standards and policies, and used ESM to bring systems into compliance with these documents using automated scripts to patch systems and upgrade security settings. This also involved vulnerability research and allowed me to pre-emptively secure systems against potential compromise. ScotiaMocatta and Bank of Nova Scotia (August April 1999) Trade Systems Support My main role was technical support and systems administration of the ScotiaMocatta Unix servers and PC systems and support and project work for Unix systems in Bank of Nova Scotia London. As well as this, I have been involved in several projects within ScotiaMocatta. I was the technical manager of a project to transfer the trading system used by ScotiaMocatta from an IBM RS/6000 AIX platform to a Sun Enterprise Server Solaris platform. This involved copying a UniVerse database system and all trade data from one machine to another, overseeing the installation of the trading software by the vendor, rewriting the database and system maintenance scripts, reworking the user administration procedures and documenting the operational changes. In addition I implemented a user acceptance and integration testing platform where all vendor supplied code page 5 of 7

6 changes could be tested before being moved to the production systems. This platform is also used for disaster recovery and hot standby purposes. I integrated ScotiaMocatta s user, password and host database with Bank of Nova Scotia London s NIS and DNS servers and installed DNS and NIS servers at ScotiaMocatta. I was also part of a team that migrated the PC systems from Novell NetWare to Windows NT. This involved installation and rollout of Windows NT Workstation on the desktop, via automated installation procedures that I created, conversion of PC systems that used Novell to NT and transfer of all user files and programs to the NT server. Prior to an internal audit, I compiled a procedures manual for the MIS department and reworked the company business resumption plan as part of a disaster recovery implementation programme. Integrated Technology Services (April August 1998) I developed a suite of Windows NT tools and utilities to manage security policies on networked Windows NT machines using Microsoft Visual C++ and the MFC library. This included Enforcer, a graphical NT security management solution, which is used by NatWest Markets. NatWest Markets (October April 1998) I was part of a security team responsible for securing Unix hosts after an external audit. This involved installing and implementing Axent ESM policies, as well as creating scripts to patch common Unix security flaws. I also developed a secure anonymous FTP application to allow secure file transfers between business groups. Reuters (March October 1997) I was part of the Product Acceptance Group, involved in quality assurance and acceptance testing of the Reuters 3000 financial information products. In addition, I was responsible for day to day management of the test laboratory network of Windows NT and Sun Solaris workstations, which involved installation of operating systems and pre-release versions of Reuters software. I was also responsible for co-ordinating the testing of the Reuters Discovery project, a cross platform Unix and Windows NT historical market data application. This involved liasing with the software development teams and developing and implementing a test strategy. Standard Chartered Bank (January March 1997) I was responsible for the security of the base metals and bullion trading settlement system. This ran on AIX platforms, using CA UniCenter security management software, and Axent ESM for ongoing security assessment and auditing. During this contract I documented and fixed security vulnerabilities found by ESM and other analysis tools, both in the base Unix operating system, the trading software and the CA UniCenter set-up. I also re-implemented the security rules for the system and documented a set of system management procedures to maintain the required level of security using ESM s reporting facilities and custom tools. Research Systems (July August 1996) I was part of a small team that designed and implemented the Web site for the TUC Congress in September 1995 and the Labour Party conference in October This involved creating a generic Virtual Conference Web server on a Unix workstation. I created CGI scripts in PERL to display dynamic information about the conferences and implemented a bulletin board system on the server where visitors to the conference could leave comments. I was also involved in the design of the HTML and the visual look and feel of the sites. I managed the installation and maintenance of a temporary Web server and Internet connection at the Brighton Conference Centre during both events and liased with the Labour Party and TUC information services units to ensure accurate and up-to-date information was presented on the Server. I was also involved in the set-up and maintenance of a temporary cyber café network at both events, including cable installation and network administration. I have been involved in the creation of a permanent Web presence for the Trades Unions Congress. This involved the creation of a Virtual Building stored in a SQL Server database, with no actual HTML code present as part of the server. I designed and implemented the SQL database and created a suite page 6 of 7

7 of CGI programs to access it and render the contents as HTML. This included a search mechanism and an automated system to add non-html documents to the server. Education Edinburgh University (October July 1995) I gained a BSc degree in Computer Science and Artificial Intelligence. The course covered programming in C and ML, and was based on an algorithmic approach to problem solving. Other elements of the course covered computer design, operating system design and implementation, mathematical applications of computing and analysis of algorithms. Artificial Intelligence techniques covered included expert systems, neural networks, genetic algorithms, predicate logic and proof systems, knowledge discovery and data-mining. As part of the third year of the course, I undertook a large scale team project involving the design and implementation of a security camera monitoring application in both software and hardware, where I was responsible for the coding of the GUI using OSF/Motif. Abronhill High School (August May 1992) I passed the following Highers at A grade: Mathematics, English, Chemistry, Physics and Computer Studies. page 7 of 7

DTWMS Required Software Engineers. 1. Senior Java Programmer (3 Positions) Responsibilities:

DTWMS Required Software Engineers. 1. Senior Java Programmer (3 Positions) Responsibilities: DTWMS Required Software Engineers 1. Senior Java Programmer (3 Positions) Responsibilities: Responsible to deliver quality software solutions using standard end to end software development cycle Collaborate

More information

JAVA/J2EE DEVELOPER RESUME

JAVA/J2EE DEVELOPER RESUME 1 of 5 05/01/2015 13:22 JAVA/J2EE DEVELOPER RESUME Java Developers/Architects Resumes Please note that this is a not a Job Board - We are an I.T Staffing Company and we provide candidates on a Contract

More information

OXAGILE RESUMES SUMMARY OF QUALIFICATIONS TECHNICAL SKILLS SENIOR JAVA SOFTWARE ENGINEER

OXAGILE RESUMES SUMMARY OF QUALIFICATIONS TECHNICAL SKILLS SENIOR JAVA SOFTWARE ENGINEER OXAGILE RESUMES SENIOR JAVA SOFTWARE ENGINEER SUMMARY OF QUALIFICATIONS Over 4 years of solid experience in software development, application programming and engineering Strong expertise in J2EE architectures,

More information

Brian Agnew, OOPS Consultancy Ltd Mobile: +44 (7720) 397526 Email: brian@oopsconsultancy.com http://www.oopsconsultancy.

Brian Agnew, OOPS Consultancy Ltd Mobile: +44 (7720) 397526 Email: brian@oopsconsultancy.com http://www.oopsconsultancy. Brian Agnew, OOPS Consultancy Ltd Mobile: +44 (7720) 397526 Email: brian@oopsconsultancy.com http://www.oopsconsultancy.com May 2015 Profile: A senior developer / team lead / architect with a proven record

More information

WELCOME TO Open Source Enterprise Architecture

WELCOME TO Open Source Enterprise Architecture WELCOME TO Open Source Enterprise Architecture WELCOME TO An overview of Open Source Enterprise Architecture In the integration domain Who we are Fredrik Hilmersson Petter Nordlander Why Open Source Integration

More information

GRAD Analytics Advanced price and promotional analysis interface. Reactive UI providing dimensional visibility to marketing analysis.

GRAD Analytics Advanced price and promotional analysis interface. Reactive UI providing dimensional visibility to marketing analysis. SUMMARY I am a developer with 21 years of experience in designing and building object-oriented software beginning with C++ and Smalltalk in 1991. I ve been an independent Java/EE consultant since 1996.

More information

Windows 2000 / NT 4.0 / 95 / 98, MS-DOS, Suse Operating Systems

Windows 2000 / NT 4.0 / 95 / 98, MS-DOS, Suse Operating Systems Name : Z A B Phone : 1-847-530-7013 Email : consultants@webspherehatsguru.com SUMMARY One & half year experience of technical experience in complete software development life cycle process which includes

More information

Additional Offeror Qualifications: Not applicable.

Additional Offeror Qualifications: Not applicable. Category 1: IBM Host Systems Support Services shall include configuration design, installation, maintenance, modification, monitoring and/or evaluation of operating systems and secondary support software

More information

Integrigy Corporate Overview

Integrigy Corporate Overview mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview Integrigy Overview Integrigy Corporation

More information

Curriculum Vitae 12/12/12

Curriculum Vitae 12/12/12 Curriculum Vitae 12/12/12 Name: Rupert Edward JONES Email: rup@rupertjones.com Nationality: British and Australian Citizen Skills Summary Intelligent and experienced software developer, published author

More information

AngularJS, Javascript, Prototype-based OO concept, RESTful Design Pattern, GWT, HTML5, Database.

AngularJS, Javascript, Prototype-based OO concept, RESTful Design Pattern, GWT, HTML5, Database. Position Code Role Skillsets Years of Experience TPM01 Senior Back End Application Developer Enterprise Architecture, Java EE, Java Spring Framework, Design Pattern, SOA, JPA, OSGI, Linux, Maven, Tomcat,

More information

Information Technology Services Classification Level Range C Reports to. Manager ITS Infrastructure Effective Date June 29 th, 2015 Position Summary

Information Technology Services Classification Level Range C Reports to. Manager ITS Infrastructure Effective Date June 29 th, 2015 Position Summary Athabasca University Professional Position Description Section I Position Update Only Information Position Title Senior System Administrator Position # 999716,999902 Department Information Technology Services

More information

Java/J2EE or Web Developer. Formal Education. Technical knowledge. Spoken Languages

Java/J2EE or Web Developer. Formal Education. Technical knowledge. Spoken Languages Jonathan ROUSSEAU 27 years old (3 rd of February 1983) Bruyères, 15/A 4950 Waimes +32 (473) 69 82 42 Jrousseau.webco@gmail.com http://www.jrousseau.be Java/J2EE or Web Developer Formal Education 2000:

More information

Strong experience in drafting Test Plan, Test Strategy, Test Estimation, Test Cases, Requirement Matrix, Audit and Test Results documents

Strong experience in drafting Test Plan, Test Strategy, Test Estimation, Test Cases, Requirement Matrix, Audit and Test Results documents 1 KIRAN BADI MOBILE : 6462013101 EMAIL: KIRAN_BADI@HOTMAIL.COM PROFESSIONAL SUMMARY 9+ Years as a Performance Engineer and around 3 years as J2EE Developers with total 12 + years of IT Experiences.5 +

More information

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription

More information

Project Manager 1 Post == Experience 10-12 years in Project Management in reputed company, Salary Rs.1,20,000/-

Project Manager 1 Post == Experience 10-12 years in Project Management in reputed company, Salary Rs.1,20,000/- Project Manager 1 Post == Experience 10-12 years in Project Management in reputed company, Salary Rs.1,20,000/- Senior Soft ware Developer 2 Posts Junior Soft ware Developer 4 Posts Database Administrator

More information

Symantec Security Information Manager Version 4.7

Symantec Security Information Manager Version 4.7 Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM

More information

MicroStrategy Course Catalog

MicroStrategy Course Catalog MicroStrategy Course Catalog 1 microstrategy.com/education 3 MicroStrategy course matrix 4 MicroStrategy 9 8 MicroStrategy 10 table of contents MicroStrategy course matrix MICROSTRATEGY 9 MICROSTRATEGY

More information

Migration and Developer Productivity Solutions Retargeting IT for Emerging Business Needs

Migration and Developer Productivity Solutions Retargeting IT for Emerging Business Needs Migration and Developer Productivity Solutions Retargeting IT for Emerging Business Needs Charles Finley Transformix Computer Corporation Who We Are Transformix provides software solutions and services

More information

How To Use Ibm Tivoli Composite Application Manager For Response Time Tracking

How To Use Ibm Tivoli Composite Application Manager For Response Time Tracking Track transactions end to end across your enterprise to drive fast response times and help maintain high customer satisfaction IBM Tivoli Composite Application Manager for Response Time Tracking Highlights

More information

Diploma in Computer Science

Diploma in Computer Science SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: CN5191 Senior Linux Engineer British 22 years RedHat Certified Engineer Diploma in Computer

More information

QA AUTOMATION - DEVELOPER ADVANCED TESTING TOOLS. 30 years old - 6 years of experience

QA AUTOMATION - DEVELOPER ADVANCED TESTING TOOLS. 30 years old - 6 years of experience Victor B. QA AUTOMATION - DEVELOPER ADVANCED TESTING TOOLS 30 years old - 6 years of experience Business expertise: Languages: Software editors Romanian (Native speaker), Russian (Advanced), English (Advanced),

More information

ENGINEER - DEVELOPER ADVANCED JAVA. 28 years old - 7 years of experience

ENGINEER - DEVELOPER ADVANCED JAVA. 28 years old - 7 years of experience Alexandru A. ENGINEER - DEVELOPER ADVANCED JAVA 28 years old - 7 years of experience Business expertise: Languages: Certifications: Software editors Romanian (Native speaker), English (Advanced), Russian

More information

JBOSS ENTERPRISE APPLICATION PLATFORM MIGRATION GUIDELINES

JBOSS ENTERPRISE APPLICATION PLATFORM MIGRATION GUIDELINES JBOSS ENTERPRISE APPLICATION PLATFORM MIGRATION GUIDELINES This document is intended to provide insight into the considerations and processes required to move an enterprise application from a JavaEE-based

More information

Accenture Software. ALIP Technical Presentation

Accenture Software. ALIP Technical Presentation Accenture Software ALIP Technical Presentation Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Technology/Architecture Primary Features/Design Principles Customizable Business

More information

Guardium Change Auditing System (CAS)

Guardium Change Auditing System (CAS) Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above. ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that

More information

Senior Oracle Developer Call us today to schedule this resource. CORP: (214) 245-4580. CENDIEN http://www.cendien.com

Senior Oracle Developer Call us today to schedule this resource. CORP: (214) 245-4580. CENDIEN http://www.cendien.com Senior Oracle Developer Cendien Oracle Experts Oracle Professional Services Over Nine years of experience in IT as a Oracle Developer providing extensive support in analysis, design, development, testing

More information

138 To satisfy a prerequisite, the student must have earned a letter grade of A, B, C or CR in the prerequisite course, unless otherwise stated.

138 To satisfy a prerequisite, the student must have earned a letter grade of A, B, C or CR in the prerequisite course, unless otherwise stated. Computer Science and Information Systems: Information Technology - Networking CSIT 131 Word (1) (Formerly CSIS 127) Word word processing software. Prepares individuals who are seeking to become a Microsoft

More information

CAREER OPPORTUNITIES

CAREER OPPORTUNITIES CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the

More information

SUMMARY CURRICULUM VITAE J. Andries

SUMMARY CURRICULUM VITAE J. Andries Imogiri Dijkhof 18 6715 DX Ede 06 3309 5046 Info @ Imogiri.nl www.imogiri.nl KvK: 51566028 SUMMARY CURRICULUM VITAE J. Andries Profiel Jurjen Andries is a senior Java consultant. In addition to his JEE

More information

IT Application Support Engineer (Database, Web & User)

IT Application Support Engineer (Database, Web & User) IT Application Support Engineer (Database, Web & User) Analysis, design, implementation, and testing of web-shared databases. These databases are mainly administrative oriented and are used to support

More information

JUSTIN J. LITTLE Build and Release Engineer

JUSTIN J. LITTLE Build and Release Engineer JUSTIN J. LITTLE Build and Release Engineer TECHNICAL SKILLS Build and deploy automation with ANT, Maven. Continuous Integration, build server setup and management Business process analysis, build and

More information

Education Institute Year Graduated

Education Institute Year Graduated Resume Personal Data Name / Gender Jamie Craane / Male Date of Birth 25 October 1978 City Berghem Roles Software Engineer / Software Architect Member of the board of the Dutch Flex Used Group ICT experience

More information

JBoss Enterprise Middleware

JBoss Enterprise Middleware JBoss Enterprise Middleware The foundation of your open source middleware reference architecture Presented By : Sukanta Basak Red Hat -- Vital Statistics Headquarters in Raleigh, NC Founded in 1993 Over

More information

Appendix A-2 Generic Job Titles for respective categories

Appendix A-2 Generic Job Titles for respective categories Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide

More information

Microsoft Technologies

Microsoft Technologies NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use

More information

Managed Services Portfolio. MindCraft Software Pvt. Ltd.

Managed Services Portfolio. MindCraft Software Pvt. Ltd. MindCraft Software Pvt. Ltd. 2011 managed services We at MindCraft believe in a Partnership Engagement Model and endeavor to be an extension of your team, while we strive to deliver value to you and your

More information

Complete Assessment Catalog

Complete Assessment Catalog Complete Assessment Catalog 2015 www.reviewnet.net Flex Spec Multi-Topic Customized Assessments FlexSpec Assessments allow you to easily create customized assessments choosing the from over 160 different

More information

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19 3-Tier Architecture Prepared By Channu Kambalyal Page 1 of 19 Table of Contents 1.0 Traditional Host Systems... 3 2.0 Distributed Systems... 4 3.0 Client/Server Model... 5 4.0 Distributed Client/Server

More information

Access Management Analysis of some available solutions

Access Management Analysis of some available solutions Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available

More information

The future of middleware: enterprise application integration and Fuse

The future of middleware: enterprise application integration and Fuse The future of middleware: enterprise application integration and Fuse Giuseppe Brindisi EMEA Solution Architect/Red Hat AGENDA Agenda Build an enterprise application integration platform that is: Resilient

More information

THE OPEN SOURCE DEVELOPER REPORT

THE OPEN SOURCE DEVELOPER REPORT THE OPEN SOURCE DEVELOPER REPORT 2011 ECLIPSE COMMUNITY SURVEY JUNE 20 11 EXECUTIVE SUMMARY Eclipse is a large, vibrant, well-established open source community with over 200 open source projects, close

More information

Communiqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform

Communiqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform Communiqué 4 Standardized Communiqué 4 - fully implementing the JCR (JSR 170) Content Repository Standard, managing digital business information, applications and processes through the web. Communiqué

More information

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) Computer Science (COSC) courses are offered by the School of Information Arts and Technologies within the Yale Gordon College of Liberal Arts.

More information

John Smith Prattville, AL career@hashbangsecurity.com

John Smith Prattville, AL career@hashbangsecurity.com John Smith Prattville, AL career@hashbangsecurity.com Career Objective I am a certified and skilled senior security and UNIX systems administrator with over twenty years of experience. I am seeking a position

More information

UBS Training Course Catalog

UBS Training Course Catalog 2014 COURSE CATALOG SECURITY COURSES Advanced Ethical Hacking Secure Android Development Secure ios Development C/C++ Programming Security Complete Windows Security Cryptography Overview Designing Secure

More information

IBM Tivoli Monitoring for Databases

IBM Tivoli Monitoring for Databases Enhance the availability and performance of database servers IBM Tivoli Monitoring for Databases Highlights Integrated, intelligent database monitoring for your on demand business Preconfiguration of metric

More information

Steve Brammer. Profile Name Steve Brammer IT Consultant Date of Birth 1967-09-03 Marital Status Single

Steve Brammer. Profile Name Steve Brammer IT Consultant Date of Birth 1967-09-03 Marital Status Single CV Steve Brammer Profile Name Steve Brammer Title IT Consultant Date of Birth 1967-09-03 Marital Status Single Description Steve has deep knowledge and has worked extensively as an architect, designer

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Lotus Domino Security

Lotus Domino Security An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware

More information

Michael Bösch. EDV-Consulting. Dipl. Informatiker (FH)

Michael Bösch. EDV-Consulting. Dipl. Informatiker (FH) Michael Bösch Dipl. Informatiker (FH) EDV-Consulting Äußeres Pfaffengäßchen 11B 86152 Augsburg Germany Tel.: +49-821-4206523 Fax: +49-821-4206524 Mobil: +49-172-8628736 E-Mail: boesch@boesch-it.de Home-Page:

More information

Programming Languages

Programming Languages Generalist/Senior Developer DOB: July 19, 1978. Marital Status: Married. P: +64 (0) 21 204 5763 Email: kiwijob@icloud.com Location: Te Atatu, Auckland, 0610, NZ. Languages: English: IELTS 7.5 Spanish:

More information

Fundamentals of Network Security - Theory and Practice-

Fundamentals of Network Security - Theory and Practice- Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring

More information

Rocket AS v6.3. Benefits of upgrading

Rocket AS v6.3. Benefits of upgrading Rocket AS v6.3 Benefits of upgrading What is Rocket AS? Rocket AS for IBM System z provides query, reporting, data visualization and rapid application development for System z data including DB2. With

More information

Internet Engineering: Web Application Architecture. Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007

Internet Engineering: Web Application Architecture. Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007 Internet Engineering: Web Application Architecture Ali Kamandi Sharif University of Technology kamandi@ce.sharif.edu Fall 2007 Centralized Architecture mainframe terminals terminals 2 Two Tier Application

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

Threat Modelling for Web Application Deployment. Ivan Ristic ivanr@webkreator.com (Thinking Stone)

Threat Modelling for Web Application Deployment. Ivan Ristic ivanr@webkreator.com (Thinking Stone) Threat Modelling for Web Application Deployment Ivan Ristic ivanr@webkreator.com (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /

More information

SCHOOL DISTRICT OF ESCAMBIA COUNTY

SCHOOL DISTRICT OF ESCAMBIA COUNTY SCHOOL DISTRICT OF ESCAMBIA COUNTY JOB DESCRIPTION Programmer Analyst I Web Technologies PROGRAMMER ANALYST I WEB TECHNOLOGIES QUALIFICATIONS: (1) Bachelor s Degree from an accredited educational institution

More information

Certificate in Web Development and Administration

Certificate in Web Development and Administration Certificate in Web Development and Administration This course contains the following modules: Web Development and Administration IT-03D Web Development IT-03E Web Administration After successfully completing

More information

Client/server is a network architecture that divides functions into client and server

Client/server is a network architecture that divides functions into client and server Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate

More information

IS Careers. MIS 4133 Software Systems

IS Careers. MIS 4133 Software Systems IS Careers MIS 4133 Software Systems Outline CS and MIS Salaries Core competencies Hot technical skills IS job titles Employment outlook Careers in CS and MIS Computer Science Focuses on the development

More information

NETWORK PENETRATION TESTING

NETWORK PENETRATION TESTING Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 Twest@timwestconsulting.com OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes

More information

Adobe Systems Incorporated

Adobe Systems Incorporated Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...

More information

Network Test Labs (NTL) Software Testing Services for igaming

Network Test Labs (NTL) Software Testing Services for igaming Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs

More information

DBMS Infrastructures and IT Career Recommendations. Jeff Fineberg November 21, 2011

DBMS Infrastructures and IT Career Recommendations. Jeff Fineberg November 21, 2011 DBMS Infrastructures and IT Career Recommendations Jeff Fineberg November 21, 2011 Topics Importance of Databases Security Computing Environments / Infrastructures Methodologies for Data access Database

More information

APPLICATION MANAGEMENT SUITE FOR SIEBEL APPLICATIONS

APPLICATION MANAGEMENT SUITE FOR SIEBEL APPLICATIONS APPLICATION MANAGEMENT SUITE FOR SIEBEL APPLICATIONS USER EXPERIENCE MANAGEMENT SERVICE LEVEL OBJECTIVE REAL USER MONITORING SYNTHETIC USER MONITORING SERVICE TEST KEY PERFORMANCE INDICATOR PERFORMANCE

More information

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange

More information

ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS)

ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS) ManageEngine (division of ZOHO Corporation) www.manageengine.com Infrastructure Management Solution (IMS) Contents Primer on IM (Infrastructure Management)... 3 What is Infrastructure Management?... 3

More information

IBM WebSphere MQ File Transfer Edition, Version 7.0

IBM WebSphere MQ File Transfer Edition, Version 7.0 Managed file transfer for SOA IBM Edition, Version 7.0 Multipurpose transport for both messages and files Audi logging of transfers at source and destination for audit purposes Visibility of transfer status

More information

Curriculum Vitae. Personal information. Chamara Suseema Withanachchi. Desired employment / Occupational field. IBM i RPG Programmer (AS/400)

Curriculum Vitae. Personal information. Chamara Suseema Withanachchi. Desired employment / Occupational field. IBM i RPG Programmer (AS/400) Curriculum Vitae Personal information First name(s) / Surname(s) Address Flat No 503, S. S. Lootha Building, King Fizal Road Sharjah (United Arab Emirates) Telephone(s) + 971 6 5730339 Mobile + 971 50

More information

Put a Firewall in Your JVM Securing Java Applications!

Put a Firewall in Your JVM Securing Java Applications! Put a Firewall in Your JVM Securing Java Applications! Prateep Bandharangshi" Waratek Director of Client Security Solutions" @prateep" Hussein Badakhchani" Deutsche Bank Ag London Vice President" @husseinb"

More information

SALARY SURVEY 2014. Technology. Specialists in technology recruitment www.michaelpage.com.tr. Technology

SALARY SURVEY 2014. Technology. Specialists in technology recruitment www.michaelpage.com.tr. Technology SALARY SURVEY 2014 Technology Technology Specialists in technology recruitment www.michaelpage.com.tr Technology Salary Survey 2014 CEO S LETTER Dear Customers, We are pleased to present our Technology

More information

SOSFTP Managed File Transfer

SOSFTP Managed File Transfer Open Source File Transfer SOSFTP Managed File Transfer http://sosftp.sourceforge.net Table of Contents n Introduction to Managed File Transfer n Gaps n Solutions n Architecture and Components n SOSFTP

More information

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

Architecture Summary. Prepared by Architecture Working Group. Goals and summary: April 4, 2012 Updated recommendation: Nov 7, 2013

Architecture Summary. Prepared by Architecture Working Group. Goals and summary: April 4, 2012 Updated recommendation: Nov 7, 2013 Architecture Summary Prepared by Architecture Working Group Goals and summary: April 4, 2012 Updated recommendation: Nov 7, 2013 Original Goals! Document Current IT Infrastructure! High-level Architecture

More information

THE OPEN SOURCE DEVELOPER REPORT

THE OPEN SOURCE DEVELOPER REPORT THE OPEN SOURCE DEVELOPER REPORT 2009 ECLIPSE COMMUNITY SURVEY M A Y 2 0 0 9 COPYRIGHT 2009 THE ECLIPSE FOUNDATION ALL RIGHTS RESERVED THIS WORK I S LIC EN SE D UND ER TH E C RE ATI VE COMMON S ATTRIBUT

More information

Tri-Force Consulting Services, Inc. Case Studies

Tri-Force Consulting Services, Inc. Case Studies Tri-Force Consulting Services, Inc. Case Studies Tri-Force s Model Addresses Application Outsourcing and System Integration Application Development Application Management Maintenance, Enhancements, Re-engineering

More information

PL/SQL. JSP Java Script. Struts JSF EJB 2.1. Hibernate. JBoss RichFaces EJB 3

PL/SQL. JSP Java Script. Struts JSF EJB 2.1. Hibernate. JBoss RichFaces EJB 3 Kushan Jayathilake Mobile: +94773854927 Email: kushanxp@gmail.com Sri Lanka Highly motivated individual, equipped with outstanding technical skills on especially on Java related technologies. Maintains

More information

This document gives an outline of Tim Ward s work on mobile phone systems 2002 2012.

This document gives an outline of Tim Ward s work on mobile phone systems 2002 2012. MOBILE PHONE SYSTEMS Tim Ward, Brett Ward Limited, 11/4/2012 This document gives an outline of Tim Ward s work on mobile phone systems 2002 2012. Details of some work for the security industry are omitted.

More information

Modern Software Development Tools on OpenVMS

Modern Software Development Tools on OpenVMS Modern Software Development Tools on OpenVMS Meg Watson Principal Software Engineer 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Topics

More information

State of New Jersey Shared IT Architecture

State of New Jersey Shared IT Architecture J2EE Deployment Policy State of New Jersey Shared IT Architecture J2EE Application Deployment Policy and Procedures July 2007 J2EE Deployment Policy Table of Contents Overview 3 Key Roles and Responsibilities.

More information

Case Study - I. Industry: Social Networking Website Technology : J2EE AJAX, Spring, MySQL, Weblogic, Windows Server 2008.

Case Study - I. Industry: Social Networking Website Technology : J2EE AJAX, Spring, MySQL, Weblogic, Windows Server 2008. Case Study - I Industry: Social Networking Website Technology : J2EE AJAX, Spring, MySQL, Weblogic, Windows Server 2008 Challenges The scalability of the database servers to execute batch processes under

More information

IBM Rational Web Developer for WebSphere Software Version 6.0

IBM Rational Web Developer for WebSphere Software Version 6.0 Rapidly build, test and deploy Web, Web services and Java applications with an IDE that is easy to learn and use IBM Rational Web Developer for WebSphere Software Version 6.0 Highlights Accelerate Web,

More information

How To Ensure The C.E.A.S.A

How To Ensure The C.E.A.S.A APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration

More information

PRINCIPAL JAVA ARCHITECT JOB ID: WD001087

PRINCIPAL JAVA ARCHITECT JOB ID: WD001087 PRINCIPAL JAVA ARCHITECT JOB ID: WD001087 The Principal Java Architect will lead/participate in the design, development, maintenance, and enhancements of worldwide business applications and Westum Products.

More information

IBM Rational Asset Manager

IBM Rational Asset Manager Providing business intelligence for your software assets IBM Rational Asset Manager Highlights A collaborative software development asset management solution, IBM Enabling effective asset management Rational

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

Patent Public Advisory Committee Meeting PE2E Status. David Landrith Patents Portfolio Manager July 14, 2011

Patent Public Advisory Committee Meeting PE2E Status. David Landrith Patents Portfolio Manager July 14, 2011 Patent Public Advisory Committee Meeting PE2E Status David Landrith Patents Portfolio Manager July 14, 2011 PE2E Timeline 2 Front-End Summary Integrated front-end design & implementation Initial front-end

More information

Current Vacancies. UK & South Africa. This document contains both Permanent & Contract roles.

Current Vacancies. UK & South Africa. This document contains both Permanent & Contract roles. Current Vacancies UK & South Africa This document contains both Permanent & Contract roles. To apply for any of the roles please email your CV and covering letter: Email: resourcing@ecs.co.uk Or call our

More information

capabilities statement

capabilities statement capabilities statement GSA Schedule 70 Contract Holder: Contract #: GS-35F-0649Y Duns#: 824940121 Cage Code#: 6B5K3 SIN Codes: 132-34 Maintenance of Software 132-51 Information Technology Professional

More information

Basic TCP/IP networking knowledge of client/server concepts Basic Linux commands and desktop navigation (if don't know we will cover it )

Basic TCP/IP networking knowledge of client/server concepts Basic Linux commands and desktop navigation (if don't know we will cover it ) About Oracle WebLogic Server Oracle WebLogic Server is the industry's best application server for building and deploying enterprise Java EE applications with support for new features for lowering cost

More information

JBoss EntErprisE ApplicAtion platform migration guidelines www.jboss.com

JBoss EntErprisE ApplicAtion platform migration guidelines www.jboss.com JBoss Enterprise Application Platform Migration Guidelines This document is intended to provide insight into the considerations and processes required to move an enterprise application from a JavaEE-based

More information

SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT

SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT SoftSol s platform-independent, scalable Business Management (BPM) solution, powered by Newgen technology, enables automation of business processes which can be integrated with any other external applications.

More information

Net Developer Role Description Responsibilities Qualifications

Net Developer Role Description Responsibilities Qualifications Net Developer We are seeking a skilled ASP.NET/VB.NET developer with a background in building scalable, predictable, high-quality and high-performance web applications on the Microsoft technology stack.

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010 Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system

More information