Accenture Awarded Contract To Support University of Michigan’s Information Technology Transformation Program

May 27, 2010

RESTON, Va.; May 27, 2010 – The University of Michigan has selected Accenture (NYSE: ACN) to conduct its first-ever comprehensive assessment of information technology at the unit and campus levels. The assessment is part of the first phase of NextGen Michigan, a multi-year university-wide IT transformation effort.

The primary objective of the assessment is to develop an authoritative view of how IT is distributed and provided across the university. All of the university’s schools, colleges, major research and administrative centers and institutes, and the central IT group Information and Technology Services (ITS) are participating. The University is seeking to rationalize its IT services with the goal of identifying sustainable and recurring IT cost savings and reinvesting a portion of the savings into the school’s strategic priorities.  This will improve the interoperability of applications, products and services across campuses, and to achieve faster deployment of new shared products, technology infrastructure and services.

“This assessment will enable the University of Michigan to make data-driven determinations regarding IT planning and sourcing,” said David Wilson, managing director of Accenture’s Canada and U.S. State & Local Government client service group. “It is a crucial first step for the university to enable innovative, value-based approaches to technologies and applications to better meet the needs of faculty, researchers and students.”

Accenture will work with the university to develop an IT rationalization roadmap once the initial assessments are completed.

Research Manager for Accenture Technology Labs, Cyber Security (Trusted Computing & IT Resiliency)

Location – Washington, DC

Requisition number: 00092201

View Job Description: http://bit.ly/cVNtgU

Email resumes to: kevin.daprile@accenture.com

R&D at the Labs: Working on technology’s frontier, Accenture Technology Labs finds bold new ways to achieve high-performance for Accenture and its clients. Our differentiator? We apply new technologies to solve real-world challenges. “We combine the creativity and deep expertise of our PhDs in the Labs with the real-world knowledge and business acumen of our global network of technologists who work with clients every day,” explains Don Rippert, chief technology officer. “As a result, we are uniquely able to help CIOs and business executives envision the future and to prioritize their investments in-and use of-technology innovation to achieve high performance.

Accenture seeks to hire a senior researcher to lead projects in the areas of intrusion-tolerant computing and self- healing infrastructure.  The research lead will define, manage and collaborate on new research problems and able to effectively collaborate with the science and technology community. Successful candidates will demonstrate a proven ability of presenting within workshops and interfacing with senior civilian and military leaders.

Primary Responsibilities:

  • Responsible for conducting scientific research related to tamper-resistance, metaphors of complex systems, fault-tolerance and methods and techniques to secure foundational Internet infrastructure
  • Responsible for helping with the commercialization of research outcomes either by turning work into project proposals or software/hardware products or services
  • Responsible for developing security architectures and models for virtualized environments and putting together working prototypes
  • Responsible for writing research papers and proposals and maintaining credentials through publications, presentations, external collaboration with the research community
  • Pursue and capture funding from DARPA, DoD, DHS, DoE and similar agencies

Basic Qualifications:

  • PhD in Computer Science, EE, Computer Engineering or direct related field
  • 2+ years experience practicing information assurance and computer network defense (CND)
  • 4 + years programming skills such as Java, C/C++ and scripting language (Perl/Python/Ruby)
  • 2 + years experience conducting research in one or more of these areas: secure virtualization, trusted path computing and network attack resiliency architectures
  • 1+ years experience working with hyper-visor technology, IPV6 and DNSSEC
  • 2+ years experience working with  NIST SP 800-30/37/39 and NIST 800-53
  • 3+ publications at refereed conferences and journals with presentation at security forums

Preferred Qualifications:

  • Excellent verbal, interpersonal and communication (presentation & writing) skills and able to conduct interactive dialogues on research topics with clients
  • Working experience with current techniques in memory data protection and infrastructure redundancy/fail-over/load-balancing
  • Demonstrated ability to apply mathematical techniques that support the derivation of integrity and integrity checks
  • Demonstrated experience with NSA’s High Assurance Platform, Trusted Platform Module specification or other techniques for hardware-assisted agreements and core trust arbiters
  • Background in cryptography and Public Key Infrastructures
  • Demonstrated experience with as NISTSP 800-30/37/39 and NIST SP 800-53
  • Hands on working experience with VMWare
  • Familiarity with federal funding procedures, regulations, policies and practices
  • Proven track record of program capture is preferred
  • A background in national security related issues is a plus

Applicants for employment in the U.S. must possess work authorization which does not require sponsorship by the employer for a visa.

EOE

Advertisements

Leave a Comment so far
Leave a comment



Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s



%d bloggers like this: