Wednesday, July 29, 2015

Security Systems Advisor

Security Systems Advisor
9-12 month(s)
Plano TX 75075

Description/Comment: 
Participates in technical projects needed to upgrade security requirements for both internal and external clients. Designs, develops, implements, and tests security products for possible inclusion in corporate and client programs. Works with clients and leaders to satisfy client and Client annual Information Security Strategic Plan. Provides knowledge and expertise to less experienced team members. Leads audits and reviews designs for information security issues. 8-10 years of relevant experience or equivalent combination of education and work experience. Advanced security knowledge (access control) of one or more of the following technologies/platforms: IBM midrange security AS400, Unix (Sun OS, Solaris, NeXT), Windows NT desktop & server .Directory Services, Financial applications development & operations, Database (Oracle, Sybase, SQL Server) & applications (MS Office Suite), Compaq PC hardware/software, Novell Netware 3.1x, Firewalls , IBM mainframe security ACF2, RACF, Top Secret, MVS/TSO, & ISPF. Undergraduate degree and 4-6 years relevant experience or Graduate degree and 2-4 years relevant experience.

Additional Job Details: 
ArcSight, SIEM, McAfee Web Gateway, Security Assessments

What are the three to five technical responsibilities of the position? 
Security Certifications, CISSP preferred.
5+ years' experience supporting network security infrastructure.
Experience in vulnerablity scanning (McAfee WebGateway, ArcSight SIEM administration)

 

If you are qualified, available, interested, planning to make a change, or know of a friend who might have the required qualifications and interest, please call me ASAP at  (732) 318-3866 even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you.
 
 
Also, please take a few minutes to answer some of the questions below as they will help me qualify your candidature
 
 
Full Legal Name as in Driving License/ Passport:
Preferred email ID:
Day/ Evening phone numbers:
Current Location:                                       
Work Authorization:
Earliest availability for Phone/ On-Site interview:
Hourly Rate:
Earliest possible start date: 
Two Professional References:
 
Also, be aware that our client conducts an extensive background checks on candidates who are extended offers of employment. 

 
Jay Chauhan
 
eTeam Inc
jay@eteaminc.com
(732) 318-3866
1001 Durham Ave
South Plainfield, NJ, 07080

Monday, July 27, 2015

Network Security Analyst

Location: Lehi, UT or San Jose, CA
Duration: 6 month contract
Rate: OPEN
Start Date: ASAP


Job Description:

The Network Security Analyst deploys and maintains network security infrastructure to prevent unauthorized access to company information or misuse of network assets, researches controls to mitigate and detect compromise of security controls, and performs network security troubleshooting. 

Responsibilities:
  • Will be tasked with creating and tuning security monitoring policy for one or more of the following technologies: Web Application Firewall (WAF), FireEye, Web Secure Gateway, IDS/IDP and other network security infrastructure.
  • Design, test and implement infrastructure solutions for network security to protect sensitive corporate assets.
  • Participate in projects to evaluate, test and deploy new security technology. Work with vendors and teams across the IT organization
  • Review firewall policy change requests for security risk issues
  • Monitor security service request queues, work with requestors to verify requests and determine correct actions required to satisfy the requests. Dispatch service requests to other IS operations staff as needed.
  • Participate in on-call duty to resolve or escalate production security infrastructure issues.
  • Implement all changes to security infrastructure in accordance with standard procedures and change control policies and procedures.
Requirements:
  • BS Degree and 5+ years of experience in network, system and security administration
  • Strong working knowledge of network administration and network management protocols; and networking architecture and design concepts. Palo Alto certification a plus.
  • Strong knowledge of network security protocols, concepts and practices. CISSP or
  • GIAC certification a plus.
  • Strong working knowledge of both public domain and industry leading commercial network security products; Snort, WebSense, FireEye, Imperva, F5 and Palo Alto experience a plus.
If qualified and interested, please send your most up to date resume to drew.chambers@mondo.com

Let's make it happen!

-Drew Chambers


We are grateful to hear from applicants, and will be certain to reach out in cases where you are a strong fit for the requirement. If you do not hear from us, your resume will be preserved for future opportunities.

At Mondo, our consultants are key, and we work hard to make sure that their needs are met. 

What consultants can expect from Mondo...
  • Support from our Consultant Relations Team
  • Consultant Appreciation/Networking Events
  • Onsite client events
  • NEW - Referral Program
Once you become a Mondo consultant you’re eligible to earn cash! Simply refer someone within your network to one of our positions. If they get hired and work for 90 days during your time with us, you’ll be paid! 

Know a talented Digital Marketing or IT professional? Know of an open job requirement? Let us know! 

Contact CR@mondo.com for more information. 
Drew Chambers
Technical Recruiter, Mondo
P: 415-464-6220
San Francisco, CA 94105

www.mondo.com

Friday, July 24, 2015

Business Analyst/Product Manager

The Senior Security Assurance Specialist will help shape the Information Security Risk Management program within the Security Assurance group in E*TRADE Corporate Security. The job encompasses leading and participating in various vendor security assessments, application security assessments, technology project security assessments, and E*TRADE/vendor onsite security assessments with a goal to identify, classify, and document security risk in the environment. The candidate will document assessment results, recommend corrective action, track remediation, evaluate policy exceptions, escalate security issues, and regularly report on the information security posture of the organization.
                              
RESPONSIBILITIES                          
                              
●      Act as a mentor to other Security Assurance Specialists on the team by providing industry and best practice knowledge.
●     Collaborate closely with Third Party Oversight to provide Information Security Risk Assessment support for security assessments of E*TRADE vendors. Complete security risk assessments, determine mitigating controls, conduct closing meetings, document through Security Risk reports, and identify/track the corrective action through Management Action Plans (MAPs) as required.
●     Lead on-site security assessments at various E*TRADE offices, and at selected E*TRADE vendor locations. Perform security assessments, determine mitigating controls, and identify/track the corrective action through Management Action Plans (MAPs) as required.
●     Participate in application security assessments. Review the evidence and results of the application assessments for compliance to security policy and information security best practices. Initiate Exception Forms for policy or control deviations and identify mitigating controls.
●     Research industry trends, identify ongoing security requirements, analyze security risk management tools, and provide recommendations on the need and usefulness of the tools.
●     Refine security process documentation to align with Regulatory requirements and best practices as noted through organizations such as BITS, ISO, and COBIT.
                              
REQUIREMENTS                             
                              
MUST HAVE EXPERIENCE
●     5 years of experience in an Information Security position, or two years in an IT Audit role with a background in Information Security best practices.
●     Training in Risk Management, Privacy Impact Analysis, or IT Audit Methodology strongly desired.
●     Knowledge of ISO 27000 frameworks, BITS SIG, or COBIT/SOX IT control testing.
●     Knowledge of security controls for the handling of Personally Identifiable Information (PII) data.
●     Knowledge of regulations and security compliance requirements affecting financial institutions.
●     Working knowledge of Agiliance RiskVision, MetricStream, RSA Archer or other commercial Governance, Risk, & Compliance software.
●     Practical experience with application security and/or database security
●     Excellent organizational, collaborative, written, presentation, and verbal skills.
●     Occasional travel may be required (no more than 25%).
●     Membership and participation in security organizations, such as ISSA, ISC2, or ISACA.

DESIRED EXPERIENCE
●     Risk and Compliance (GRC) solution, is a plus.
●     Pentration or vulnerability scanning experience is a plus
●     Big 4 or other advisory related experience is a plus.
●     CISSP, CISA, or CISM preferred.

EDUCATION, CERTIFICATION, TRAINING
●     4 years Computer Science degree or Business Degree, or an equivalent combination of education and experience required.
 

Naveen Gummula
Recruiter - Executive
48531 Warm Springs Blvd # 405
Fremont, CA 94539
(408) 767-4171

Tuesday, July 21, 2015

Information Security Specialist

Information Security Specialist - Operations-241566
Federal Reserve Bank of Atlanta

Primary Location

 GA-Atlanta

Full-time / Part-time

 Full-time

Employee Status

 Regular

Overtime Status

 Exempt

Job Type

 Experienced

Travel

 Yes, 5 % of the Time

Shift

 Day Job
Job Sensitivity Tier II - No Credit Check
Position Summary:
Under limited supervision, supports systems and processes to protect the Bank’s information resources. Responsible for all aspects of the organization’s threat and vulnerability management program. Analyzes information security risks and offers remediation solutions to department management and business lines. Remains informed of leading edge technology and industry/academic best practices to determine application to existing business needs. Serves as the primary point of contact for incident response activity and investigation of network irregularities. Communicates information and ideas clearly and with sensitivity to diversity of audiences. Develops and contributes to technical documentation and communication.

Key Responsibilities:
  • Contributes to a comprehensive, business aligned threat and vulnerability management program. Conducts threat modeling and analysis activities of business processes and current/potential IT solutions. Develops recommendations for business partners to remediate vulnerabilities, institute compensating controls or request risk acceptance decisions. Tracks metrics and measures to substantiate efficacy of the program. Provides feedback to intelligence gathering organizations.
  • Conducts research into existing and emerging security threats and technical / process controls. Remains abreast of current security industry and academic research to identify opportunities to address present and future business needs. Conducts proof of concept, technology evaluation and acceptance testing of security products and processes. Provides technical input to security standards, guidelines and daily operational procedures.
  • Offers guidance and recommendations to business lines and IT team on security requirements and best practices. Communicates security policies, standards and guidelines in clear terms to non-technical personnel.
  • Performs security incident operations, including after-hours response activities, event escalation coverage, and incident reporting. Contributes to and participates in security incident plan exercises. Identifies, investigates and escalates information security incidents on the district network.
  • Monitors and analyzes open source and internal data sources to identify trending security issues and alert management to developments, changes and shifts in risk. Contributes to risk assessments and reviews complex, technical documents, diagrams and plans to identify security requirements and recommend controls.
  • Develops recommended implementation / security configuration guides for hardware and software.
Education: Bachelor's Degree or 4 years equivalent experience; Bachelor's Degree preferred

Experience: Two to five years

Functional Knowledge Preferences

Knowledge Areas:
  • Network Design & Architecture
  • Product Testing & Evaluation
  • Technical Writing
  • Compliance Management
Technical Skills:
  • Vulnerability Management Tools
  • SIEM Tool Experience
Certifications/Licenses:
  • GCIH / GCIA / GPEN / GSEC
  • SSCP / CISA

https://frb.taleo.net/careersection/2/jobdetail.ftl?job=241566

Heavy Duty Diesel Truck Technician/Mechanics

Waste Management (WM), a Fortune 250 company, is the leading provider of comprehensive waste and environmental services in North America. Get your foot in the door to an awesome future with Waste Management. We have a Heavy Duty Diesel Truck Technician/Mechanic position in Lewisville, TX!

Our Heavy Duty Diesel Truck Technician/Mechanics work under general supervision, perform preventive maintenance services and inspect, diagnose and repair vehicles. To perform this job successfully, an individual must be able to perform the following essential duties:
  • Maintains a clean, safe work area in compliance with Corporate / OSHA Standards, and performs all work in accordance with established safety procedures.
  • Works under limited supervision and follows established procedures to accomplish assigned tasks.
  • Performs repairs and assigned preventive maintenance services.
  • Performs inspection, diagnosis and repair of electrical, hydraulic, suspension, brake and air systems on vehicles and equipment.
  • Utilizes vehicle computer electronics systems to interpret failure modes to initiate or assign repairs.
  • Estimates time and material costs on vehicle repairs and requisitions new parts.
  • Performs all work within Standard Repair Times (SRTs).
  • Performs service calls for breakdowns.
  • Conducts safety checks on vehicles.
  • Completes required paperwork utilizing fleet maintenance software program associated with repairing vehicles, documenting parts usage, and accounting for repair times.
  • Assists senior technicians in the completion of project work.
  • Reviews, completes or assigns repairs identified on Driver Vehicle Inspection Reports.

When you are a part of the Waste Management family, you join a team of the best in the industry - professional, well trained, and skilled. Our employees earn a competitive pay, great benefits - including a 401K plan, and opportunities for growth.

If you or someone you know has what it takes to join the Waste Management family, please click the following link to directly apply to the opportunity:

https://wmtalent.taleo.net/careersection/ex/jobdetail.ftl?job=15004826&lang=en&sns_id=mailto 


Waste Management Talent Acquisition Team 

Information Security Lead

Job Title: Operating Unit - Lead, Information Security
Location: Austin, TX 
Duration (Months) 12

Competencies 
Network Security

Essential Skills 
The Information Security Architect position is responsible for the security strategy, architecture, design and policies that protect AMD's systems and data worldwide. The Architect will drive development, adoption and communication of related information security technologies, systems and standards throughout the organization in accordance AMD's requirements and best practices. This position requires strong technical skills, the ability to work well in a team, partner with the Office of the CTO, the ability to multitask, attention to detail and be self-motivated. The Architect must be able to identify emerging trends in the industry, and establish guidance and strategies to address those trends as they relate to AMD's business strategies. The Architect may perform proof of concepts to evaluate technologies, and be able to function as the top escalation point for Information Security controls and risk decisions. This position requires strong written and verbal communication skills, and the ideal candidate will be comfortable presenting at all levels of the corporation, including the Board of Directors and outside trade shows and conferences.

Role Description
Primary Duties / Key Responsibilities: Evaluate and promote new and existing security standards, solutions and tools Design, implement, document, and promote infrastructure security solutions Establish a 3-year rolling security strategy to address trends, threats and opportunities Perform vulnerability/risk analyses of AMD Systems and applications during all phases of the system development life cycle Communicate areas of risk and vulnerabilities, propose mitigation plans to Management Apply security engineering principles related to building, maintaining, and monitoring secure infrastructure Collaborate with partners to translate security and business requirements into technical designs. Provide guidance and set direction in regards to Security policy and processes for L1/L2/L3 support Provide L4 (Level 4) support for all security decisions, and act as the top escalation point for information security decisions Must be able work and communicate effectively with the IT support and engineering teams, network operations center and change management and production support teams Provide security guidance for business and IT projects, and help drive solutions to completion Participate as the security liaison for critical IT initiatives such as disaster recovery, master data modeling, EDW, etc. Design monitoring systems to ensure confidentiality and integrity of data and availability of all network services Reviews security logs to monitor unauthorized system access attempts, both internal and external and make recommendations for further action Investigates and follows up on security violations and incidents Translate security requirements and information into effective presentations for non-technical users Develop, maintain and implement security policy, standards and procedures Must have strong written and verbal communication skills Additional Skills: 10+ years professional experience working in information security Subject matter expertise in Networking, *NIX, and Windows security. Strong background in vulnerability management processes and tools, and automated patch management required Background in penetration testing desired Background in digital forensics, eDiscovery or Incident Response strongly desired Must be able to work effectively across project teams, and with outside partners Education Requirements: Bachelor's degree in information technology, information security, computer science, mathematics or related field desired; or equivalent experience (10+ years) required. One or more additional relevant industry or vendor certifications are highly desirable: Certified Information Systems Security Professional (CISSP) Certified Information Systems Auditor (CISA) Certified Information Security Manager (CISM) GIAC (Global Information Assurance Certification) System Security Certified Practitioner (SSCP) Certified Protection Professional (CPP) Certified Network Security Professional (CNSP) Certified Hacking Forensics Investigator (CHFI) EnCase Certified Examiner (EnCE)

Experience (Years) 8-10
Location Austin, TX
 

If you are qualified, available, interested, planning to make a change, or know of a friend who might have the required qualifications and interest, please call me ASAP at  (732) 318-3797 even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you.
 
 
Also, please take a few minutes to answer some of the questions below as they will help me qualify your candidature
 
 
Full Legal Name as in Driving License/ Passport:
Preferred email ID:
Day/ Evening phone numbers:
Current Location:                                      
Work Authorization:
Earliest availability for Phone/ On-Site interview:
Hourly Rate:
Earliest possible start date:
Two Professional References:
 
Also, be aware that our client conducts an extensive background checks on candidates who are extended offers of employment.
 
 
Bhawana Bisht
 
eTeam Inc
1001 Durham Avenue Suite 201
South Plainfield, NJ, 07080

Monday, July 20, 2015

Cybersecurity Operations Specialist

Title: Cybersecurity Operations Specialist
Start Date: 06/16/2015
# of Openings: 1
Location: San Jose, CA, United States
 
Description: 
Cybersecurity Operations Specialist is a mid-level position. Certification is preferred but not required. However, the candidate should be able to obtain one certification within six months. 
Candidates with government and/or military background is a plus. It would also help to look at candidates who have worked for companies such as Broadcom and Altera.
 
Job Description: 
This role will report to the Director/Sr. Manager, Information Security and assist with in operating and maintaining integrated security technologies to protect the integrity, confidentiality and availability of all information resources throughout a highly distributed enterprise. 
Responsibilities will include the day-to-day management of security solutions such as vulnerability scanning tools, log aggregation & analysis tools, data loss prevention systems, firewalls, intrusion prevention devices and others.
Actively monitoring and reporting on information security compliance.
Collaborate with peers and IT colleagues to rapidly complete information security incident investigations.
Ensure operation, maintenance and monitoring of security products and services including firewalls, networks, third party connections, encryption technologies, patching, certificates, anti-virus, email security controls, intrusion detection, intrusion prevention, virtual private networks, SIEMs and identify access management.
Provide technical management and oversight of security tool/appliances deployment and implementation.
Understand of the project lifecycle and Strong stakeholder skills, with the ability to communicate technically with IT analysts and security experts 
 
Job Requirements 
Bachelor degree in an information technology discipline or equivalent IT experience required. 
Any relevant IT certifications including CISSP, CISM, CRISC, CEH or SANS certs are expected.
Formal project management qualification PMP preferred.
Extensive experience (5 -10 years) in information security operations and/or related IT operational functions 
Requires demonstrable background in: security products and technologies; security engineering, networking protocols and data center; security analysis and investigations
Experience of operating a SOC and or managed log monitoring service would be advantageous
A thorough understanding of information security attack methods and compromise techniques used
Typically a background in technical IT roles such as IT architecture, development or operations, with a clear and abiding interest in information security
 
Additional details 
Team player works well in a global team and able to get the best from everyone.
Customer focused - commercially aware with keen business orientation.
Disciplined, organised, self-motivated and focused on delivery of results; champions the benefits of controlled processes and standards.
Experience evaluating IT systems and services against requirements.
Strong interdisciplinary, intercultural and networking skills.
Excellent written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate security and risk-related concepts to both technical and non-technical audiences.
Demonstrate high capability around presentation skills, critical thinking and collaboration skills.
 
If interested please send me your resume along with hourly rate on w2.
 

Dilip Kumar
Intelliswift Software Inc.
Work – 215 554 3041

Friday, July 17, 2015

Security Analyst

Seeking a Cyber Security Analyst to work with Blue Shield of California , in El Dorado Hills, CA. This is a 12 Months Contract to Hire opportunityand they want someone present onsite.

Job Description:
Responsibilities:
· This role is entirely focused on incident response, incident handling and monitoring.
· Event monitoring and analysis for IT security incidents
· IT security incident and vulnerability response and escalations
· Threat detection and response and escalations
· Detection and escalation of account privilege abuse
· Must have a flexible schedule that is open to changing situations and willing to perform all business related tasks assigned
Minimum Required Skills:
· A degree in Computer Science and 1-2 years dedicated to IT, IT security, and/or security infrastructure experience or related field OR a combination of equivalent work experience and education
· 2+ years of experience in Information/Cyber security is required
· Experience with monitoring and security experience is highly desired
· Good understanding of various technologies and concepts related to Cyber Security is a must
Preferred skills:
· Good written and verbal communication skills at different levels with the ability to articulate with both technical and non-technical audiences
· Team player with strong relationship building skills that assists with interconnecting and high collaboration across all IT departments – promptly shares relevant information with others
· Strong business acumen and a commitment to integrity, process improvement and customer satisfaction
· Demonstrate strong organizational, problem solving, and analytical skills
· Positive can-do outlook, rebounds quickly from frustrations, and maintains composure and friendly demeanor while dealing with demanding situations.
· Independence – able and willing to perform tasks and duties without supervisions or with limited guidance.
· Cooperative – willing to work and collaborate with peers, leads, and management and is compromising where necessary


Juhi Tandon | Technical Sourcer | Q Analysts LLC jtandon@qanalysts.com qanalysts.com
5201 Great America Parkway Suite 238 | Santa ClaraCA 95054

Content review analyst

Job Role: Junior/Freshers/Intern/Graduates/Content review analyst
Location: Palo Alto, CA 94303
Duration: 3 yeras

Multiple positions !!!!!!!!
Immediate Hire !!!!!!!!!

Client is looking for Junior or Freshers or college graduates who has content review or some knowledge on technical skills.

Proficiency required with any one of them: English, German, French, Spanish, Portuguese, Italian, Dutch and Japanese
 
Job Description:
  • Basic work involves reviewing Ads on popular search engine and review their compliance to existing rules and policy provided by the search engine.
  • If non-compliant then the Ad/Content needs to be taken down or approved if compliant.
Responsibilities 
  1. Perform a wide variety of application policy reviews on client  application
  2. Take action on violating applications
  3. Master policy knowledge to ensure high quality reviews
  4. Help identify and surface trends, bugs and product feedback
  5. Suggest improvements in tools and techniques to help scale the team 
Requirements 
  • Not be easily offended by content.
  • Previous experience of quality reviews is desirable
  • Familiarity with using web tools
  • Familiarity with basic Mac or Windows
  • Experience using Android-based apps (Desirable)
  • Quick learn with computer-based skills (computer-savvy) 

If you are qualified, available, interested, planning to make a change, or know of a friend who might have the required qualifications and interest, please call me ASAP at  (732) 248-1900 Ext.402 even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you.
Also, be aware that our client conducts an extensive background checks on candidates who are extended offers of employment.
 
Kapil Kumar Agarwal
eTeam Inc
kagarwal@eteaminc.com
(732) 248-1900 Ext.402
1001 Durham Avenue,Suite 201
South Plainfield, NJ, 07080

Wednesday, July 15, 2015

Cyber Security Analyst

Cyber Security Analyst to work with Blue Shield of California , in El Dorado Hills, CA. This is a 12 Months Contract to Hire opportunity.

Job Description:
· The IT Security Services team is looking to add a Cyber Defense Analyst member to support IT security initiatives.
· The Cyber Defense Analyst will apply knowledge to monitor and respond to alerts triggered by IT Security Services existing technologies, services and other IT Security incidents reported to the team.
Job Responsibilities:
· This role is entirely focused on incident response, incident handling and monitoring.
· Event monitoring and analysis for IT security incidents
· IT security incident and vulnerability response and escalations
· Threat detection and response and escalations
· Detection and escalation of account privilege abuse
· Must have a flexible schedule that is open to changing situations and willing to perform all business related tasks assigned
Minimum Required Skills:
· A degree in Computer Science and 1-2 years dedicated to IT, IT security, and/or security infrastructure experience or related field OR a combination of equivalent work experience and education
· 2+ years of experience in Information/Cyber security is required
· Experience with monitoring and security experience is highly desired
· Good understanding of various technologies and concepts related to Cyber Security is a must
Preferred skills:
· Good written and verbal communication skills at different levels with the ability to articulate with both technical and non-technical audiences
· Team player with strong relationship building skills that assists with interconnecting and high collaboration across all IT departments – promptly shares relevant information with others
· Strong business acumen and a commitment to integrity, process improvement and customer satisfaction
· Demonstrate strong organizational, problem solving, and analytical skills
· Positive can-do outlook, rebounds quickly from frustrations, and maintains composure and friendly demeanor while dealing with demanding situations.
· Independence – able and willing to perform tasks and duties without supervisions or with limited guidance.
· Cooperative – willing to work and collaborate with peers, leads, and management and is compromising where necessary

Juhi Tandon | Technical Sourcer | Q Analysts LLC jtandon@qanalysts.com qanalysts.com
5201 Great America Parkway Suite 238 | Santa ClaraCA 95054