Wednesday, October 18, 2017

Cyber Security Analyst

PG&E 

Shifts:
-          1 regular shifts: M-F, 6 am – 2:30 pm
-          1 swing shift: Sat-W, 2 pm – 10:30 pm
-          2  day shifts: Sat-W, 6 am – 2:30 pm

Must Haves:
  • Bachelors in Computer Science, or related discipline, or equivalent experience
  • 6yrs in IT
  • Experience in executing digital investigations and performing incident response activities
  • Prior SEIM experience – Security event and information management system, log aggregation and event notification
  • Network packet analysis(PCAP analysis) – Analyzing network packet for malicious / suspicious activity
  • Endpoint forensics – Ability to perform full investigation / forensics of endpoint / end user machine as a result of a security alert.
  • Memory analysis – Ability to analyze physical memory collected from computer using open source or paid application
  • Good analytical skills – ability to analyze and think out of the box when working a security event
  • Good networking knowledge – Good knowledge of TCP / IP protocols, ability to differentiate various layers in networking.
  • Tools - for associate the below tools in their resume will be a huge plus, for career and above I expect to see at least one of these below:
    • IBM QRadar SEIM Encase – Forensics analysis tool
    • ProofPoint IDS / IPS Palo Alto Firewalls
    • Open source security tools such as Suricata, SANS SIFT workstation, Open source forensics tools – Volatility etc.

Plusses:
  • Background in utilizing digital forensic tools including Guidance EnCase, SIFT Workstation,volatility, IEF
  • Certified Information Systems Security Professional (CISSP) certification
  • Wireshark experience and WCNA( a plus) - Open source network packet analysis tool , WCNA – wireshark certificate.
  • Experience with IBM QRadar a plus – IBM QRadar is the SEIM PG&E has deployed and is using.
  • Any GIAC certifications a plus – These are SANS( industry well known security course provider) certs such as GMON, GSEC, GCIH etc.


Responsibilities:
Conduct computer forensics, registry and memory analysis to identify malicious activity. Analyzes complex malware/exploits through forensics, observation of network traffic and using other tools and resources to determine if PG&E systems are vulnerable. Leads development of framework for implementing tools and processes to improve quality and timeliness of reports. expert in area of field and applies extensive knowledge of concepts, principles, and practices. Codes complex tasks that integrate systems, produce reports or provide output that can be leveraged by other team members or systems. Performs proficient forensic analysis using security tools and monitoring systems to discover the source of anomalous security events. Assists in performing basic research internally and externally. Performs complex system administration tasks (e.g. customization, cross-tool integration) for security tools. Develops a strategy to implement work in department


Erica Mummert | Professional Recruiter | Insight Global, LLC
415.848.5720 Office | 68810 Ext. | 415.371.1527 Fax

Information Security Engineer

Position : Information Security Engineer (EBAYJP00014753)
Location: San Jose, CA.
Duration: Long Term

Description :

Key Responsibilities may include:
• Provide technical inputs, evaluate and recommend new and emerging security products and technologies
• Defines security configurations for threat detection and prevention tools
• Designs automated workflows to streamline security operations
• Monitors and proactively manages supported products and services to assure their performance, availability, security, and capacity.
• Researches, analyzes, and formulates recommendations regarding technologies, products,
and solutions to fulfill requirements within the enterprise.
• Security tool administration and support(Network/Endpoint/Threat Hunting/Investigations)
• Tool deployment and implementation experience on a global scale
• Splunk Admin and Architecture related tasks
• Ability to debug configuration issues on different splunk components
• Understanding of Splunk configurations, dependencies, and forwarder management
• Understands Splunk architecture and components (search head, deployment server, cluster master, indexers, forwarders (HF/UF)
• Strong understanding of enterprise logging using syslog-ng, with a focus on security event logging
• Knowledge of system and network architecture and interrelationships (technical and functional).
• Designs, implements, configures, and manages solutions within the supported Linux technologies, products, and services.
• Research and recommend innovative and automated approaches for operational tasks which leverage available resources and simplify operational overhead.
• Develop, implement, and execute standard procedures for the administration, content management, change management, version/patch management, and lifecycle management of the SIEM/Log Management platforms

Basic Qualifications:

• Minimum 4-6 years of experience in Security Administration
Minimum 2-3 years of experience in Network Administration
• Must be well organized and able to leverage best practices, able to thrive in fast-paced environment, and, most importantly, have the ability to approach problems with an innovative, can-do attitude
• Demonstrates the ability to analyze and resolve issues independently
• Knowledge of project management tasks, experience creating application documentation, and demonstrated ability to train other team members.
• Manage maintenance, enhancements and upgrades for supported security systems using standard project methodology
• Scripting knowledge is a plus (python, shell)
• Bachelors Degree preferred
• Preference for at least one current recognized security professional certification such as CISSP, GIAC
• Experience in working in a highly dynamic large scale enterprise
• Knowledge of security vendors and security product capabilities

Professional Skill Requirements:

• Good organizational, multi-tasking, and time-management skills
• Ability to successfully pass a client background screening if required
• Proven ability to work independently and as a team member
• Good communication (written and oral) and interpersonal skills
• Ability to work with multiple teams in a fast paced environment


Dipak Panchal
Sr.Technical Recruiter (Dew Software Inc.)

|Phone: (A): (510)580-2939, (B): (510)371-8523|
|Fax    : (510)743-4106  | 
|Skype ID : dipakpanchal-dk | 
|E-mail: dipak@dewsoftware.com |
|Web   : www.dewsoftware.com |

UI Developer

We currently have a requirement for UI Developer.  It is located in San Jose, CA.
KAYGEN is an emerging leader in providing top talent for technology based staffing services. We specialize in providing high-volume contingent staffing, direct hire staffing and project based solutions to companies worldwide ranging from startups to Fortune 500 and Managed Service Providers (MSP) across a wide variety of industries

  1. UI Developer – Senior Profile
  • Front-end development (JavaScript, CSS, HTML, preferably React),
  • preferably some knowledge on mobile app development (iOS and Android) and back-end development (preferably Node.js)


Shakir Mallick
KAYGEN  
100 Spectrum Center Drive, Suite 890, Irvine, CA 92618
O: 949) 203 5100 ext 129 | F:  (949) 861 6500 
URL: www.kaygen.com

Monday, October 16, 2017

UI Developer

Title: UI Developer- Angular
Location: Pleasanton, CA
Duration: 6+ Months
 
Job Description:
·         Strong experience on JavaScript application development
·         Use various JavaScript frameworks depending on the use case (e.g. jQuery, Angular, Ext JS)
·         Good experience with HTML, CSS/SASS and AJAX
·         Excellent written and verbal communication skills
·         Strong team player
·         A constant desire to grow, learn, and explore new things
Please send us the following details along with the updated resume for immediate Consideration
Full Name:  
Contact Number: 
Email Address:  
Visa Status:
Expected hourly Rate:
Total IT Exp:
Current Location: 
Willing to Relocate:
Start Availability:
 
 
Satya
Caspex
48531 Warm Springs Blvd, Suite 405A, Fremont, CA 94539.
PH: 510-709-3806
Email: satyag@caspex.com
Web: www.caspex.com

Warehouse Associates

Warehouse Associates needed for IMMEDIATE openings in the Fort Worth Area!!!
 
Successful WAREHOUSE ASSOCIATES will effectively and accurately receive goods, utilize serial numbers in a warehouse management system to return goods into the system, pick, package, inventory, and follow detailed work instructions with a very low error rate. 
  • 1st and 2nd shifts available.
  • Pay rate ranges between $10.00 - $10.50 an hour depending on the shift and position.
  • Must be able to lift up to 50 lbs. and stand on your feet for the entire shift (8-12hrs depending on the shift)
  • This is a clean, temperature controlled environment
  • Overtime and weekends required
  • Good verbal communication skills (must be able to read, speak and write English) 
  • Basic Computer and Math Skills
  • 6 months experience preferred, but not required 

To apply, please come to our Kelly Services Office in Fort Worth, TX Monday through Friday between the hours of 9AM-3PM 
(No appointment is necessary to apply)

Our Fort Worth Office is located at:

4500 Mercantile Plaza #225 (2nd floor please take the elevator)
Fort Worth, TX 76137

For ANY questions, please email 589Z@kellyservices.com  or call 817-222-2247

Friday, October 13, 2017

Java Security Engineer

Position: Java Security Engineer
Location: Sunnyvale, CA
Type: Full Time Employment
Salary: Negotiable
Start date: Immediately

Mandatory Technical Skills:
Java Development: 
Java, J2EE 
SQL Queries 
Database knowledge of Oracle and MySQL 
Application Servers (Tomcat & JBOSS), 

Information Management and Security: ( at least any combination of 3 of the below ) 
Experience with all aspects of digital security with intimate knowledge of following: 
Cryptographic Algorithms 
Network and Application Layer Security 
Threat Modeling 
Risk Analysis 
Vulnerability Resolution 

Desirable Technical Skills:
Good communication & team skills. 
The role requires critical thinking, creativity, patience, and the ability to generate unique and custom solutions to uncommon problems. 

Mandatory Functional Skills:
The individual must be a self starter and able to work in a fast paced, highly dynamic environment. 
Direct co-ordination with client 

Desirable Functional Skills:
Experience in Retail Point of Sale domain, Security



Vishal Singh
Phone #: 480-750-0101 (Direct)
1-832-201-0366 (Fax)
RConnect LLC
124 West Bonney mead Circle, The Woodlands, TX 77381
Email: Vishal@RConnectLLC.com
Web: http://www.RConnectllc.com 
Current JOBS: http://careers.rconnectllc.com/jobs

Security Threat Analyst

Position:              IT- Cyber Security Threat Analyst/Specialist- Senior
Location:             Concord, CA 94518
Duration:            6+ months
Job Description:
·         Acts as a subject matter expert in area of field.
·         Leads moderately to complex projects which may be cross functional.
·         Analyzes complex malware/exploits through forensics, observation of network traffic and using other tools and resources to determine if PG&E systems are vulnerable.
·         Leads development of framework for implementing tools and processes to improve quality and timeliness of reports.
·         Expert in area of field and applies extensive knowledge of concepts, principles, and practices.
·         Codes complex tasks that integrate systems, produce reports or provide output that can be leveraged by other team members or systems.
·         Performs proficient forensic analysis using security tools and monitoring systems to Client the source of anomalous security events.
·         Assists in performing basic research internally and externally.
·         Performs complex system administration tasks (e.g. customization, cross-tool integration) for security tools.
·         Develops a strategy to implement work in department.
Quals--
Bachelors in Computer Science, or related discipline, or equivalent experience Certified Information Systems Security Professional (CISSP) certification.
Experience in Information Technology (IT)
6yrs Extensive experience in analyzing network packet capture data using tools such as Wireshark
Experience performing computer forensics and memory analysis using industry standard and open source tools.
                The candidate should have SOC experience including Event Monitoring /Incident Response and some endpoint forensics experience.
                SOC experience is a must.

Desirable - Prior experience working in a 24x7 security operations centre

Swathi N Rao
Associate Recruiter

Tuesday, October 10, 2017

Security Engineer/Network Engineer

Job Details
Title: Security Engineer/Network Engineer
12 Months Contract
Job Location: San Jose, CA

Basic Qualifications:

  • Minimum 4-6 years of experience in Security Administration Minimum 2-3 years of experience in Network Administration
  • Must be well organized and able to leverage best practices, able to thrive in fast-paced environment, and, most importantly, have the ability to approach problems with an innovative, can-do attitude
  • Demonstrates the ability to analyze and resolve issues independently
  • Knowledge of project management tasks, experience creating application documentation, and demonstrated ability to train other team members.
  • Manage maintenance, enhancements and upgrades for supported security systems using standard project methodology
  • Scripting knowledge is a plus (python, shell)
  • Bachelor’s Degree preferred
  • Preference for at least one current recognized security professional certification such as CISSP, GIAC
  • Experience in working in a highly dynamic large scale enterprise
  • Knowledge of security vendors and security product capabilities


Nick Rogers | Technical Recruiter – West Coast Hub | Apex Systems

Monday, October 9, 2017

Information Security Engineer

 Information Security Engineer position in California for 6+ months contract to hire role

Job Responsibilities:
  1. Good understanding of network LAN / WAN Concepts like TCP/IP, STP, VLAN, Inter VLAN Routing, NAT, PAT, Access Lists (ACL) 
  2. Proficient in designing the network architecture for any tool that requires a distributed deployment
  3. Good understanding of Packet capturing and Network Aggregation Technologies (TAPs) such as Arista, Gigaton etc
  4. Good understanding of Packet capturing, filtering and analysis at the network and endpoint level
  5. Good knowledge on data center and corporate network topology models such as leaf-spine, hub-spoke etc.
  6.  Provide technical inputs, evaluate and recommend new and emerging security products and technologies
  7. Defines security configurations for threat detection and prevention tools
  8. Designs automated workflows to streamline security operations
  9. Monitors and proactively manages supported products and services to assure their performance, availability, security, and capacity. 
  10. Researches, analyzes, and formulates recommendations regarding technologies, products, and solutions to fulfill requirements within the enterprise.
  11. Security tool administration and support (Network/Endpoint/Threat Hunting/Investigations)
  12.  Tool deployment and implementation experience on a global scale
  13. Knowledge of system and network architecture and interrelationships (technical and functional).
  14. Designs, implements, configures, and manages solutions within the supported Linux technologies, products, and services.
  15. Research and recommend innovative and automated approaches for operational tasks, which leverage available resources and simplify operational overhead.

Sridhar Rajenthiran
Recruiter | 314e Corporation
Main 510.371.6769 | Fax 510.255.4534
sri.raj@314ecorp.com | www.314e.com

Info Security Engineer

Job Title: Info Security Engineer
Location: San Francisco, CA / Charlotte, NC                                                                                                    
Duration: 12+ Months Contract (with possible Extension)

Description:
  • Acts in a strategic role in the development and maintenance of extremely computer network security/protection systems and architectures.
  • Provides security solutions that require resolution of complex operational and integration issues associated with networks, data systems, and applications to successfully deploy secure technologies and to enhance existing technologies.
  • Leads computer security incident response activities, conducts technical investigation of security-related incidents and conducts post-incident digital forensics to identify causes and recommend future mitigation strategies.
  • Serves as the highest level of information security consultant to all internal clients and technical management in all areas of the business to ensure conformity with corporate information security standards.
  • Directs and serves an a mentor to less experienced staff.
  • 10+ years of experience in security applications and systems.
Additional Job Details:
        Primary function of this job is to perform cyber-threat triage and analysis as well as content development for cyber-threat dashboards as directed by senior staff.
        Design and development experience on the SPLUNK platform
        Experience in cyber-threat monitoring/triage (e.g. front-line cyber threat response)
        Able and willing to perform cyber-threat monitoring and response 4 to 6 hours per day in the corporate cyber-threat response center.


Rohitha G
Technical Recruiter

Senior Information Security Analyst

Position               :: Senior Information Security Analyst
Location               :: San Jose, CA
Duration              :: Full Time

The Senior Information Security Analyst is responsible for reviewing alerts compiled from IT and Engineering systems, developing and documenting baselines used to identify anomalous behavior within the environment quickly. Identifying, researching, and responding to alerts from monitoring systems to remediate threats, supporting data collections regulations, researching compliance controls, documenting and reviewing standard procedures and evaluating and documenting access request changes.

Responsibilities
• Develop security standards and processes that can be deployed and managed in an automated fashion for the various projects assigned.
• Plan and execute projects to implement security-oriented tools or services to handle the company resources and associated products.
• Must stay up to date on the latest security trends, vulnerabilities, privacy legislation, and news items and communicate new finding with other team members.
• Documents policies, procedures and standards based upon guidance from Corporate Security Management.
• Recommends changes in security policies and practices per changes in law or financial sector security practices.
• Ensures that data is protected from unauthorized modification, destruction, and disclosure. • System Auditing and monitoring of critical security systems: FIM, IPS/IDS, Event Logs.
• Perform risk assessments and test security controls and systems, including working with process owners to define remediation plans.
• Respond to critical computer security incidents by collecting, analyzing and preserving digital evidence.
• Answer user questions related to security technology and advice on the security impact of technical changes.
• Ensure that security policies are applied and maintained for network devices, remote access devices, firewalls, servers, and workstations.
• Research mechanisms and tools for control compliance.
• Conduct periodic audits of business entities to ensure continued compliance.
• Continuous monitoring and research of real-time alerts.
• Track and report on policy violations.
• Collaborate with other departments to ensure the timely delivery of audit materials on a monthly, quarterly and annual basis.
• Manage repository for control documentation and update documents as needed.
• Perform internal control testing to validate the design and operating effectiveness and report results in the repository on a timely basis.
• Participate in post-mortem reviews and ensure lessons learned are integrated into the regulatory compliance process. Recommended Skills
• Experience with Linux, MacOS, Ubuntu, LDAP security configuration and design, monitoring/alerting, intrusion detection, encryption, vulnerability management and wireless network security.
• Ability to identify and recommend mitigations for vulnerabilities and exploits.
• Knowledge of Information Security principals and activities
• Ability to work with urgent deadlines.
• System administration experience is a plus.
• Project Management certifications a plus, but not required.
• Broad knowledge of IT and Cloud Engineering in mid to large organizations.

Required Skills 
• Experience with Firewalls, IDS/IPS, VPN, and other network security components from an evaluation, deployment assessment, and audit perspective.
• Knowledge and expertise with AWS & Azure
• 5+ years' experience in an Information Security role.
• A working knowledge of network infrastructure and security monitoring tools.
• Information Security certification required. Security certifications may include, but not be limited to CISSP, CISA, CISM, GSEC, Security+, and CEH.
• Experience with threat assessment, vulnerability analysis, risk assessment, information gathering, correlating and reporting
• Ability to manage changing workloads while maintaining a sense of priorities and delivering quality service within required timeframes
• Ability to learn new technologies and applications and apply that knowledge to daily workflows
• Attention to detail, organized and able to work and research independently.
• Demonstrated adaptability, analytical and problem-solving ability, and attention to detail.

Zak | Account Manager
Eros Technologies, Inc
Phone : 516-545-0742