Friday, May 26, 2017

Security Analyst

Security Analyst
Location: Herndon, VA
Duration: 1+ years
Rate: $43/hr W2

Description:
  • SOC Tier 1 Analyst must be willing to work in a 24x7x365 Security Operations Center environment. Including Holidays.
  • Demonstrate intuitive problem solving skills and allow for flexible scheduling.
  • Monitor network traffic for security events and perform triage analysis to identify security incidents.
  • Respond to computer security incidents by collecting, analyzing, preserving digital evidence and ensure that incidents are recorded and tracked in accordance with SOC requirements.
  • Work closely with the other teams to assess risk and provide recommendations for improving our security posture.
  • Ability to obtain Clearance.
Responsibilities:
  • Performs network security monitoring and incident response for a large organization, coordinates with other government agencies to record and report incidents.
  • Maintains records of security monitoring and incident response activities, utilizing case management and ticketing technologies.
  • Monitors and analyzes Security Information and Event Management SIEM to identify security issues for remediation.
  • Knowledge of creating Security Information Event Management SIEM tool rules.
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information
  • Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems. Consolidates and conducts comprehensive analysis of threat data obtained from classified, proprietary, and open source resources to provide indication and warnings of impending attacks against unclassified and classified networks.
  • Recommend changes to Standard Operating Procedures and other similar documentation
  • Generates end-of-shift reports for documentation and knowledge transfer to subsequent analysts on duty.
  • 1-3 + years of related experience in information technology and/or information security preferred
  • An understanding of Cyber Security Incident Response and Network Security Monitoring
  • Fundamental understanding of computer networking (TCP/IP)
  • Knowledge of Windows, Linux and Cisco operating systems and information security
  • Knowledge of Intrusion Detection Systems (IDS) and SIEM technologies; Splunk, Symantec antivirus, Firewalls and Sourcefire and similar tools preferred.
Preferred:
  • • Ability to obtain Clearance.
  • Desirable certifications include, but not limited to:
  • o CompTIA Security+, SANs GSEC, GCIH, GCIA. Carnegie Mellon SEI Certified Incident Handler. Security. EC Council C|EH, Microsoft MCSE
 
Ashu Nagar
eTeam Inc
anagar@eteaminc.com
(732) 983-5528 Ext.166
1001 Durhan Avenue, Suite 201
South Plainfield, NJ, 07080

Security Architect

Title: Security Architect
Location: Washington DC // Western US// Ohio Midwest // Philadelphia, PA // Rochester, MN
Duration: Long term

Job Description:
·         Minimum Master’s Degree in Computer Science or relevant field
·         Minimum 6 years of experience in Security Monitoring and Incident Response
·         Information Security Certificates like GIAC, GCIH, CEH, FTK, Encase etc.
·         In depth knowledge of the latest cyber threats
·         In Depth Knowledge of operating systems, network, intrusion detection, terminal services, penetration testing, vulnerability assessment, network forensics, Citrix environment
·         Experience in Disk Imaging, Data Recovery, Password Recovery, Metadata Extraction, Steganography, Memory Imaging and Analysis, Mobile Device Forensics, Network Forensics, Anti forensics Demonstrated experience in scripting (Perl, Ruby, Python)
·         Good Communication skills, oral and written       
·         Malware & Threat Specialist Minimum Masters
·         Degree in computer Science or relevant field Minimum 6 years of experience in Threat Intel, Big Data and Analytics, Malware
·         Minimum 2-3 years of experience in Malware Analysis & Reverse Engineering
·         Information Security Certificates like GIAC, CEH, Certified Hadoop and Big Data.
·         Good Knowledge of operating systems, network, intrusion detection, terminal services, penetration testing, vulnerability assessment, network forensics, Citrix environment
·         Experienced in Technologies like SIEM, IPS, Network Forensics, Sandbox environment, Threat Intelligence, APT Team player with strong communication skills, oral and written


Prabhjith Singh
Yochana IT Solutions INC
Direct: (503)-446-8939

Senior Graphics Tools Programmer

Job Title: Senior Graphics Tools Programmer (6827822)
Location: San Diego, CA 92121
Duration: 12 months
 
Job Overview:
Responsibilities:
  • Take ownership of the existing asset generation pipeline for geometry and textures
  • Maintain and improve asset generation pipeline solutions
  • Convert from 32 bit executables to 64 bit executables
  • Maintain and improve Maya exporter and texture generation pipeline
  • Maintain and improve code for building vertex streams, tri lists, state data, etc.
  • Maintain and improve Python scripts that use SQL

Qualifications:
  • At least 4 years of game industry, graphics asset pipeline experience
  • Bachelor's Degree in Computer Science, related field, or equivalent work experience
  • Expert in C/C++ 
  • Familiarity with STL
  • Solid Python scripting skills
  • Thorough understanding of Visual Studio 2012 and Windows application development
  • Functional understanding of Maya
  • Experience with Maya MEL, Maya C++ API, or Maya’s Python API
  • Strong communication skills 

Other useful skills/experience include: 
PS4 programming, DirectX 11/HLSL/Compute shading, SQL, Photoshop, Substance Painters/Designers, Mudbox, Zbrush, wxWidgets, Qt

 
Sandeep Mehta
eTeam Inc
1001 Durham Avenue Suite 201
South Plainfield, NJ, 07080

Network Security Engineer

Position: Network Security Engineer
Location: Oakland, CA
Duration: 6+ Months (C2H)
 
Job Description:
The Network Security Engineer will be primarily responsible for the implementation, administration and maintenance of infrastructure security solutions in our organization, with a focus on securing the information assets of our Clients.
Job Responsibility:
·         Will engage in hands on security administration and maintenance, implement changes, create policies, troubleshoot and diagnose problems, perform scheduled migrations and upgrades.
·         Install, configure and support security related hardware/software appliances and solutions including Cisco Next Gen Firewalls, IPSEC VPNs, Secure Mail and Web gateways, Intrusion Detection, Anti-Virus, Mobile Security and DLP solutions.
·         Create, maintain and update documentation on the operational procedures, hardening standards and security rules and policies, as necessary, to support the business environment.
·         Assist in log monitoring and detection of intrusions and events, working with Corporate Security Incident Response team in investigations as needed.

Job Requirement: 
·         A Bachelor's Degree in Computer Science or equivalent.
·         At least 3 years of hands-on experience installing, administering and troubleshooting Palo Alto Networks Next Gen firewalls, Cisco ASA Firewalls, IPSEC VPNs, and Intrusion Detection and Prevention Systems.
·         1-2 years of experience on one or more other security products like Secure Mail Gateway, Web Content Filtering, Mobile Security, and/or Wireless Security.
·         One or more security certifications like GSEC, CEH, CCNA Security, CCNP Security, PNCSE etc. will be an added advantage.
·         Equivalent combination of education and experience may substitute for stated qualifications.
·         Excellent communication skills and ability to document and explain technical details clearly and concisely.

Security Admin: 
·         The information security administrator will be primarily responsible for the implementation, administration and maintenance of infrastructure security solutions in the organization, with a focus on securing the information assets belonging to the Credit Union or its members
·         Specialized Essential Job Function % of Time
·         Engage in hands on security administration and maintenance, implement changes, create policies, troubleshoot and diagnose problems, perform scheduled migrations and upgrades 40
·         Install, configure and support security related hardware/software appliances and solutions including Next gen Firewalls, IPSEC VPNs, Secure Mail and Web gateways, Intrusion Detection, Anti-Virus, Mobile Security and DLP solutions 20
·         Create, maintain and update documentation on the operational procedures, hardening standards and security rules and policies, as necessary, to support the business environment 20
·         Assist in log monitoring and detection of intrusions and events, working with CFCU Security Incident Response team in investigations as needed 20

Rohit Singh
Technical Recruiter
(201) 523-7131 |
rohits@net2source.com
Address: One Evertrust Plaza, Suite # 305, Jersey City, NJ - 07302. USA
Website: www.net2source.com

Thursday, May 25, 2017

Information Security Engineer

Information Security Engineer – BMCSJP00008470

Description:
  • Security Engineer will work in BMC’s R&D Security Group responsible all product security including secure software development lifecycle, application & SaaS security, security testing, security architecture review, threat modeling, cloud security assessment, and cloud security architecture.
  • Security Engineer will also work closely with R&D engineers, security operations, and product leads in enhancing the overall product security posture. 

Responsibilities:
  • Perform security assessment of R&D products covering application, open source, infrastructure, and cloud 
  • Provide subject matter expertise of application and SaaS security 
  • Develop security policies, standards, procedures and guidelines related to product security and release management 
  • Implement necessary application security measures such as secure coding and security testing 
  • Implement necessary security tools to test, monitor and detect security events 

Qualifications Required
  • B.S. or MS in Computer Science or related field, or equivalent experience 
  • Experience in Java and C/C++ 
  • Meaningful experience in many of the following areas: 
    • Securing software products and SaaS apps 
    • Cloud security architecture & operations 
    • VMWare & AWS Security 
    • Cryptography, key management, authentication and authorization 
    • Red team operations 
    • Hardening operating systems and application infrastructure 
    • Threat and vulnerability management 
    • Dynamic and Static Application Security Testing 
  • Understanding and good working knowledge of Java software development 
  • Application development experience a definite plus 
  • Experience leading cross-functional, multi-site teams 
  • Experience working in fast paced, dynamic environment



Byron Fish
Technical Recruiter

Wednesday, May 24, 2017

Senior Security Engineer

The Senior Security Engineer role is tasked with supporting the implementation and execution of the client’s Information Security program, with an emphasis on Information Security Engineering & Operational activities. The role will report to the Security Operations team under the Manager of Security Operations and is part of the overall client’s team accountable for Information Security, Information Risk Management, and Compliance activities.
The ideal candidate will have exposure to both small and large organizations and experience in both public and private enterprises.  Experience with standards compliance-driven environments (ISO27000, NIST, SOC1 & 2, etc) and regulatory (PCI-DSS) a plus. 
Essential Duties & Responsibilities 
(1) Information Security Engineering & Architecture (50%)
  • Define a cohesive information security tools architecture that emphasizes integration, proper implementation and configuration of tools, and balance in-sourcing and outsourcing options.
  • Evaluate information security requirements for planned initiatives and/or changes in the client technology environment as part of the SDLC and Change Management processes.
  • Define configuration standards, select, implement and configure information security tools, both in-sourced and outsourced, inclusive of event management and monitoring.
  • Provide information security consulting services to internal users, both within and outside of the IT and Information Security department. 
(2) Information Security Operations (50%)
  • Oversee the day to day administration and management of information security tools, both in-sourced and outsourced, as well as third-party/managed security service providers;
  • Oversee threat and vulnerability management processes, inclusive of vulnerability scanning, remediation efforts, notifications, etc.;
  • Oversee and manage penetration testing processes, inclusive of vendor management, report interpretations, remediation efforts, notifications, etc.;
  • Review system events and incidents on a daily basis
    • Lead investigation of potential incidents
    • Lead incident response processes as the incident coordinator
  • Serve as a point of contact for information security operational matters in an on-call team rotation covering 24x7x365;
    • Provide 3rd level support for information security tools and operational processes 
Communication & Interpersonal Skills 
  • Proven analytical and problem-solving abilities.
  • Ability to effectively prioritize and execute tasks in a high-pressure environment.
  • Good written, oral, and interpersonal communication skills.
  • Ability to present ideas in business-friendly and user-friendly language.
  • Highly self-motivated and directed.
  • Keen attention to detail.
  • Team-oriented and skilled in working within a collaborative environment.
Requirements 
Education:
  • College diploma or university degree in the field of computer science and/or 6 years equivalent work experience
Experience:
  • 8 years’ experience in Information Security/Risk Management, ideally in a mix of consulting and industry roles at a publicly traded company.
  • Strong technical knowledge of technology platforms, inclusive of systems, network devices, and security solutions. Hands-on experience with Windows OS, Linux, MacOSX, Palo Alto Firewalls (including Panorama), Cisco iOS/NX-OS/ASA-OS, relational databases, and other core enterprise technologies.
  • Information Security expertise in application and infrastructure security architecture, design, and engineering using technologies, solutions, or frameworks inclusive of OWASP, SAML, firewalls, endpoint security, SSO, IDM, data encryption & enterprise key management, PKI, IDS/IPS, malware management, web content management, SIEM, etc.
  • Hands-on experience developing hardening standards for on-premise and cloud-based systems inclusive of networks, servers, and common operating systems using widely known standards such as DISA, CIS, etc.
  • Excellent understanding of software development lifecycle models, as well as the approach and options for implementing a Secure Development Lifecycle (SDL).
  • Intermediate understanding of industry common information technology control frameworks, particularly ISO 27001/2, SOC1 and 2 (Type I and II), PCI-DSS, and Cloud Security Alliance.
  • Intermediate fluency with one or more Windows scripting languages (e.g. Powershell, VB, WMI, ADSI).
  • Excellent understanding/working knowledge of private and public cloud IaaS solutions.
  • Network design and management; hands-on knowledge of
  • OSI Model & TCP/IP stack
  • Network protocols
  • Cisco IOS
  • PC literacy required: MS Office skills (Outlook, Word, Excel, PowerPoint)
  • Strong quantitative and analytical abilities.
  • Excellent documentation skills.
Licenses or Certifications: 
One or more of the following preferred:
  • CISSP
  • GIAC Information Security Professional
  • CISM
  • CISA
Brian Edelman, CPA
Director of Recruitment
Pivotal Solutions, Inc.
17 Barstow Plaza
Great Neck, NY 11023

Developers

1) Job Title: SharePoint Developer III
Company: Banking domain
Location: Washington, DC
 Required Skills • 7+ years of combined experience in SharePoint 2007/2010/2013 web application development and at least 2 years of SharePoint 2013 experience;• Microsoft .Net Framework including .NET Development platform, C#, Visual Studio and Design Manager for SharePoint;
-----------------------------------
(2) Title: Oracle PL/SQL Developer 
Location: Washington, DC, United States
• Conduct a detailed discussion with the SMEs and document the understanding of the business requirements
• Write Low Level Design, Unit Testing Plan, and Unit Test case documentation
• Troubleshoot performance related issues
• Support system and user acceptance testing activities, including issue resolution
• Research problems reported by clients and other stakeholders and recommend fixes and solutions to be implemented after review by SMEs
• Complete technical documentation to ensure system is fully documented
 ---------------------------------
(3) Title: .NET / SQL Developer 
Location: Washington DC
Required Skills: • SQL Developer/.NET Programming/SQL Performance Tuning;
Education • Bachelor’s degree in computer science and at least 2+ years of programming experience 
• • User Interface Design, Software Design, Software Debugging, Software Development Fundamentals, Software Documentation, Software Testing, Software Requirements, Hardware Interfacing, Visual Basic .NET Programming, VB, C# Scripting, ASP.NET, MS SQL 2000, UML, SOA 
Experience
•Should have worked on MS SQL SERVER Database/ SQL Agents /Performance Tuning of SQL and Stored Procedures.
• Strong knowledge on performance tuning of queries.
• Candidate must also have the ability to: 
o Understand client requirements, translate requirements into good design and clean code 
o Set and meet Goals 
o Handle multiple tasks 
o Respond to quick turnaround requests 
o Work independently and as part of a team 
o Take directions from Project Manager
• Develop software applications and modules in accordance with specifications and standards
• Participation in all phases of project life cycle, design, development, test, debug, maintain and update
• Develop software applications by encoding project requirements in Visual Basic, SQL as applicable 
• Confirm program operation by conducting tests; modifying program sequence and/or codes
• Provide reference for use by help desk by writing and maintaining user documentation
Desired
• Experience in development of financial applications preferred
------------------------------
(4) Title: SAP Developer II
Position Type: Contract
Location: Washington, DC, United States
Required Skills Strong Understanding of the Architecture of SAP BW 7.X Versions & Core Data warehouse Concepts (Mandatory);Strong ABAP Skills to handle Complex transformations (Mandatory);Strong Experience in Data Modeling , Extraction , Transformation & Loading of Data using SAP BW (Mandatory); 
•   Strong Understanding of the Architecture of SAP BW 7.X Versions  & Core Data warehouse Concepts(Mandatory)
•   Knowledge of SAP BW on HANA or SAP 7.4 (highly preferred) 
•   Strong ABAP Skills to handle Complex transformations (Mandatory) 
•   Strong Experience in Data Modeling , Extraction , Transformation  & Loading of Data using SAP BW (Mandatory)
•   Proficiency in the Extraction of data from SAP ECC , Oracle , Informatica  & generic RDBMS Source systems. Development of Generic Extractors is very important (Mandatory)
•   Expertise in Creating Bex Queries. (Mandatory) 
•   Strong Knowledge on the Change  & Transport Management of BW objects across the Landscape (Mandatory)
•   Expertise in Performance Tuning  & Optimization (Mandatory)
•   Experience in the handling Operations  & Maintenance activities in BW Production system (Production Support activities like Data loading , Batch Job Monitoring & Troubleshooting) (Mandatory)
•   Experience in Platform Upgrades  & Regression Testing of the BW Platform (Mandatory)
Core HANA Skills
•   Strong Technical Experience on the Data Modeling using HANA Studio and BW on HANA 
•   Strong knowledge on HANA SQL Script is highly preferred 
•   Experience in the Design and Implementation of Attribute Views, Analytic Views  & Calculation Views
•   Knowledge on BW Modeling Tools, Creation of Composite Providers, Advanced DSOs and Open ODS Views is highly preferred 
•   Experience in the Real Time Replication of Data using SLT, Operational Data Provisioning (ODP) is highly preferred 
•   Knowledge of Smart Data access is an added advantage 
•   Knowledge of using Currency Conversion functions is an added advantage 
•   Good Knowledge on the Change  & Transport Management of the HANA models across the Landscape
 
Vignesh
Sr. Technical Recruiter
Artech Information Systems LLC
360 Mt. Kemble Avenue, Suite 2000 | Morristown, NJ 07960
Office: 973.967.3507| Fax: 973.998.2599
Email: vignesh.v@artechinfo.com | Website: www.artechinfo.com

Digital Forensic Analyst

Title: Digital Forensic Analyst
Location: Morrisville NC
Duration: 06 - 07 Months Contract to hire
Pay rate: $47/hr on W2, Conversion Salary is 85k/Annum.
 
"US Citizens and those authorized to work in the US are encouraged to apply.  We are unable to sponsor Visa's at this time." 
 
Job description:
Client is seeking a Digital Forensics Analyst to join our team of qualified, diverse individuals. Put your years of experience into a future of excellence. The qualified applicant will become part of Northrop Grumman's team of professionals supporting the United States Postal Service (USPS). The Digital Forensics Analyst position will be located in Morrisville, NC. This is an onsite position with no telework possibilities
 
Roles & Responsibilities:
  • Performs a variety of highly technical analyses and procedures dealing with the collection, processing, preservation, analysis, and presentation of computer-related evidence, and is responsible for disseminating and reporting cyber-related activities, conducing vulnerability analyses and risk management of computer systems.
  • Recovers information and electronic data from computer hard drives and other data storage devices, such as zip and flash drives that have been deleted, damaged or otherwise manipulated.
  • Utilizes forensic tools and investigative methods to find electronic data, including Internet use history, word processing documents, images and other files.
  • Assists law enforcement officers in helping to solve cybercrimes or find electronic evidence of other kinds of crime..
 
Basic Qualifications: 
To be considered for this position, you must minimally meet the knowledge, skills, and abilities listed below:
  • Bachelor degree in Information Technology, Computer Science, MIS, or related discipline
  • A minimum of 5 experience in the security aspects of multiple platforms, operating systems, software, communications, and network protocols along with malware analysis in support of incident analysis and response.
  • Familiarity using forensic tools and investigative methods to locate specific electronic data.
  • Proficient in the latest forensic, response, and reverse engineering skills and astute in the latest exploit methodologies.
  • Must be able to obtain a Position of Public Trust Clearance - US Citizenship or Permanent Resident (Green Card Holder) is required
  • Must not have traveled outside the United States for a combined period of 6 months (or longer) within the last 5 years; and must have resided in the United States for the last 5 years
  • Position is based in Morrisville, NC and does not provide relocation assistance                                                   
 
Preferred Qualifications:
Candidates with these preferred skills will be given preferential consideration:
CERTIFICATIONS: (One or more desired)
  • GCFE – GIAC Certified Forensic Examiner.
  • GCFA – GIAC Certified Forensic Analyst (better than -GCFE).
  • GREM – GIAC Reverse Engineering Malware.
  • Encase, SANS Institute Forensic Toolkit (SIFT) or FTK vendor certifications and product experience
Anil Kumar | Recruiter | Email: k.anil@softpath.net
Work: (404) 315-1555 Ext.  638| Fax: (404) 315-1558
Softpath System LLC | 3985 Steve Reynolds Blvd | Bldg C| Norcross GA 30093
www.softpath.net               

Tuesday, May 23, 2017

Sr Security Analyst

Location: Merced, CA
Duration: 6 Months (possible extension)
Start: end of June
Process: 2 interviews (skype for national/regional subs, F2F for local)

Why Open: Client is in the middle of security remediation and upgrading of their existing systems and needs a security analyst to serve in partial hands-on, partial project management-type role to ensure that the project is completed and kept within scope. There is a large volume of work and not enough in-house support to get the work done. This person will be involved in the implementation of a new Endpoint Mgmt system (Fireeye) which is to replace the legacy Fidelis system currently in place. They’ll be implementing a robust automated Windows patching system (WSUS, Group Policy, SCCM), developing and testing infrastructure for mobile device encryption (Bitlocker, Filevault), moving the campus VPN service from Cisco to Palo Alto, as well as testing and deploying advanced malware protection software. The project will also include implementing regular Nessus scans of medium-security networks and working with system owners to remediate findings, remediating 30+ Windows and UNIX systems/services using deprecated SSL/TLS encryption protocols as well as remediating 30+ Windows and UNIX systems/services using outdated/unsupported web servers and decommissioning legacy Mailman and SMTP services. Finally, they will participate in a DR remediation, completing the DNS diversification, redundancy, and availability project as well as the migration/consolidation/mothballing of systems in support of decommissioning the Castle datacenter.

Skills:
Sr Security Analyst - MUST
Project Mgmt experience – MUST
Fireeye Endpoint – MUST
Experience with a blended OS environment – MUST
Mobile Device Encryption (Bitlocker) - MUST

Palo Alto – Plus
Fidelis – Plus

Job Description from Client:


Endpoint Management:
•             Implementing a robust automated Windows patching system (WSUS, Group Policy, SCCM)
•             Developing and testing infrastructure for mobile device encryption (Bitlocker, Filevault)
•             VPN Migration - moving campus VPN service from Cisco to Palo Alto
•             Testing and deploying advanced malware protection software

DDI Pentest Remediation
•             Implementing regular Nessus scans of medium-security networks and working with system owners to remediate findings
•             Remediate 30+ Windows and UNIX systems/services using deprecated SSL/TLS encryption protocols
•             Remediate 30+ Windows and UNIX systems/services using outdated/unsupported web servers
•             Decommission legacy Mailman and SMTP service

DR Remediation
•             Complete DNS diversification, redundancy, and availability project
•             Migration/consolidation/mothballing of systems in support of decommissioning the Castle datacenter

__________________________________
Chris Rulfs
Senior Recruiting Executive, Information Technology Oxford International
2105 S. Bascom Ave Suite 390
Campbell, CA 95008
408.369.8054 Office