Thursday, November 30, 2017

Information Security Engineer

Position:          Information Security Engineer
Location:         San Jose, CA
Duration:         12+Month
Client:              eBay

Information Security Engineer--EBAYJP00014753

eBay information security is looking for a candidate who will assist with the design, implementation, security and ongoing support of the cyber security tools and processes within their Global Information Security Team.
This position will work directly with teams inside and outside of GIS as part of our overarching data security strategy for corporate and marketplaces Threat Management and Response, Data Science, and GRC initiatives.
The ideal candidate will have a passion for cybersecurity, system monitoring and analysis, and developing/automating creative solutions. As a Security Engineer, you will be expected to be skilled at identifying security gaps in infrastructure and process, effectively execute projects/initiatives to address them, demonstrate excellent judgment, prioritization and communication of technical security risks, and act as a security liaison supporting business units.

Key Responsibilities may include:
Good understanding of network LAN / WAN Concepts like TCP/IP, STP, VLAN, Inter VLAN Routing, NAT, PAT, Access Lists (ACL)
Proficient in designing the network architecture for any tool that requires a distributed deployment
Good understanding of Packet capturing and Network Aggregation Technologies (TAPs) such as Arista, Gigamon etc
Good understanding of Packet capturing, filtering and analysis at the network and endpoint level
Good knowledge on data center and corporate network topology models such as leaf-spine, hub-spoke etc..
Provide technical inputs, evaluate and recommend new and emerging security products and technologies
Defines security configurations for threat detection and prevention tools
Designs automated workflows to streamline security operations
Monitors and proactively manages supported products and services to assure their performance, availability, security, and capacity.
Researches, analyzes, and formulates recommendations regarding technologies, products,
and solutions to fulfill requirements within the enterprise.
Security tool administration and support(Network/Endpoint/Threat Hunting/Investigations)
Tool deployment and implementation experience on a global scale
Knowledge of system and network architecture and interrelationships (technical and functional).
Designs, implements, configures, and manages solutions within the supported Linux technologies, products, and services.
Research and recommend innovative and automated approaches for operational tasks, which leverage available resources and simplify operational overhead.

Job Requirements
Basic Qualifications:
Minimum 3-5 years of experience in Security Administration
Minimum 2-3 years of experience in Network Administration
Must be well organized and able to leverage best practices, able to thrive in fast-paced environment, and, most importantly, have the ability to approach problems with an innovative, can-do attitude
Demonstrates the ability to analyze and resolve issues independently
Knowledge of project management tasks, experience creating application documentation, and demonstrated ability to train other team members.
Manage maintenance, enhancements and upgrades for supported security systems using standard project methodology
Scripting knowledge is a plus (python, shell)
Bachelors Degree preferred
Preference for at least one current recognized security professional certification such as CISSP, GIAC
Experience in working in a highly dynamic large scale enterprise
Knowledge of security vendors and security product capabilities

Professional Skill Requirements:
Good organizational, multi-tasking, and time-management skills
Ability to successfully pass a client background screening if required
Proven ability to work independently and as a team member
Good communication (written and oral) and interpersonal skills
Ability to work with multiple teams in a fast paced environment


Shiva Krantha Goud
IT Recruiter
NextGen Technologies Inc || 1735 N 1St., Suite 308 || San Jose, CA 95112
Desk: 408-709-1567

Wednesday, November 29, 2017

Information Security Analyst

Title: Information Security Analyst (Threat Response)
Duration: Fulltime
Location: Menlo Park, CA

Description:
·         Incident response
·         Mid-level generalist
·         Response, malware
·         Someone who is going to a leader
·         At least one relevant industry certification or willingness to obtain one within the first calendar year – GCIH, CCIA, GIAC, CISSP, CISM, CISA
·         Will pay for it
Notes:
·         3 years or more in Information Security and more than 2 years in an incident response, SOC Analyst, or penetration tester role
OR
·         2 year of Information Security– junior mixes


Venkat Kuntla
Technical Recruiter | Feuji, Inc

Security Systems Engineer

Security Systems Engineer 
The Security Systems Engineer is responsible for safeguarding information system assets by identifying and solving security problems. This position will work with IT, Security, and other Engineering staff to implement and maintain Security infrastructure that meets company and regulatory compliance initiatives. The Security Systems Engineer will also serve as a technical Operations Security expert and support other Operations Security resources in their tasks. 

Duties? ?and? ?responsibilities 
Secures Climate information by planning, implementing, and testing security systems; preparing and updating security procedures; mentoring team members.
? Protects system by defining access privileges, control structures, and resources.
? Implements security improvements by assessing current situation; evaluating trends;
anticipating requirements; recognizes problems by identifying abnormalities; reporting
violations.
? Identifies security violations, deficiencies, and inefficiencies through periodic audits and regular monitoring. Ensures authorized access by investigating improper access; revoking access; reporting violations; monitoring information requests by new programs; recommending improvements.
? Builds and upgrades systems to implement, and maintain, security controls.
? Keeps users informed by preparing performance reports; communicating system status.
? Maintains technical knowledge by attending educational workshops; reviewing  publications.
? Contributes to team effort by accomplishing related results as needed.
? Establishes system access by issuing IDs; coaching client on password construction and  usage.
? Analyzes access by utilizing logs, termination and transfer tickets, automated ID status reports, user ID validation, and user behavior analytics to summarize access trends and  find anomalies.
? Accomplishes information systems and organization mission by completing related
results as needed. 

Qualifications 
Preferred Qualifications include: 
? B.S. degree in Security, Engineering, or Computer Science, related field, or experience
? 3+ years experience in IT/Operations Security, Network Security, or Computer Systems
? Releveant and verifiably current IT / cyber security certification is desired, such as GIAC,
CISSP, CISM, Security+, CEH, etc.
? Network and/or Infrastructure Security
? Cloud Security
? Vulnerability Management
? Incident Response
? Identity and Access Management 

Rebeca Barbosa
Technical Recruiter

Monday, November 27, 2017

Project Manager

Position: Project Manager (Project Coordinator)
Location: Cupertino, CA
Duration: 6+ Month Contract


KEY RESPONSIBILITIES:

The Project Manager's responsibilities include, but are not limited to, the following:

(1) Working with R&E and KTC cross-team members to drive data collection and loading processes

 Work with Data Systems Engineer and Senior Project Manager to create and maintain project plans to ensure

completion of projects in timely manner

 Support Data Collection Specialist to ensure dashboards are updated and communications with network is properly

triaged

 Ensure proper personnel and resources are assigned to various tasks to meet deadlines

(2) Support requirement generation for product enhancements, with a particular focus on automated collection, loading,

storage and surfacing of high quality data

 Support Data Systems Engineer and Sr Assessment Product Manager in translating user stories into requirements

 Support Data System Engineer and Sr Assessment Product Manager ensuring technical solution proposals from IT and

RE meet user requirements

(3) Develop test cases and participate in testing of product enhancements

 Draft test cases to test new functionality and confirm data quality

 Ensure proper personnel and resources are assigned to testing to meet deadlines

 Participate in testing of enhancements

(4) Provide support as needed to other R&E teammates on additional high priority project



REQUIRED QUALIFICATIONS:

 3+ years experience in technical project management

 Expertise in SQL, MSSQL experience a plus

 Expertise in developing requirements and test cases as part of product life cycle

 Ability to communication effectively with both technical and non-technical staff

PREFERRED QUALIFICATIONS

 Experience in any or all of the following: python, jira, SVN, Saleforce


Melissa Villalobos 
Phone: (415) 729-1630    Email: melissa.villalobos@mondo.com    Website: mondo.com
Address: 250 Montgomery St Suite 610 San Francisco CA 94104 

Sunday, November 26, 2017

Security Engineer

Job Title: Exciting Job Opportunity – Rose Opening # : 270740 - Job Title : Security Engineer 
Company: Rose International 

Security Engineer 

Location: San Francisco, CA 94103 

Duration: 8 months 

​ 
The Security Systems Engineer is responsible for safeguarding information system assets by identifying and solving security problems. This position will work with IT, Security, and other Engineering staff to implement and maintain Security infrastructure that meets company and regulatory compliance initiatives. The Security Systems Engineer will also serve as a technical Operations Security expert and support other Operations Security resources in their tasks. 

​ 
Duties and responsibilities: 

- Secures information by planning, implementing, and testing security systems; preparing and updating security procedures; mentoring team members. 

- Protects system by defining access privileges, control structures, and resources. 

- Implements security improvements by assessing current situation; evaluating trends; anticipating requirements; recognizes problems by identifying abnormalities; reporting violations. 

- Identifies security violations, deficiencies, and inefficiencies through periodic audits and regular monitoring. Ensures authorized access by investigating improper access; revoking access; reporting violations; monitoring information requests by new programs; recommending improvements. 

- Builds and upgrades systems to implement, and maintain, security controls. 

- Keeps users informed by preparing performance reports; communicating system status. 

- Maintains technical knowledge by attending educational workshops; reviewing publications. 

- Contributes to team effort by accomplishing related results as needed. 

- Establishes system access by issuing IDs; coaching client on password construction and usage. 

- Analyzes access by utilizing logs, termination and transfer tickets, automated ID status reports, user ID validation, and user behavior analytics to summarize access trends and find anomalies. 

- Accomplishes information systems and organization mission by completing related results as needed. 

​ 

Qualifications 

- B.S. degree in Security, Engineering, or Computer Science, related field, or experience 

- 3+ years experience in IT/Operations Security, Network Security, or Computer Systems 

- Relevant and verifiably current IT / cyber security certification is desired, such as GIAC, CISSP, CISM, Security+, CEH, etc. 

- Network and/or Infrastructure Security 

- Cloud Security 

- Vulnerability Management 

- Incident Response 

- Identity and Access Management 

Sameer Soni 
Recruiter 
Phone: (636) 812-4000, Ext.: 6740 | Fax: (636) 812-0078 
E-mail: ssoni@roseint.com 
www.roseIT.com

Thursday, November 23, 2017

Security Engineer

Job Title: Looking for a security engineer For SVB At Santa Clara CA 
Company: chauhan 

Salary: $65 per hour 
Description: 
Looking for someone who is familiar with the following and has at least 3 years of security experience. 
• Familiar with Agile and Waterfall Software Development Life Cycle 
• Familiar with security tools like Brup Suite, OWASP zap, and Checkmarx’s 
• Familiar with Jira and updating cases 
• Basic understanding of certificate and TLS encryption 
• Strong knowledge of browser security model, mobile app security, and network security. 
• Experience with security tools for static analysis, dynamic analysis, penetration testing, and intrusion detection. 

Aayush Chauhan 
Sr. Technical Recuiter 
Phone – 650-542-8100 Ext. 250 
Direct – 408-703-7393 (Call/ SMS) 
aayush_chauhan@ubertal.com 
Ubertal | 1730 South Amphlett | Suite 250 | San Mateo | CA 94402 USA | Ubertal.com

Tuesday, November 21, 2017

Security Analyst

Position Title:                                                  Security Analyst
Work Location:                                                Honolulu HI
Duration:                                                         Full Time 

 
REQUIRED CERTIFICATES.
Information security related certification(s) such as CISSP, CISA, CISM desired, but not required.
Job Description:
3 to 5 years’ experience in an information security program performing various information security activities, assessing security controls and incident response work history that includes selection and implementation of security controls; experience with risk management and NIST; previous work in an environment that includes multiple projects and programs; experience with assessing HIPAA security rule controls is preferred; and experience in public sector or human services business domain is preferred.

Job Description:
·         Support DHS activities to ensure compliance with security standards and guidelines established by DHS.
·         Perform activities that comply with enterprise standards and requirements, and achievement of operational goals and objectives.
·         Works with other individuals within the Privacy and Security Compliance Office, DHS divisions and offices to adhere and comply with documented security policies, procedures, standards, and guidelines.
 Participates in design sessions and discussions with vendors to determine whether planned implementations meet the security and privacy requirements. Identify weaknesses and offer potential solutions to mitigate risks.
·         Supports problem resolution related to security incidents and security operations, and assist with the development of workable solutions.
·         Participates in a variety of activities with the Office of Enterprise Technology Services (ETS) to understand and contribute to the State’s overall management of security incidents and DHS security operations.
·         Performs data gathering in support of project status reports to the DHS teams, Operations Committee and Executive Steering Committee. Support activities to identify and mitigate identified risks.
·         Utilizes appropriate departmental staff as well as outside resources to seek the proper knowledge, skills and abilities required to carry out the objectives/activities of assigned projects and tasks.
·         Maintains active and open communications with security team and consultants/contractors as needed ensuring effective coordination and integration of projects.  Provides teams with constructive feedback as it pertains to project security.
·         Information security principles, methodologies and practices as they relate to the following information security activities:  access control, application security, business continuity and disaster recovery planning, cryptography, risk management, legal and regulatory constraints, compliance, investigations (eDiscovery), operations security, security architecture and design, telecommunications and network security; good understanding of information security aspects of large, complex IT systems and applications; MARS-E, MITA, NIST Special Publications 800 Series (preferred); and public sector or human services business domain (preferred).
·         Review and ensure the quality of security artifacts; obtain and analyze facts, identify risks and potential mitigation strategies; resolve conflicts fairly and consistently; exercise judgment and make logical and objective decisions; work independently and in a team; gain the confidence and cooperation of others; juggle multiple/conflicting priorities; and communicate effectively both orally and in writing.

Sarah Watson
E TalentNetwork
http://etalentnetwork.com
8251 Greensboro Drive, Suite 250
Mclean VA
sarahw@etalentnetwork.com
(703) 373-7340 Ext.395

Security & Privacy Compliance Analyst

Job title: Security & Privacy Compliance Analyst
location: Honolulu, HI

Client: State of Hawaii, Department of Human Services (DHS)
Onsite Position
 
Security and Privacy Compliance Analyst – The Security and Privacy Compliance Analyst works under the Information Security and Privacy Compliance Officer and serves as the lead on operational security compliance activities. This position works with various divisions and staff offices to assess whether their operations compliant with established policies and procedures and works with the operations to implement corrective actions.
 
Scope
The State of Hawaii (State) Department of Human Services (DHS) is issuing this Request for Quotation (RFQ) for a Vendor to provide specialized information technology services (labor support) under the direction of DHS for a period up to one year for the following positions in the Department’s Project Management Office (PMO) and Information Security and Privacy Compliance Office: The selected vendor must provide personnel who will work full-time on-site at DHS and work under the direction of DHS management. The selected vendor will provide one individual per position and must not assign substitute personnel without prior approval by DHS. Any individuals assigned to DHS must be technically, managerially, and financially independent from any DHS contractors providing services on any of the PMO projects including the ESI, any ASIs and Independent Verification and validation (IV&V). Specifically, any assigned individuals should not have any relationship as either an employee, contractor or subcontractor with any of the ESI, ASI or IV&V contracts with DHS. Additionally, any individual working for DHS under this contract will be prohibited from working on any ASI, ESI or IV&V contracts for up to one year from the individual’s termination date under this contract. This prohibition does not apply to individuals under the contract seeking to work for the Department in an established position.
 

Raul Smith

E TalentNetwork
8251 Greensboro Drive, Suite 250
Mclean, Virginia – 22102
Direct: 1-703-373-7330 Ext: 272
Email: rauls@etalentnetwork.com
Website: http://etalentnetwork.com

Monday, November 20, 2017

Cyber Security Threat Analyst

Job Title:          Senior IT- Cyber Security Threat Analyst/Specialist
Location:          1030 Detroit Avenue, Concord, CA 94518
Duration:         6+ months (possible extension)
Job ID:             9720 
 
Job Description:
  • Acts as a lead in area of field.
  • Analyzes malware/exploits and/or network traffic through forensics, observation of network traffic and using other tools and resources to determine if PG&E systems are vulnerable.
  • Knowledgeable in area of field and applies knowledge of concepts, principles, and practices.
  • Performs proficient forensic analysis using security tools and monitoring systems to Client the source of anomalous security events.
  • Assists in performing intelligence research for attack attribution.
  • Supports SIOC management in driving the Intelligence Driven Defense model
  • Based on IOC-based SIEM alerts, provides rapid assessments of potentially imminent security situations, sensitive developments and complex threat issues
  • Utilizing technical security tools, perform hunting for malicious activity across the network and digital assets
  • Attribute cyber-related attacks with actors, malware types or campaigns
  • Respond to computer security incidents and conduct threat analysis
  • Identify and act on malicious or anomalous activity
 
Skills:
  • NERC access is required for this role.
  • The work start hours are flexible and candidates can start as early as 5:00 a.m. or as late as 9:00 a.m.
  • Degree in Cybersecurity, IT, Intelligence, a related discipline, or equivalent experience
  • Certs or equivalence equivalent to WCNA, CompTIA Security +, Cisco CCNA, SANS GCIH, GMON, or other relevant Cyber Security certifications
  • Experience in Information Technology (IT) or Technical Intelligence

Arvind
Associate Recruiter

Artech Information Systems LLC
360 Mt. Kemble Avenue, Suite 2000 | Morristown, NJ 07960
Office: 973.967.3595 Cell: 408.601.4917
Email: 
Arvind.M@artechinfo.com | Website: www.artechinfo.com

Product Security Engineer


Company: Xoriant 

Job Title: Product Security Engineer /Developer/Architect 
Santa Clara, CA or Waltham, MA. 

Notes: 
1) 5+ years of software security and/or software development experience is required: which means open for Devs 
2) Career must be in security or software development 
3) The primary job responsibilities of the Product Security Assurance Engineer are analysis, test, and reporting. This requires strong IT knowledge, to manage, configure, and administer Windows and Linux servers, and strong network knowledge. : This is a KEY POINT 

Job Overview: 

Evaluate Security features/capabilities for HitachiVantara products, evaluate competitiveness of current Security Offerings (i.e. product / services), assess the security posture of products, guide product-based security certifications, and implement product security strategy elements. Create and maintain business plans for the life-cycle of the security offerings. 

The Product Security Architect provides guidance on the future / current direction for design, implementation and lifecycle of Information Technology Security offerings (Hardware, Software and Services). Work closely with HitachiVantara security strategy and planning personnel (e.g., CISO). 

Serves as a security expert for sales teams, customers and professional organizations in various technologies and platforms that effect infrastructure (such as applications, solutions, virtualization, cloud, storage, networks, data centers, computing devices, messaging, monitoring systems, etc.) as well as specific areas (cyber security and information assurance; data privacy, compliance, and legal; protection of information assets and systems from current and emerging threats). 

The Product Security Architect contributes to the development and maintenance of information security strategy and architecture at the corporate level; and may provide support across other product / service offerings, ensuring the implementation and operation of the appropriate security controls across the product/service offerings are commensurate with systems and information risk and are aligned with IT security policies and standards. 

Job Functions: 

1. Evaluate product security (i.e. products, services, and solutions) based upon criteria defined by Security Industry Standards Organizations, USA and EMEA Government Security Organizations, Customer Requirements and Vertical Market Best Practices – 30% 
2. Develop and/or Coordinate the development and delivery of security training for the development community – 20% 
3. Coordinate the security aspects of the launch of new products and product upgrades with all impacted groups within the company – 20% 
4. Assist TechOps with managing the scheduling / prioritization of hardware products for security characteristics and compliance – 20% 
5. Perform other duties as assigned by Director of Product Security – 10% 

Interprets information security policies, standards, and other requirements as they relate to product and service offerings and assists or oversees the implementation of product security requirements. 

Acts as a liaison for the internal or external parties requesting guidance, information and input on future/current Security offerings 

Acts as a technical consultant on information security items for solution development, service delivery and customer sales activity. 

Establishes and maintains strong working relationships with groups involved with information security matters such as the Hardware Development, Software Development, Services Development, Legal Department, Internal Audit Department, Physical Security Department, Information Technology Department, Information Security Council, HR and all outsourced IT organizations. 

Primary Qualifications: 

Bachelors degree in a technical related field and minimum 8 years of recent relevant experience 

A minimum of 5 years of proven broad in-depth technical knowledge of Security concepts, principles and process is required. 

A minimum of 5 years of experience in and a strong understanding of infrastructure, application and security appliance functionality using strong security practices 

Hold the (ISC)2 CISSP professional certification, or be able achieve this certification within 3 months of employment. In addition, at least one of the following Professional certification(s) required ISACA CISM, ISACA CISA, CCIE, (ISC)2 concentration certification (i.e., ISSAP, ISSMP, or ISSEP), or SNIA SCSE, with a preference for ISACA CISA. 

Possess the relationship skills, cultural awareness, and organizational prowess required to work effectively in a large, highly-matrixed organization. Capable of delivering results through a position of influence, not authority. 

Adept at communicating complex concepts to diverse audiences with varying skills sets. 

Narendra Kunware