Monday, March 12, 2018

Security Consultant

Job Title: Cyber Security Consultant
Location: : Monday – Thursday  (Onsite - Pineville, LA  ) and Friday work remotely
Duration: 12 Month with Possible Extension

Travel and Lodging are Paid


·         Any certification is required (GSEC OR GCIH OR GCIA OR GIAC OR GMON OR GIAC )
·         Certified Information Systems Security Professional (CISSP) accreditation is desirable.

Key responsibilities
·         Identify weaknesses and potential threats to existing information security toolsets.
·         Perform continual testing on current systems to determine potential problems or security threats.
·         Prepare reports for internal and external clients detailing the security issues, making recommendations and identifying solutions.
·         Conduct cloud security reviews and network security assessments.
·         Provide advice on hacking tools and techniques including advanced malware detection.
·         Formulate an IT security incident response strategy and implement a method of notifying parties.
·         Keep up to date with the latest thinking on secure coding and cyber-security issues.
·         Support the business with a range of compliance requirements.

Key skills
·         There are a range of hard skills that employers are looking for in their security consultants. These include but are not limited to:
·         Network administration skills to test internal systems such as firewalls and IPS/IDS devices to ensure networks are safe.
·         Standards related to implementing a risk management framework including COBIT, ITIL, ISO 27001/2 and NIST.
·         Windows, UNIX and Linux operating systems.
·         Encryption technologies, ethical hacking and penetration testing.
·         Compliance skills in relation to key legislations such as the Health Insurance Portability & Accountability Act (HIPAA), The Sarbanes-Oxley (SOX) Act of 2002, Payment Card Industry (PCI), The National Institute of Standards and Technology (NIST) and The Gramm-Leach Bliley Act (GLBA) and compliance assessments.
·         Ability to manage the Internet protocol suite which is the computer networking model and set of communications protocols used on the Internet including TCP and IP.

Softer skills include:
·         Ability to work as part of a team but also independently and on own initiative.
·         Flexible approach to tasks that may change daily.
·         Analytical ability to break down problems into constituent parts.
·         Solid communication skills and expertise to translate technical jargon into business familiar language.
·         Proven ability to audit an IT environment and provide security and process recommendations.

·         Three to five years' experience of working on security projects for major organizations is desirable.
·         Solid understanding of security assessment and management is required.
·         Security design, architecture and implementation is necessary.
·         Compliance management is essential.
·         Great project management and communication skills is a requirement.
·         In-depth knowledge of data protection regulations and technology supporting fraud detection.
·         Regular risk auditing and monitoring of systems.
·         Compliance implementation, testing and reporting.
·         Designing and testing of new IT solutions.
·         Provision of business support at a high level and to a range of key stakeholders in relation to ongoing security improvements.
·         Crisis management where required.
·         Project management and project architecture.
·         Review and analysis of delivered projects.

Nimesh Singh Rathore
Technical  Recruiter

Friday, March 9, 2018

Security Developer

Job Description:
Position: Security Developer
Location- Pleasanton, CA
  • 10-12+ years’ experience in building Web application using Java.
  • Experience to Architect/design/fixing code across Web applications
  • Strong Hands on Experience in Java code development related to Web Application Security.
  • Must have strong understanding of security vulnerabilites like
    • Brute Force/DOS/DDoS attack
    • Anti automation protection
    • Unpatched library 
    • Encryption/decryption concept
    • Cookie security
    •  Input validation flaws, such as:
      •  SQL injection
      • Code injection
      • Remote code execution
      • E-mail injection
      • Directory traversal/Path traversal
      • Cross-site scripting in web applications
      • HTTP header injection
      • HTTP response splitting
    • Privilege-escalation bugs, such as:
      • Cross-site request forgery in web applications
      • Clickjacking
      • Privilege escalation
  • Provide engineering designs for new software solutions to help mitigate Frond End security vulnerabilities
  • Contribute to all levels of the architecture
  • Maintain technical documentation
  • Consult team members on secure coding practices
  • Develop a familiarity with new tools and best practices
  • Adequate knowledge of web related technologies (Web applications, Web Services and Service Oriented Architectures)
  • Interest in all aspects of security research and development

Rashmita sadangi| AVTECH Solutions Inc.

Thursday, March 8, 2018

Security Engineer

Job Title : Security Engineer, Sr. /Network Security Engineer
Location :  San Francisco, CA, United States
Duration:  6+ Months  


The Lead Security Engineer reports to the Director of Data & Infrastructure Protection, and is a member of a larger Security Engineering and Operations (SecOps) organization that designs, deploys and operates security tools.
The Engineer will also be architecting solutions and services deploying security in depth across client.

What you'll do

• You'll be pushing the boundaries of security technology to create defenses for large scale production infrastructure, enterprise systems, and cloud services
• Provide subject matter expertise on architecture, encryption, and systems security
• Lead in security project initiatives and liaison to DevOps for security best practices
• Perform security assessments of production, corporate, and cloud infrastructure
• Harden our clients, servers, and networks against exploitation and privilege escalation
• Instrument systems to enable detection of intrusions and abuse
• Create services and tools to secure our data

What you'll need

• Bachelor's degree in Computer Science or a related discipline
• 5+ years of experience building secure systems, networks and infrastructure
• In-depth knowledge of vulnerability assessment tools (e.g. Qualys, Rapid7, etc.) and system hardening
• Strong knowledge of encryption and tokenization technologies
• Proficient in at least one scripting language (e.g. Python, Ruby, etc.)
• Strong Knowledge of DBMS security
• Desire to automate manual tasks via Chef, Puppet
• Experience with incident response and forensics a plus
• Experience with DevOps a strong plus
• Experience with securing cloud computing platform (e.g. Amazon AWS, Microsoft Azure, Google App Engine, etc.)
• Certificates: CISSP, CEH, OSCP preferred

Madhu Kumar 
Sr. Technical Recruiter - Recruitmentsmailto:
Contact No.: 510-370-4593
Website –
39600 Balentine Drive. Suite 200 Newark, CA 94560

Java developer

Job Title: - Java developer (Local Candidate Preferred)
Location:  - Sunnyvale,CA (Walk-in)
contract Position
No Sponsorship, No Remote/Telecommute
Qualifications, Skills & Requirements: - 

Java Developer (multiple roles) walk in drive - 3/10/2018 - Local Candidates Prefered
 Experience - 5+ yr

Technical recruiter

Enterprise Solution Inc. 

Tuesday, March 6, 2018

Info Security Engineer

Job Title: Info Security Engineer (Looking for W2 Consultants)
Location: Charlotte, NC/ San Francisco, CA
Duration: 12 Months Contract  
Job Description/Comment:
  • We are seeking Info Security engineers with a broad technology experience (network, OS, and programming) along with a cyber-security background.
  • The selected candidate will be part of a broad technology hygiene service actively involved in the identification, tracking, and remediation of technology defects observed during normal cyber security hunting and monitoring operations.
  • He or she must also be able to effectively convey an observed defect to a wide audience, and coordinate the resolution of the defects identified.
Additional Job Details:
•10+ years of information security applications and systems experience
•1 + years of experience with network security, endpoint security, or security threat vectors
•2 + years of Regular Expression (regex) experience
Top 3 skills desired:
  • Security Information and Event Management (SIEM/SIM/SEM) experience (Splunk experience preferred)
  • Knowledge and understanding of data security controls including malware protection, firewalls, intrusion detection systems, content filtering, Internet proxies, encryption controls, and log management solutions
  • DPI (Deep Packet Inspection) and/or full packet capture solutions experience
Desired Qualifications: 
•3+ years of Security Information and Event Management (SIEM/SIM/SEM) experience
•Hands-on experience with information security tools such as an enterprise SIEM solution, IDS/IPS, endpoint security solutions, email/web security gateways, and other security detection/mitigation devices •Experience with host-based and/or network-based forensics tools and techniques
•Experience with host and/or network log analysis as applied to incident response / threat hunting
•Knowledge of offensive security, with the ability to think like an adversary when hunting and responding to incidents
•Strong ability to identify anomalous behavior on endpoint devices and/or network communications
•Strong experience in operating system and application security hardening and best practices
•Strong investigative mind-set with an attention to detail
•Experience with multiple operating systems to include Windows, Mac OS, and Unix/Linux
•Demonstrate the ability to provide written and verbal communications to management to address real-time issues and incidents, including writing formal incident reports
•Advanced problem solving skills, ability to develop effective long-term solutions to complex problems
•Certifications in one or more of the following: Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), GIAC Reverse Engineering Malware (GREM), GIAC Certified Forensic Analyst (GCFA), GIAC Network Forensics Analyst (GNFA), Offensive Security (OSCP/OSCE/etc), or other relevant certifications.
•3+ years of experience with full packet capture solutions.

Pratik Pitale
(973) 507-7571

Security Engineer

Position: Security Engineer
Location : San Francisco, CA
Type Of Hire : Contract
Duration :  12+ Months

Required: GC/USC/EAD

Job Description
  • The Security Engineer coordinates security responses with and trains engineers from other groups within the IT Function such as the MIS team, the NOCC, Network Engineering and the Production Support organization.
  • This role requires availability for off-hour support and travel within the continental Unites States as needed.

Job Responsibilities:
 The primary responsibility of the Security Engineer is information security incident management. This includes:
 Responds to information security incidents in a quick, effective and orderly manner
 Monitors systems, alerts and vulnerabilities
 Collects evidence for administrative follow-up or legal action
 Conducts postmortems, enhancing controls and training others
 Analyzes security incidents and reports finding to management
 Documents and maintains the following types of procedures:
 Recovery procedures that address specific classes of security incidents such as malicious code, denial of service attacks, breaches of confidentiality and internal misuse of information systems
 Contingency plans for system recovery that identify the cause of an incident, detail how to contain the threat and identify corrective action for preserving live systems data
 Guidance on how to collect forensic evidence for civil or criminal proceedings
 Emergency actions and control procedures that will reduce the likelihood of recurrence

 Familiarity with Unix/Linux, Windows Active Directory, OWASP, Network protocols and how to secure them.
 Familiarity with Net screen, Palo Alto, Checkpoint or other Firewall technologies, various IDS/IPS and SEIM systems. Experience implementing information security controls
 Knowledge of other Security systems such as DLP, Application scanning, or Vulnerability assessment.
 Demonstrated flexibility in approach and in developing solutions
 Demonstrated ability to work independently as well as a member of a team
 Demonstrated analytical skill, technical knowledge and practical application of information security at a business aware and technical level
 Ability to explain complex IT concepts in non-technical terms
 Demonstrated flexibility in approach and in developing solutions
 Experience in the Financial Services industry and solid understating of SOX, PCI and SDP compliance requirement
 Take charge personality, and the ability to drive a plan to completion
 CISSP certification is highly desirable. Other industry standard certifications such as MCSE, CCSE, CCNA, CEH, Security+ or SANS also desirable.

Experience / Education:
 Bachelor's degree (B.S.) in Computer Science or equivalent job experience
 Minimum 3 years security experience in implementing security solutions and processes
 Minimum 5 years’ experience of implementation and maintenance some of the following IT systems, with a security focus; Windows 2008, 2012 server, Remote Access solutions, SSL/IPSEC VPN services, border routers security, firewalls, IP/VoIP network, DNS, WINS, IP network, TCP/IP, SSL certificates and Intrusion Detection System (IDS), IDS Alerts, and IDS signature upgrades, local and wide area networks

Physical Demands and Work Environment:
Representative of those that must be met by an employee to successfully perform the essential functions of this job. Must be able to operate a PC and sit for extended periods of time. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

Ankur Bhatnagar
Senior IT Recruiter
Nora Logic Inc.

Friday, March 2, 2018

Information Security Analyst

Title                :  Information Security Analyst
Location         :  Eugene, OR
Duration        :  Full Time (permanent position)

Position Overview
Responsible for oversight of monitoring, detection, alerting, and responding to threats and threat alerts to the Credit Union information.

Essential Functions
  1. Implement, and administer the life cycle of information security systems, including, but not limited to: vulnerability scanners, Security Information Event Management (SIEM) systems, antivirus solutions, and physical and virtual testing environments.
  2. Develop, document, and maintain procedures for assigned information security systems.
  3. Research information security best practices, vulnerability/exploit trends, & new information security technology.
  4. Investigate and mitigate information security-related incidents, including suspected or confirmed system intrusions and other information security related activity in accordance with adopted policies and procedures.
  5. Regularly collaborate and coordinate with information security analysts at local and partner credit unions regarding information security trends, product evaluations, information security controls, new technologies, and ISP concerns.
  6. Participate in industry collaborative efforts to monitor and discuss emerging information security threat intelligence.
  7. Collaborate with business units regarding the information security risk within business unit activities, and recommend risk mitigation options that align with credit union policies and Information Security Program (ISP)
  8. Participate as a key member of the Cybersecurity Incident Response Team (CSIRT), to include coordinating yearly cyber incident response testing and documenting the results and lessons learned.
  9. Provide regular, ongoing physical and information security training for all employees.
  10. Tests information security controls regularly, including remediation verification testing.
  11. Administer and maintain an enterprise-wide information security vulnerability scanning regimen.
  12. Recommend changes to the Information Security Program (ISP) based on needs and/or best practices.
  13. Function as the information security Subject Matter Expert (SME), including but not limited to providing information security risk expertise toward information system risk assessment activities and participating in the evaluation process for new software and hardware systems.
  14. Lead the effort and coordinate with IT to complete the FFIEC Cybersecurity Assessment Tool (CAT) annually.
  15. Apply basic investigative techniques, including interviewing, validating factual information, and preparing clear and concise reports, written and oral.
  16. Actively engage and communicate with internal, external, and potential members in a friendly, professional manner in person, over the phone, and via e-mail.
  17. Adhere to federal and state regulations, Credit Union policies, and other compliance obligations.
  18. Consistently achieve stated goals.
  19. Actively participate in security, disaster recovery, fire training, and other meetings and training as requested.
  20. Demonstrate leadership skills and maintain Corporate Values, Mission Statement, and Service Promises.
  21. Represent the Credit Union with a high level of integrity and professionalism.
  22. Research, resolve and/or communicate issues and potential problems to management and/or other business units.
  23. Adapt to and endorse change to support Credit Union goals and direction.
  24. Perform other duties as assigned.
Interaction and Environment
Reports To: Information Security Officer
Work areas are inside in a climate-controlled environment with moderate background noise. This position requires travel that may include overnight trips outside the area.  Position requires a flexibility to work extended hours including some weekend and evening hours when needed to provide remote or onsite support for system maintenance and emergency security situations.

Material and Equipment Used
Computer, Fax Machine, Copier, Scanner, Phone, General Office Supplies , Automobile 

Physical Activities Required To Perform Essential Functions
Mobility:  Approximately 80% of time is spent working at a desk.  Balance of time (approximately 20%) is spent moving around work areas.
Speaking/Hearing:  Ability to effectively communicate with others by phone and in person.
Vision:  Ability to effectively use a computer screen and interpret printed materials.
Lifting/Carrying:  Ability to transport files and office supplies up to ten (10) pounds.
Stooping/Kneeling:  Ability to access files in low cabinets and shelves.
Reaching/Handling:  Ability to input information into computer systems and retrieve and work with appropriate paperwork, equipment and supplies.

  1. Excellent written and oral communication skills; ability to communicate effectively and project a professional image when giving and taking information in writing, in person and over the phone.
  2. Ability to effectively present information to top management, internal groups and/or outside parties.
  3. Strong interpersonal skills with the ability to work effectively with individuals and groups at all organizational levels; ability to work independently and as part of a team.
  4. Ability to read, analyze and interpret common security and computer industry publications and technical journals and regulations.
  5. Ability to respond to maintain composure while under pressure.
  6. Ability to define problems, collect data, establish facts and draw valid conclusions.
  7. Ability to interpret extensive variety of technical instruction in diagram form and deal with several abstract and concrete variables.
  8. Ability to take initiative, assume responsibility and prioritize tasks; good time-management, organizational, problem-prevention and problem-solving skills.
  9. Willingness and ability to adapt to changing business needs and deadlines.
  10. Ability to maintain confidentiality of sensitive information.
  11. Possess a work ethic that includes neatness, punctuality and accuracy.
  12. Exhibit a professional, business like appearance and demeanor.
  13. Ability to concentrate in environment with background noise and complete or resume tasks despite interruptions.
Education and Experience
  1. High School Diploma or equivalent; and
  2. At least two (2) years of Information Security experience including use of information security tools and activities (e.g., vulnerability scanning, IDS/IPS, port scanning, penetration testing and remediation, malware analysis, and security alert investigation); and
  3. At least five (5) years of Information Technology experience; and
  4. Certified Information Systems Security Professional (CISSP), or similar certification (e.g. GIAC, CEH); and
  5. Valid Driver’s License; and
  6. Bachelor’s degree in Computer Science, Information Technology, or related field is preferred, but not required; and
  7. Programming experience (e.g. PowerShell, Python, PERL) is preferred, but not required; and
  8. Must be bondable.
Anirudh | Recruiter | Email:
Direct: 678-783-7432 | Work: 404 315-1555 Ext.623 | Fax: 678-302-4488
Softpath System LLC | 3985 Steve Reynolds Blvd | Bldg C Norcross GA 30093