Sunday, July 7, 2019

Back End Developer

Role: Back -End-Developer
Location: San Jose California
Duration: 06 Months
As part of the SDP team, you will work on new technologies and find ways to meet our customers' needs and make it easy for them to do business with us. You will use your expertise to solve complex problems and find unique solutions.

Required :
Strong command of java
Experience with using various java frameworks used for server side development
Solid understanding of network technologies and protocols
Experience with developing web applications in tomcat
Experienced in all aspects of software lifecycle of shipping production software
Experience with source code management tools

Preferred :
Experience with various open source java libraries and technologies
Experience with Distributed message-based applications, protobuf, ZeroMQ
Developing server components that run inside docker containers
Experience with TLS and other networking protocols

If you are interested, qualified, available, planning to make a change, or know of a friend who might have the required qualifications and interest, please call me ASAP at (732) 983-5532 Ext.554 even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you.

Also, please take a few minutes to answer some of the questions below as they will help me qualify your candidature

Full Legal Name as in Driving License/ Passport:
Preferred email ID:
Day/ Evening phone numbers:
Current Location:
Work Authorization:
Earliest availability for Phone/ On-Site interview:
Hourly Rate:
Earliest possible start date:
Two Professional References:

Rohit Thakur
Associate Technical Recruiter
eTeam Inc.
(732) 983-5532 Ext.554

Security Tester

Role : Security Tester
Location : San jose, CA

Job Description:

Knowledge of any Dynamic Application Security Tool. IBM App Scan preferred.

•            Knowledge of administration of the DAST tool will be an added advantage.
•            Must be aware of OWASP Top 10 and other industry security best practices like SANS Top 25.
•            Experience in Secure Code Analysis.
•            Exposure to SCA Tools like Checkmarx, HP Fortify, etc. Preferred Checkmarx.
•            Experience in Mobile Application Security.
•            Good knowledge of Android and iOS.
•            Must be aware of REST APIs and Webservices.
            Preferred, knowledge of customization or automation using APIs exposed by Security Tools.
•            Prior Application Security experience will be preferred.
•            Good communication skills is a must.

Shubham Sharma
Technical Recruiter
Tel: 408-722-9449 
email :

Payment Support

Title: Payment Support
Location: San Francisco CA
Job Description: 
  • This role will be supporting the Payments vertical, and will work closely with various cross functional teams including Engineering, Product, Legal, Finance etc. to develop, troubleshoot, and document technical solutions.
  • Additionally, the role will configure solutions that enable the customer’s products to integrate with 
    our client’s payments backend and perform a variety of functions ranging from monetization to global 
Role & Responsibilities: 
  • Perform necessary configuration and coding to enable and test new payment services 
  • Monitor, identify and troubleshoot technical issues for payment integrations 
  • Utilize debugging tools to fix or triage issues autonomously 
  • Track and project manage launch process for new integrations 
  • Identify opportunities for process improvements 
  • Document new processes and keep documentation up to date 
  • Communicate with multiple cross-functional teams in a clear and effective manner 
Must Have Skills: 
  • Degree in Computer Science, related technical field or equivalent practical experience 
  • Working knowledge on SQL, Linux operating system and a scripting language (Python preferred) 
  • Java programming experience in a source controlled environment 
  • Excellent professional written and verbal communication skills in English, including documenting 
    processes and technical steps, and keeping documentation up to date 
  • Proactive knowledge seeker who is constantly learning and not afraid to ask questions 
  • Strong analytical skills, troubleshooting and problem-solving skills 
  • Responsible self-starter with the ability to work independently; detail and process oriented 
  • Manage multiple work-streams and independently follow up and bring workstreams to completion 
Good to Have Skills: 
  • Experience and familiarity with Internet technologies, e.g. HTTP, JavaScript, HTML, AJAX, cookies, 
    XML, etc. 
  • Java programming experience 
  • Proficient in Google Docs, Spreadsheets, Slides
  • Prior experience working in payment and finance/accounting industry a plus
Details of the role :
  • This is a 12+ month contact position with tech Giant.
  • Onsite role.
  • The work location address is : San Jose CA 95131.
  • Client also have free food facility for the contractors.
  • There are 1 rounds of interview  - Google hangout video interview.
  • If you are offered this role, you will join within 2 weeks of the extension of an offer – Client on boards only on Mondays
  • Regular work hours – no night shifts.

Anil Chamoli
Technical Recruiter - Staffing
Artech Information Systems LLC 
360 Mt. Kemble Avenue, Suite 2000 | Morristown, NJ 07960
Office: 973.967.3488 | Fax: 973.998.2599
Email: | Website: 

Saturday, June 1, 2019

Security Engineer

Job Title: Security Analyst/Engineer

Location: Vienna, VA 22027

Duration: 12 Months +

Below mentioned skills what client would like to see in a resume. Request to elaborate/describe more on the same and send the resume.

       4-5 years of experience

         Experience/proficiency in at least one of the following:

              Network Security

              Cloud Security

              Application Security

              Experience working in large environments

Job Description: 

Basic Purpose:

To analyse and evaluate new and existing information security programs and procedures to protect corporate information systems assets from intentional or inadvertent modification, disclosure, or destruction. To design and implement new and enhanced security solutions and procedures to control and manage information assets and meet corporate and regulatory requirements.

Additionally, the Information Security Analyst will:

1.      Identify and analyse potential risks/threats to information security and respond to reported security violations; perform incident analysis to determine causes, possible solutions, and remedial actions

2.      Design and implement new and enhanced security solutions and procedures to control and manage information assets and meet corporate and regulatory requirements

3.      Research and maintain current knowledge regarding information security issues, trends, solutions, and potential implications; participate in identifying, evaluating, testing, and implementing new

         security products, tools, and systems for implementation of the secure infrastructure

4.      Maintain a continuous process improvement work environment, recommending and implementing new/improved systems in accordance with industry standards and best practices

5.      Perform risk assessments and security testing as part of a security team

6.      Assist in creating and enforcing security standards and procedures

7.      Develop communications and training materials regarding security policies, guidelines, and standards to educate staff about the requirements of information security and to improve information

         security awareness

8.      Perform technical management of Data Loss Prevention tools; create and maintain Data Loss Prevention policies; monitor metrics to demonstrate decreased data loss risk

Required Knowledge, Skills and Abilities:

*        Bachelor's Degree in business administration, information systems, or related field

*        Extensive experience in the analysis, design, and/ or implementation of information technology in a secure environment; understanding of SDLC

*        Extensive experience in computer and information security assessment, administration, and management

*        Comprehensive knowledge and understanding of best practices, trends related to information security

*        Comprehensive knowledge of information security regulations and legislation

*        Formal project management experience which involved organization skills, managing strategy, project communications (internal and external to team), and planning and directing the work of participants

*        Strong research, analytical, and problem-solving skills

*        Highly developed verbal and written communication skills, including preparing and presenting results, findings, and alternatives, and influencing management decision-making based on the best available data

*        Experience working directly with Data Loss Prevention tools, including the creation and maintenance of policies that will detect and/or prevent the loss of data

*        Knowledge of NCUA and FFIEC regulations, GLBA, PCI DSS, and other information security requirements and frameworks 


*        Advanced college degree in information security, cyber security, information technology, etc.

*        Experience with security systems, assessment tools, and technical security, large systems, and cloud integrations

*        Professional certification(CISSP, CISM, CRISC), or a reasonable expectation to obtain the certification

Surinderjit Singh

Senior Technical Recruiter

Saicon Consultants, Inc.

(913) 257-3377 Ext. 167

Text Now (315) 510-9688


Wednesday, May 29, 2019

Security Analyst II

Title: Security Analyst II
Duration: 3 months (Strong possibility for extension)
Location: San Francisco, CA 94114

Job Description
Primary Responsibilities: 

• Participate in planning, scheduling and preliminary analysis for all internal and external audit projects.
• Coordinate audit activities including notification and scheduling for all affected parties of audit timing, scope, objectives, approach and deliverables.
• Work closely with external auditors and internal audit teams on managing and supporting the audits.
• Identify, document, and map technology processes and internal controls of applicable technology infrastructure and operational areas per the scope of the audit project.
• Perform risk assessments of technology infrastructure and operational processes and controls for assigned areas.
• Complete audit testing, inquiry, observation and other analysis required to meet objectives of audit projects.
• Communicate progress and results of audit throughout the audit engagements.
• Develop value added recommendations to deal with issues identified during assigned audits and draft audit reports to formally communicate the results of the audit and related recommendations.
• Monitor implementation of outstanding audit recommendations and validate their implementation.
• Automate manual tasks related to RFIs, Audits and Other compliance programs
• Request and review vendors auditing documentation to insure alignment with Client internal controls and provide assessments and recommendations.

Required Skills & Qualifications: 
• Bachelor’s degree in Information Systems or related field, or equivalent experience
• Certified Information Systems Auditor (CISA) and/or Certified in Risk and Information Systems Control (CRISC) strongly preferred. Other certifications add value such as Certified in Governance of Enterprise IT (CGEIT), Certified Information Security Manager (CISM), Certified Information Security Professional (CISSP), CPA, and/or CIA.
• Minimum 3 years of internal or external audit experience with Big 4 Audit Firms, with exposure to the following compliance frameworks AT101 Type2 SoC1 and SoC2 (SSAE16), ISO2700x, FedRamp, COPPA, ITIL, NIST, PCI DSS
• Understanding of Cloud industry technologies and IaaS, PaaS, SaaS platforms preferred. Ability to quickly acquire and apply knowledge of changing technologies implemented is essential.
• Good understanding of audit process/methodology, and risk management/advisory ability.
• Ability to adapt to a changing environment, meet deadlines and handle multiple projects.
• Experience in using a risk-based audit approach in evaluations of and recommendations for management processes.
• Ability to present audit findings and recommendations in a manner that will be understood and accepted by all responsible parties.
• Possess the tenacity to pursue difficult and sensitive issues to acceptable conclusion
• Excellent communication, interpersonal, time management and issue resolution skills.
• Excellent analytical skills, organizational skills, ingenuity and the ability to work as part of a team

Saideep Thota
Team Lead West Coast Region

Randstad Technologies
P: 646-576-9854
C: 408-818-8682

Monday, May 27, 2019

Security Consultant IT Supervisor II

Job title- Security Consultant IT Supervisor II              
LocationPleasanton, CA
Position- Contract

Our Pleasanton, CA client has a contract position for a Security Consultant IT Supervisor II and I have included the details below.  Could this role be a potential fit for you or anyone you know?
Primary responsibilities include, but are not limited to the following:
·         Support the Chief Information Security Officer (CISO) and Risk Manager in ensuring that policies, practices, and tools to achieve security compliance.
·         Collaborate with Senior Leadership Team members across the organization and provide consultative assistance to other programs related to the Security Plan.
·         Establish and oversee an effective Cyber Security Awareness training program.
·         Evaluate new security technologies to defend against internal and external threats.
·         Participate in short and long range security strategy planning under guidance of the CISO and Risk Manager.
·         Establish a uniform process to mitigate risk and oversee IT Risk Assessments within the established service level agreement (SLA).
·         Track the health of the security policy compliance program and provide executive level reports to stakeholders.
·         Maintain information security specific standards and policies, and ensure the deployment of the desired controls throughout the environment (e.g., Secure Systems Development Lifecycle, etc.).
·         Knowledge transfer to and training of Enterprise Security team members.
Technical knowledge and skills:
·         Five (5) years of information technology experience, including two (2) years of lead/management experience performing a variety of progressively responsible technical and analytical work
·         Minimum of 5+ years of security practices
·         Technical security project management skills
·         Working experience using best practices standards and frameworks: iso 27001/27002, pci: dss v3; glba; hippa/hitech; nist 800-53; cis controls, nist csf, cis ram

Working experience, at a minimum:
·         Hardware: network switches, routers, load balancers, servers, storage systems, end-user systems, mobile devices, or other devices that enable the organization to complete its mission
·         Operating systems: Unix, Linux, windows
·         Network: lan, wan, internet, proxy/filtering, firewall, vpn, dmz
·         Network protocols such as tcp/ip, snmp, smtp, ntp, dns, ldap, nfs, samba, etc.
·         Databases: oracle, sql, mysql
·         Cloud platforms: IAAS, PAAS, SAAS
·         Security concepts such as encryption, hardening, etc.
·         Security GRC
·         Active directory
·         Programming Languages Are a Plus

Professional skills:
·         The Consultant resource(s) shall possess most of the following skills:
·         Strong analytical and critical thinking skills
·         Excellent written and oral communication skills to effectively communicate across all levels of the organization
·         Proven ability to present to a Senior Management Level and Executive audience
·         Working experience of security, policy compliance, and governance frameworks including the NIST-800 series, PCI, ISO 27001/27001, ITIL, and COBIT
·         Expert knowledge in security project management practices
·         Self-motivated/Self-Starter/Proactive, working closely and actively communicating with team members to accomplish time critical tasks and deliverables
·         Working experience in a highly regulated environment and managing information risks and expectations across multiple stakeholder groups
·         Working experience of emergent security risks
·         Convey and explain complex problems and solutions in an understandable language to both technical and non-technical persons
·         Think creatively and critically, analyzing complex problems, weighing multiple solutions, and carefully selecting solutions appropriate to the business needs, project scope, and available resources
·         Take responsibility for the integrity of the solution
·         Ability to be a strategic thinker
·         Demonstrated ability to influence others
·         Experience in managing multiple projects.
·         5+ Years’ experience in information security.

Zain Roy| Technical Recruiter

Cloud Security Architect

We are seeking a Mid-Senior Cloud Security Architect in Chicago, IL for a Full time role. Responsibilities include designing and developing security policies, standards and procedures for secure cloud technology solutions.

8+ years of technical hands on experience designing cloud security solutions
Past experience working with stakeholders presenting solutions
Experience in Risk Management
Prior security solution implementations
Strong experience in one or more cloud technologies - AWS, Azure, Google Cloud. 
Strong communication skills.

***We are unable to sponsor a visa at this time.
Must be US Citizen or Green Card holder 
No 3rd party candidates - No H1B, OPT EAD, or any visa candidates

If you are interested and available, please forward your resume to for immediate consideration.