Friday, August 21, 2020

IT - Cyber Security Controls Assessor

Role:  IT - Cyber Security Controls Assessor

Location: San Francisco, CA

Duration: 12+ Months


Microsoft Office, Remedy, SharePoint, Security tools
Able to follow Safety First principles
Results driven and customer focused
Attention to work quality and research driven.
Effective communication to peers and clients.
Able to balance workload and priorities
 Able to balance the priorities of the business and maintain/stay customer focused
Multi-Platform knowledge (UNIX/LINUX, Windows Servers/Desktops, Cisco hardware, etc.)
 Ability to influence and lead behavior change Competency in making sense of complex, high quantity, and sometimes contradictory information to effectively solve problems
Competency in making good and timely decisions that keep the organization moving forward
Competency in developing and delivering multi-mode communications that convey a clear understanding of the unique needs of different audiences
Competency in building partnerships and working collaboratively with others to meet shared objectives
Ability to energizes coworkers to maintain a positive attitude towards the team and the business directions
Strong analytical, critical thinking and decision-making skills
Ability to lead and manage cross-functional compliance projects and initiatives
Ability to guide and direct junior team members

Nitin Gera | 408.503.6915 |
Amiseq, Inc. 1551, McCarthy Blvd, Milpitas, CA 95035

Friday, August 14, 2020

Security & Risk Analyst

 Job Title: Security & Risk Analyst - II

Location: CA 94404
Job Duration: 6 Months Contract

Primary Skills:
Description: Serves as a resource to other security professionals in their area of expertiseDevelops plans for the future of an area(s) of security, for management reviewLeads the security element on projects that entail moderate risk and implicationsBrings new information on security developments into the organization, includinginformation on new tools, procedures and systemsLeads the investigation of some complex and sensitive security investigationsMay provide input to manager on staff performance relating to technology but doesnot prepare or deliver reviewsIdentifies new developments in IT security administration tools, procedures andsystems available in the marketplace, and makes recommendations to managementDesigns controls / standards with broad implications, requiring systems integration ofone or more technical platforms In-Take Notes: We are looking for someone one with experience with SIEM technology - specifically log collection, aggregation, and correlation in ArcSight. Experience with Windows & Linux and Networking are all required.

Pavan Sharma

Saicon Consultants, Inc.             

(913) 257-3377 x 187 (Work)

(913) 273-0058 (Fax)



Security Engineer

Our client is looking for a top level technical expert in one or more highly specialized areas of applications environment, design and/or programming. Acts independently under general direction. Provides technical leadership on complex integrated projects. Contributes strategic vision and integrates a broad range of ideas regarding applications structure. Recognized across the organization for applications environment expertise and sought as a resource for resolution of unique or complex application problems. Undertakes the most complex applications projects involving multiple disciplines and may impact multiple business units.

  • Manage technical design of new projects and enhancements to ensure they are compliant with architecture standards, meets the project's capacity and performance needs, and maximize solution re-use.
  • Responsible for delivery of project components.
  • Approve technical approach to solutions development by performing impact analysis for major design options.
  • Provide the authority, leadership, and direction for the resolution of complex integrated technical issues that cannot be adequately resolved at the detailed design stage. This includes serving as an escalation point for software and/or application issues.
  • Mentor junior level staff by assisting to develop their skills and transfer knowledge
  • Assign, review, and direct staff in the conversion of business requirements into technical specifications and/or implementation plans
  • Advise management on project scheduling, technical recommendations, and vendor selections
  • Participates on cross functional teams in technical advisory capacity
  • Accountable for maintaining effective internal controls over the processes and transactions under areas of responsibility including the completeness and accuracy of financial information and transactions, compliance with applicable laws and regulations, and the effectiveness and efficiency of operations

  • Strong in Java or Python
  • ETL ToolsStrong hands-on experience in Informatica suite of applications
  • Experience working with AWS services – S3, EC2, Glue, EMR, RedShift, RDS and migrating data from on-premise data stores/file systems to Cloud platform would be an added advantage
  • Hands-on experience in SQL, PL/SQL and experience building data integrations involving RDMS databases (Oracle 11/12, DB2, SQL Server), NoSQL (Mongo DB, HBase) databases
  • File based sources (Mainframe COBOL, SAS, HL7, XML, JSON)
  • Expert technical knowledge of all phases of applications systems analysis
  • Expert knowledge of relational database concepts including the normalization of data
  • Expert knowledge of software life cycle
  • Expert knowledge in many technical disciplines that transcend platforms
  • Knowledge of business processes
  • Knowledge of programming languages (Siebel)
  • Strong understanding of object-oriented languages and development methods

Holly Germaine
Contech Systems, Inc.

Direct: (732) 491-8926
Main: 732-632-8818

Wednesday, August 12, 2020

Security Engineer

 POSITION: Security Engineer

LOCATION: Brooklyn, NY


INTERVIEW TYPE : Phone/Skype to hire


Visa: USC/GC


Required Knowledge, Skills, and Abilities


Candidates should have:

·         strong IT skills and a deep understanding of cyber hacker methodology

·         excellent verbal and written communication skills, interpersonal skills, and analytical skills

·         thorough work ethic and attention to detail

·         skills of perception, critical thinking, and problem-solving aptitude.


Rapid7 Nexpose, SPLUNK, PaloAltoFirewalls, NAC - Network Access Control (CISCO ISE, Aruba, Forescout)

Certifications that would be helpful: GCIH/incident inhandlin, GMON /monitoring, GOSCP / offensive security certified professional

Global experience or not daunted by size and complexity

Self-starter, tenacious, resilient


Jonas Kevin

Sr US IT Recruiter

Office: +1 609 309 6625


Monday, August 10, 2020

Regulatory Reporting Analyst

Client: Union Bank 

Location: Oakland, CA or Remote work 

Title: Regulatory Reporting Analyst 

Duration: 3+ Month contract 

PR: $65/hr on W2  


1. Responsible for executing financial regulatory reporting requirements for the FR Y-14Q and FR Y-14M and ensuring completeness and accuracy within the requisite processes and controls. 

2. Partnering closely with business areas in the completion of the report including, Treasury, Risk, Controllers, Technology, and Business line management across multiple entities as part the reporting process. 

3. Develop analytical tools for internal monitoring that include proper controls and work with data providers towards continuous improvement in data quality. 

4. Develop deep understanding of Axiom SL and use available functionality to build synergies. 

5. Utilizing Generally Accepted Accounting Principles (“GAAP”) to preform analytical procedures over income statement, balance sheet accounts, and cash flow statements while focusing on evaluating trends to be in line with expectations and providing variance explanations for anomalies in fluctuations. 

6. Provide enhancements and analytical support as it relates to data collection and submissions and data management including data aggregation, extraction, management, and analysis of large databases from multiple sources utilizing analytic tools. 

7. Actively monitor and implementing new/revised regulatory reporting requirements and socialize the reporting and regulatory data requirements to business partners. 

8. Managing the execution on selected process enhancements and remediation of management-identified issues, including liaising with IT groups to formulate business requirements and system change requests and user acceptance testing. 

9. Maintain proper documentation and procedures as per bank policy manuals. 

If you are interested please do share me your updated word format resume.

Chithra B

T: +1 (973) 798 - 1149

Monday, August 3, 2020

Cyber Threat Intelligence Analyst

Our client, a global leader in financial services technology, is looking for 2 Cyber Threat Security Analysts to work with their teams in Alpharetta, GA and Jersey City, NJ. Due to Covid-19, these roles will start fully remote, but eventually onsite work will be required in those locations. These roles will research and analyze large amounts of structured and unstructured data from many sources, and ideal candidates will have knowledge of intelligence gathering principles, policies, and procedures. 

Paul Andra
Technical Recruiter
O: (470) 228-5060?

Monday, July 27, 2020

Cyber Security Forensic Analyst

Job Role : Cyber Security Forensic Analyst

Location : Austin, TX

Duration : Contract


Job Description:

IBM is seeking a Cyber Security Forensic Analyst professional to work on the Cyber Security Incident Response team (CSIRT) This position requires a strong technical security professional, who will be responsible for conducting highly technical and confidential investigations.  (e.g. data loss, advanced persistent threats, malware analysis etc)  


The role will be responsible for conducting forensic investigations and analysis in support of cyber incidents that are reported into the CSIRT team.  This role will require the ability to triage and conduct thorough examinations of all types of digital media within a heterogeneous environment, the ability to determine containment and/or remediation activities that may be required as well as identify potential threats.  Reporting and collaborating with the different areas of Business will be required, as well as providing relevant lesson learned output that can be fed into the IBM threat landscape.


Essential Duties and Responsibilities

Conduct examination of digital media (hard drives, network traffic, mobile phones, etc.).

Capture / analyze network traffic for indications of compromise.

Review log-based data, both in raw form and utilizing SIEM or aggregation tools.

Employ best practices and forensically sound principals such as evidence handling and chain of custody.

Perform live network assessments using leading packet capture and analysis software tools.

Establish timelines and patterns of activity based on multiple data sources.

Identify, document and prepare reports on relevant findings.

Utilize varied forensic software such as FTK, Encase, IEF, etc.

Effectively communicate with clients to establish timelines, manage expectations, and report findings.


Required Knowledge, Skills and Abilities

Demonstrated computer forensic investigations experience.

Expert-level knowledge of common attack vectors and penetration techniques.

Solid working knowledge of networking technology and tools, firewalls, proxies, IDS/IPS, encryption.

Demonstrated knowledge of forensic tools such as Encase, FTK, Axiom, Black Bag, SIFT.

Experience with malware analysis (reverse engineering).

Excellent technical writing and presentation skills.

Excellent general writing skills in presenting information in a non-technical manner; Business Case construction, Proposals, and Plans.

Ability to successfully lead and facilitate information gathering meetings with client senior-level employees.

Event analysis and correlation.

Experience managing large and small scale cyber security incidents.

Ability to coach and training junior level analysts in industry best practices and methodologies.

An ability to understand and correlate strategic decisions/methodologies into their practical application at an operational level.

Demonstrated understanding of database structures and SQl

Experience with Linux operating systems



At least 5 years of experience in IT Security Digital Forensics

At least 2 years of experience in Incident Response in a global corporate enterprise




Strong understanding of networking protocols.

Experience in fast-paced investigations. 

Experience with programming or scripting languages.

Familiar with Q-Rader SIEM tool is a plus

Demonstrated system administration skills.

Ability to present highly technical information to non-technical audiences.


Technical Recruiter

IDC Technologies.

Ph: 408-903-4154