Friday, May 25, 2018

Security Analyst

Job description:
The tasks for the Security Analyst include, but are not limited to, the following:
  1. Act as a Lead Consultant/Subject Matter Expert/domain champion
  2. Work on development of Information Security plan (ISP) and performing gap analyses
  3. Assist in updating/developing ISP, policies, training materials, website, procedures, controls, etc.
  4. Assist with audit remediation validation for compliance to security policies/standards
  5. Assist in the evaluation of security risk assessments and gap analysis
  6. Knowledge transfer to and training of State Fund employees
  7. Assist in updating/developing policies, training materials, website, procedures, controls, etc.
  8. Assist in creating policy compliance procedures including compliance measurement reports/dashboard
  9. Assist with audit remediation validation for compliance to security policies/standards
  10. Assist with the implementation of the various security tools
  11. Knowledge transfer to and training of State Fund employees
  12. Attend meetings/Represent Enterprise Security as a Senior Lead for all security matters
  13. Act as Lead/Co-Lead/Backup on assigned Enterprise Security project
  14. Knowledge transfer to and training of State Fund employees  

Technical Knowledge and Skills:
  • Hardware: network switches, routers, load balancers, servers, storage systems
  • Operating Systems: UNIX, Linux, Windows
  • Network: LAN, WAN, Internet, Proxy/Filtering, Firewall, VPN, DMZ
  • Network Protocols such as TCP/IP, SNMP, SMTP, NTP, DNS, LDAP,  NFS, Samba, etc
  • Active Directory
  • Vulnerability Assessments
  • Penetration Testing
  • Security
  • Mainframe DB2
  • Oracle databases
  • Best Practices Standards: ISO 27001/27002, PCI:DSS v3; GLBA; HIPPA/HITECH; NIST 800-53; California State Administrative Manual.
  • Excellent communication, technical writing, and customer service skills
Professional Skills:
  • 5-15+ Years’ experience in information security, Audit, and Security/Audit Compliance.
  • CISSP Required.  Other highly desirable security certifications may be substituted for CISSP (for e.g., CISM, CISA, etc.)
  • Extensive experiencing conducting ISO 27k gap assessment preferred but not required
  • Should have extensive experience in leading IT security/compliance/audit projects.


Ruchika Sinha| Resource Manager
48531 Warm Springs Blvd # 405 Fremont, CA 94539
Mobile: 510-378-1964 | Fax: (775)201-9919
Email: ruchikas@caspex.com
Web: www.caspex.com

Thursday, May 24, 2018

SAP Security Consultant

Job TitleSAP Security Consultant
Location: Portland, OR
Type: Full Time Employment
Salary: Negotiable

Job Description:
Good knowledge and Hands on experience in SAP Security and GRC.

Experience Band :
6-8 years

1.Creation of roles for any new Roll out (New projects)
2.Licensing activity
3.Supporting any new upgrades/Release of GRC
4.Participation in Cutover activities for upgrades ,releases  across landscape
5.Knowledge of Success Factor security will be an advantage
6.Automation and Best practices deployment
7.Experience in GRC10.1

Vikram Singh
Phone #: 281-402-2507 (Desk) | Fax: 1-832-201-0366
RConnect LLC | 14, Spotted Deer Dr., The Woodlands, TX 77381
Email: Vikram@RConnectLLC.com | Web: http://www.RConnectllc.com

Frontend Developer

Role: Frontend Developer
Location: Palo Alto, CA
Duration: FTE

Job Description

Key Skills
·         candidate should have IT experience as a front end developer
·         The candidate should have prior experience on front end technologies involving advanced JavaScript implementation
·         The candidate should have performed client facing roles and possess excellent communication skills
Job responsibilities / Experience
 
·         Solid Experience in HTML5, Angular, CSS3 and responsive design concepts
·         Experience in one or more of the following Javascript frameworks: JQuery, BackboneJS, Bootstrap or RequireJS
·         Can write CSS and is interested in using newer technologies such as SCSS.
·         Can write Javascript code that calls server-side APIs over JSON.
·         Experience with browser differences and limitations and client- side performance
·         Is familiar with debugging tools for Internet Explorer, Safari, Chrome and Firefox.
·         Coordinates your work across teams to build a seamless feature.
·         Able to look at a UI mockup and implement it using Javascript, HTML, Angular and CSS.
·         Able to communicate thoughts on your own and others' designs and implementations in a friendly and encouraging way.
·         Able to work independently or as part of a team.
·         Experience working in an Agile environment


Akshay Nigam
Enterprise Solutions, Inc.
500 E. Diehl Road, Suite 130, Naperville, IL 60563

Java Developer

Title:  Java Developer
Location:  San Mateo, CA
Company: Direct Client
Job ID# 8263518
Duration:  6 months contract to hire
Pay Rate: Open on w2/1099/ Self Corporation
No remote work.

 
Job Details
Client is seeking a Java Developer – to join our team of qualified, diverse individuals. This position will be located in San Mateo CA.

Put your years of experience into a future of excellence... The qualified applicant will become part of Client Postal Services and Solutions group. This is a contract to provide US Government Client Information Technology with professional, technical and support services to support the application development, database production support, help desk administration, LAN administration and various requirements for distributed technical support throughout the US Government Client.

Roles and Responsibilities:
Provide input on Technical Requirement Documents (TRD), Rough Order of Magnitude (ROM), Requirement Traceability Metric (RTM) and Status reports.
Provide debugging and code analysis support
Support implementation of application software releases and other related activities
Troubleshoot production problems

Basic Qualifications:
To be considered for this position, you must minimally meet the knowledge, skills, and abilities listed below:
A Bachelor's Degree in Computer Science, Information Systems, Engineering, Business, or other related discipline and at least 7 years of overall IT related work experience; or an additional 4 years of IT experience can be substituted in lieu of the degree
Minimum of 5 years of advanced computer programming skills in Java, JavaScript, HTML, JSP, Java Servlet, Javabean, EJB, OO Design, Active Server Pages (ASP)
Minimum of 2 years experience with the following platforms: JAVA/IBM, Websphere/Oracle.
Experience using IBM Websphere Studio and experience administering IBM Websphere Application Server.

Experience with relational database theory and data modeling for an Oracle database
Experience in working with large amounts of data and large transactions
At least 2 years of Unix Operating System and Utilities
Working experience with e-Script, VB Script and XML
Position requires that you are able to obtain (and maintain) a US Government Client Sensitive clearance -  (Public Trust Clearance)
Must not have travelled outside of the US for a combined total of more than 6 months (or longer) within the last 5 years
Position is based in San Mateo CA, and does not offer relocation assistance

Preferred Qualifications:
Advanced programming skills in J2EE technology, such as JNDI, JMS, RMI, JNDI, XML, XSL, XSL-FO and JDBC.
Advanced experience in programming with ANSI SQL for Oracle Database.
Advanced knowledge of Http, SSL, TCP/IP, CCS and Document formatting
 
Manish Aswal, Sr. Technical Recruiter
First Tek, Inc 
1551 S Washington Avenue, Suite 402 A, Piscataway, NJ 08854
Direct No: 732-607-5885 
www.first-tek.com | manish.aswal@first-tek.com 

Security Analyst

Job Title: Security Analyst – CDA Cyber Operations & Security
Job Location: Alpharetta, GA
Job Duration: Long Term Contract  


Key Responsibilities
Under the oversight and guidance of the Enterprise Security team, ensures that security protocols are implemented for CDA technology assets.
  • Ensures security defined required agents are globally deployed to defined endpoints that is in alignment with defined Security Policies
  • Development of key operational process inclusive of periodic evaluation of agent relevancy, and
  • All agents deployed are integrated per SIEM requirements
  • Implement SIEM technology and infrastructure expanding coverage of security logs reporting into a centralized tool
  • Establish process and framework defining what we're trying to protect, what are the threats, how to protect, what do we do in response
  • Define and implement framework and automation to support
  • Vulnerability Management program with formally defined processes and procedures are integrated into key InfoSec and IT functions (e.g., IT/Patch Management, SOC, and Threat Intel)
Requirements
  • Bachelor's Degree from an accredited college or university in Computer Science or related field
  • Five (5) years of information technology experience which includes a combination of: three (3) years of information security experience; two (2) years of experience with support, administration, and one (1) year networking experience; one (1) year server administration with one or more operating systems
  • Experience working with JIRA, or other similar tools is a plus
  • Experience performing cyber security risk assessment, treatment planning and reporting
  • Possesses foundational understanding of Risk Management concepts and principles
  • Possesses foundational understanding of IT Concepts and principles
  • Understanding of security management and/or information risk and compliance processes and industry frameworks (ISO27001, NIST, COBIT)
  • CISSP, CISA, CISM Highly preferred. Other technical security certifications beneficial

Ravi Sharma
Noralogic Inc.
109 East 17th St, Cheyenne WY 82001
Call: 307-222-2565
Email: ravi@noralogic.com
Skype ID: ravi.sharma7866

Wireless Analyst

Title:  Wireless Analyst
Location:   Cupertino, CA
Company: Direct Client
Job ID#   8261936

Duration: 12 months contract 
Pay Rate: Open only on W2
No remote work.
 
Job Description:

Role is more of a customer service/trouble shooting role.  Not looking for a A/R Financial Analyst
They are looking for someone that has ideally worked at a large corporation and managed all the company mobile phone plans
 
How many years have you had in operational wireless support?  Please specify if your experience is in end user support or supporting account teams. 
- Have you had experience helping end users with their iPhone?  If so, explain.
- How many years have you had analyzing wireless bills? 
-If an account had a pooled data plan that had data overage charges in the previous month, what steps would you take to ensure there will be no data overage charges going forward?

-If you had tickets in your queue, a bill that needed to be processed and paid, and a user that walked up with questions, how would you handle the situation and prioritize your work?

-What are some types of reporting or analysis would you put together with a call detail report?

-Give us an example of a process improvement process or a cost savings activity you initiated to save money in your current or previous job that was not part of your monthly/daily recurring analysis reporting tasks.
-What would be some things you would look for it an invoice increased by 25% from the previous month?


Responsible for cost analysis and validation of invoices received from domestic and international carriers. Responsible for financial oversight of the wireless carrier services supporting the enterprise. Requires familiarity with telecom expense and contract management practices for carrier based voice, data & cellular services as well as telecom lifecycle vendor management. Initiates and manages complex wireless billing audits, defines wireless optimization recommendations, conducts vendor contract analysis, benchmarks wireless rates, ensures quality control, and performs inventory management. Supports the end-to-end billing process, including all related end user billing inquiries and performs workflow through a ticketing system. Ability to solve simple to complex wireless issues for internal customers at all levels of the organization by following established practices and procedures. Requires strong problem-solving, analytical, verbal and written communication skills, as well as having demonstrated ability to collaborate effectively with wireless providers and inspire action and problem resolution. This is a high-volume transaction environment that requires great attention to detail and superior analytical skills.
 
•Manage telecom lifecycle including measuring, monitoring and analyzing carrier and TEM vendor performance against established Service Level Agreements and Key Performance Indicators
•Manage TEM software to maintain accurate records of: cellular services, inventory, accounts, and invoices
•Perform telecom vendor invoice review to ensure adherence to Contract or Statement of Work on a monthly or quarterly basis as indicated
•Supervise and analyze wireless invoices across multiple carriers including: audits, disputes, adjustments, allocations, approvals and payment
•Interface regularly with wireless services providers to resolve issues, gather information, and manage account activities/performance
•Identify opportunities to leverage vendor capacity and other efficiencies to reduce overall operational cost
•Validate identified billing disputes and cost savings opportunities through historical review, telecom vendor and customer contact while providing regular management reports
•Daily operational tracking related to billing and associated controls to verify data integrity to eliminate billing errors, including investigation and resolution of any variances
•Assist with the creation and testing of new reporting processes to improve process workflows
•Act as an information resource for internal employees, responding to and resolving inquiries concerning billing questions
•Build and maintain good working relationships with other departments and ensure constant communication on statuses, issues and deadlines
•Prepare ad hoc reports on an as needed basis
•Ensure quality control visibility by providing metrics reporting
•Process Wireless day-to-day help tickets through to resolution
•Provision devices with the correct rate plans and features for supported wireless devices, troubleshoots user issues and provides functionality instructions to users as needed
•BS/BA degree
•Minimum of three years' experience in Wireless Expense Management
•Strong understanding of AT&T, Sprint, Telecommunication, Telecommunication billing terminology, concepts and practices including services, taxes, fees, and contractual terms
•Demonstrated business acumen and the ability to apply financial expertise to telecom contracts and invoices
•Knowledge and understanding of financial oversight and management including billing, accruals, allocations, budgeting, and forecasting
•Experience working with a case/ticket management system
•Ability to analyze, troubleshoot iOS devices and resolve issues of varying complexity with minimal supervision
•Ability to effectively prioritize tasks and work load to ensure all deliverables and expectations are met or exceeded
•Ability to work under pressure and handle high work volume
•Ability to effectively work cross functionally with carrier vendors, key users, other organizations and finance
•Must possess the ability to systematically push the carrier for results and to recognize when issues need to be escalated to the next level
•Ability to gather and analyze customer information from carrier portals and account reps in order to provide resolution and/or make recommendations
•Ability to develop presentation level graphics that illustrate and emphasize the business issue, both historical and trend
•Advanced Excel skills
•Intermediate to advanced SQL, Keynote, Numbers or Word and PowerPoint skills
•Excellent customer service skills
•Ability to communicate clearly and effectively in English
•Extreme attention to detail, data accuracy quality of output and a strong ability to multi-task
•Superior analytical, decision-making
 
Manish Aswal, Sr. Technical Recruiter
First Tek, Inc 
1551 S Washington Avenue, Suite 402 A, Piscataway, NJ 08854
Direct No: 732-607-5885 
www.first-tek.com | manish.aswal@first-tek.com 

Tuesday, May 22, 2018

IT Security Analyst

Job details: 
Position                         : IT Security Analyst
Work location                : San Francisco CA
Duration                        : 3+ Months

Qualifications:
• Bachelor's degree in Computer Science, Information Systems, Computer Engineering, Cybersecurity, Systems Analysis or a related field or equivalent work experience • Typically has 2+ years of information security related experience in areas such as: security operations, testing, and/or system or security administration • Requires knowledge of security issues, techniques and implications across all existing computer platforms • Requires ability to analyze potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach • Knowledge of critical security controls • Knowledge of secure coding practices, ethical hacking and threat modeling • Security certifications required (one or more): – GIAC Information Security Fundamentals (GISF) – CompTIA Security+ (CS+) – EC-Council Certified Security Analyst (ESCA)

Responsibilities:
1. Privacy Analyst/Manager—Analyst / manager position with working knowledge of U.S. laws. Privacy Analyst/Manager will work with cross-functional team to complete assessment of personally identifiable information collected, processed, and stored in the Bank's environment. Position will also assist Privacy Officer in preparing meeting materials, management reports, position papers, and policies and procedures. Familiarity with RSA Archer strongly preferred. Position reports directly to Privacy Officer.
2. ESPRA Analyst—seeking an analyst with experience leading teams of contractors (or employees) to help supervise a backward looking assessment of 150 vendor relationships. Ideal candidate will have experience working with legal contracts, assessing third party risk, preparing detailed management reports, experience with MS Project, PowerPoint, and Excel. Position reports directly to the Privacy Officer. General Characteristics & Roles Responsible for the development, implementation, and management of the Bank's program to protect information assets. Delivers effective and efficient national information security products and services to defend the Client Reserve System (FRS) against cyber security attacks, cyber threats, and unauthorized use by both internal and external adversaries. Defines security policies, processes and standards. Works with the IT department to identify security requirements, define security-related processes and standards, and select and deploy technical controls. Evaluates and assesses management compliance with privacy and security regulations. Performs technical and administrative analyses for security and privacy including system access and compliance audits to identify ways to reduce risk. Oversees and evaluates the effectiveness of security controls, perform periodic testing Provides expertise and assistance to ensure the Bank's information assets are protected. Performs security assessments and works with appropriate teams to remediate information security threats. Updates, maintains and documents security controls and provides direct support to the Bank and internal IT groups. Communicates and educates IT and the Bank about security policies and industry standards, and provides solutions for security issues. The following roles will encompass the Information and Cyber Security job family: Focuses on the needs of information security service. Brings security expertise and solutions to development efforts and makes the IT environment more secure. Determines what data can be shared, assures compliance, quantifies IT security risk and supports remediation activities. Responsibilities from Associate Information Security Analyst plus: • Handles more technically complex security scenarios • Contributes to best practices and procedures for protecting information, assets and security in conjunction with department managers • Collaborates on projects to ensure that security requirements and issues are addressed throughout the project life cycle • Analyze information security control metrics to demonstrate effectiveness or need for control improvement • Consults with business service owners and application development teams, providing information security expertise and solutions • Monitors security SLAs • Manages project documentation, such as compliance documentation, security plans, corrective action plans, etc. • Provides security briefings to advise on critical issues that may affect the Bank • Conducts knowledge transfer training sessions to NIRT and other security teams upon new technology implementation • Evaluate vulnerabilities to determine the appropriate risk level based on potential business impact, application/data criticality and existing mitigating controls • Prioritize vulnerability risks and work with technology and business owners to develop remediation and mitigation plans within SLAs • Receives audit findings, and manages the collection of responses and remediation plans with owners • Provides oversight and management of audit finding remediation, including generating requirements for full remediation, providing feedback and suggestions on managerial responses to findings, as well as tracking progress and providing status updates to the compliance team for reporting purposes • Identifies and uses tools to monitor data transmissions and analyze data streams • Reviews data breach notifications and assists in investigations • Examines source codes of websites and applications on multiple devices such as laptops, phones and tablets, to identify potential vulnerabilities and security flaws • Compiles, summarizes, and presents research on relevant issues • Maintains an awareness of existing and proposed security-standard-setting groups, state and Client legislation and regulations pertaining to information security • Participates in security alerts, communications, training and education • Review privacy risks to prioritize remediation and risk mitigation plans • Lead privacy incident investigations to determine impact and root-cause • Works on one or more IT security area • Works as a team member, sometimes as a team lead for low to moderately complex tasks

Sandeep.M
Sr.Technical Recuiter-US
Intelliswift Software Inc.
Email : sandeep.m@intelliswift.com
Work : +1-510 370 4565

Website:-www.intelliswift.com