Tuesday, October 9, 2018

Infrastructure Analyst

Title : Infrastructure Analyst
Location: Bloomington, IL
Note -: Any Visa Can work.

Key Technical Skills Needed:
•    ·HP Operations Manager Linux(OVO/OML) policy (OML templates) development experience, not just “console” experience;  Console only experience is not beneficial, and candidates with console only experience are not qualified for the posting.  We run a “headless” OVO shop and do everything via OML policy (templates) development
-    OML policy (templates) development experience is ABSOLUTELY REQUIRED AND ESSENTIAL
•    ·Network monitoring including using SNMP traps (MIBs) & syslog
•    ·Linux and Windows OS shell programming experience
•    ·Perl and/or Python programming experience

The Individual with this knowledge will be performing the following tasks:

•    ·Create/modify OVO/OML policies (templates)  and/or scripts to provide monitoring solutions
•    ·Meet with project teams to determine and recommend system or application monitoring requirements
•    ·Work with subject matter experts to analyze and resolve any questions and problems
•    ·Work independently on multiple monitoring solutions simultaneously with limited direction
•    ·Test monitoring solutions to ensure they are working as designed
•    ·Document monitoring solution in design documents

Strong Perl and/or Python programming and Linux experience is a must, along with solid work experience with the OVO/OML. Understanding and use of schedule, logfile, interface, and monitors as well as advanced eventing concepts such as Event Correlation, Automatic Remediation and event suppression are also important.  The individual must be a strong communicator, be able to explain technical information in non-technical terms.

Amit Sandhu
E TalentNetwork
8251 Greensboro Drive Suite 250
McLean VA
(877) 733-3555 Ext.238

Senior Security Analyst

Title: Senior Security Analyst
Type: 3+ month contract
Location: San Jose, CA
Rate: DOE
Start: ASAP

Day to Day:
  • Drive Corporate Security Program based on the NIST CSF – Identify, Detect, Protect,Respond and Recover.
  • Identify and Monitor the Corporate Networks to determine if there have been any attacks.
  • Analyze network traffic to identify anomalies and test information security controls for weaknesses.
  • Design and implement safeguards to protect the system with the help of network engineers and other members of the Technology Services team.
  • Respond to threats by taking mitigating actions to contain the activity and minimize damage
  • Participate in risk assessments and breach readiness exercises for incident management.
  • Facilitate forensics analysis to determine the source of the threat. Document lessons learned as well as identify process improvements.
  • Communicate security issues to management via reports, dashboards. Provide weekly metrics on overall security posture.
  • Research emerging threats and work with the Security Operations Center (SOC).
  • Drive the Vendor Security Program including annual self-assessments.
  • Participate in the security toll-gates on SSDLC projects.

Must Haves:
  • Knowledge of software development, computer networks and Internet threat activity.
  • Knowledge of Security Incident and Event Management (SIEM) tools (Splunk, Qualys).
  • Previous enterprise or platform/cloud vulnerability management experience.
  • Previous experience leading an information security program in large, national or international enterprise a plus.
  • Excellent written and verbal communication skills, including experience engaging with executive and technical audiences.
  • Must be able to work in a fast paced, high profile environment.
Nice to haves:
  • Industry Certifications – Network Security or Certified Information System Security Professional (CISSP) with professional experience in Network Security.

Patrick Circelli 
Phone: (215) 825-7814    Email: patrick.circelli@mondo.com    Website: mondo.com
Address: 2000 Market Street San Francisco CA 94105 

Monday, October 8, 2018

IBM MQ Admin

Job Title: IBM MQ Admin
Duration: Full time
Location: Dover NH

Job Description:

  • Experience in IBM MQ Series   
  • Exposure in Java/J2EE
  • Good with Unix/Linux commands
  • Ability to create automated job using Shell Scripting (KSH)
  • Experience in analyzing C/C++
  • Good to have Sybase knowledge
If you are interested, please forward your resume to manu@net2source.com. You can also reach me at (201) 340-8700 Ext.523.

Manu Janghala
Sr. Technical Recruiter
(201) 340-8700 Ext.523 | (201) 365-4882
Address: 317 George St. Suite 220, New Brunswick, NJ, 08901
Website: www.net2source.com

Friday, October 5, 2018

Security & Risk Analyst

Job Title: Security & Risk Analyst III
Location: Foster City, CA
Duration: 6 Months

Lead - Security Operations Center (SOC) and Computer Incident Response Team (CIRT).


  • Manages the SOC and CIRT, an area of the IT Security and Risk Management Program that impacts multiple departments internal and external to IT, sets goals and objectives, tracks and communicates status, acts as spokesperson to business partners and colleagues onprogram subject area.
  • Identifies SOC and CIRT security processes and standards across IT that would benefit from improvement. Proposes new standards, tools, policies and procedures to improve security,compliance and risk management activities in Client. Benchmarks innovative solutions as a method of monitoring progression to ensurevalue is being created and is consistent with organizational goals, objectives and standards.
  • Leads the security design of projects that entail large risk and wide spread implications to the business. Reports status on activities, issues, projects, etc to senior IT management, includingthe effectiveness and efficiency of security activitiesWorks with IT, Quality Assurance, and business colleagues to ensure auditreadiness, and to prepare for internal and external audits Reviews security documents and project artifacts for complex situationsAssesses and manages compliance risks across the organization, escalating to senior management as necessary.
Vignesh Iyer | TalentBurst, Inc.
Boston | San Francisco | Miami | Milwaukee | Toronto | New Delhi | Bangalore
Work: (508) 628-7566| Email: vignesh.iyer@talentburst.com
679 Worcester Road | Natick, MA 01760 | www.talentburst.com

Thursday, October 4, 2018

Information Security Officer

Title/Role: Information Security Officer
Location: Santa Clara,, CA 95050
Duration:  12+ months contract to Hire.

Job Description:
·         Work with one of Client’s prized clients in the heart of Silicon Valley by ensuring security for critical infrastructure.
·         We are looking for a talented hands-on security professional that has deep technical knowledge also likes contributing to the strategic direction.
·         In this role you will get to work with the full array of security solutions as well as support the security provisions throughout the environment’s infrastructure – networks, servers, desktops and applications.
·         You will also contribute toward strategic planning based on risk assessments and analysis.
·         Bachelor degree or higher in CS, CIS, MIS or equivalent
·         Security Certification(s), such as CISSP, CISM, CGEIT, GSEC, CEH, MCSE: Security, and CCNP-Security certification
·         5-10 years hands-on security administration or engineering experience
·         Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information..
·         Client engagement soft skills are required
·         The ability to present and explain security and risk information for business executives to understand
·         The ability to lead people of various levels and technical expertise
·         The ability to prioritize and persuade in order to move the security program forward amongst competing initiatives
·         Experienced with security solutions (e.g. firewall, VPN, SIEM, IPS, URL filtering, Endpoint protection, MFA, NAC)
·         Strong understanding of NIST 800-53 & CSF, risk assessment and incident response standards
·         Strong understanding of Microsoft Active Directory, GPOs, Windows DACL/SACL, and Linux
·         Strong understanding of protocols, such as IPsec, ESP, GRE, SSL/TLS, 802.1x, RADIUS/TACACS, HSRP, GSLB and WCCP
·         Ability to perform and analyze packet captures
·         Ability to analyze suspicious emails, URLs, and files to ascertain if they are malicious
·         Knowledge of hacking techniques, vulnerability disclosures, and security analysis techniques
·         Knowledge of malware families, botnets, threats by sector, attack campaigns and attack methods
·         Scripting language such as PowerShell or PERL
·         Familiarity with incident tracking, change management and project tracking systems like ServiceNow and Jira.
·         Ownership of day to day security events, perform incident response using NIST SP 800-61 standards, and determine root causes
·         Create and lead security initiatives that reduce risk as well as automate detection and protection mechanisms
·         Identify needs and implement comprehensive security controls using multi-layered security and defense in depth
·         Collaborate with all operations teams to ensure security controls and configurations are implemented and incorporated in their ongoing operations
·         Server security through vulnerability management, system patching and secure configuration
·         Network security through segmentation and firewall zoning and ACL policies, as well as secure configurations in firewalls, routers, switches, VPNs and load balancers
·         Endpoint security management to prevent malware and insider threats
·         Email security through Spam filtering and use of SPF & DMARC
·         Application security based on OWASP Top 10
·         Monitor SIEM, IPS, event logs and reports for indicators of attack and indicators of compromise
·         Proactive client involvement in solving client challenges and business opportunities
·         Contribute quarterly security advisories for the Security Awareness Program
·         Keep security plans and documentation updated, such as the disaster recovery plans and security policies
·         Continuously mature the GRC program
·         Governance: Collaborate with client stakeholders and steering committees to ensure plans and identified solutions meet business needs and expectations.
·         Risk: Working with stakeholders to perform risk management and ongoing assessments, and then selecting mitigating and corrective controls based on Pareto analysis
·         Risk: Reviewing SOWs and RFP responses to assess risks
·         Risk: Collect, analyze, and validate open source intelligence
·         Ensure regulatory compliance with PCI-DSS, CJIS, and California Consumer Privacy Act of 2018 (AB-375)
·         Communicate with Client team on a regular basis to provide timely and informative reports and related analysis and recommendations to maintain and improve service delivery
·         Provide up-to-date information to clients in response to specific inquiries and meet all commitments ahead of due dates
·         Monthly presentations to executives on current state of risks, status of security controls, and remediation timelines
·         Monthly reports on security operations that provide current states of security controls

Arvind. C | Recruiter
Sunrise Systems Inc.
Transforming Business. Enhancing Careers
105 Fieldcrest Ave Suite# 504, Edison, NJ 08837 USA
Desk: (732) 313 – 0249 | Fax: (732) - 692 - 8944

Wednesday, October 3, 2018

Security Analyst

Position Title:     Security Analyst
Location:              Los Angeles, CA
Job Duration:     12+ Months
Duties to be Performed
The Security Analyst contractor may perform any combination of the following:
● Plan, implement and upgrade security measures and controls
● Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction
● Maintain data and monitor security access
● Perform vulnerability testing, risk analyses and security assessments
● Conduct internal and external security audits
● Anticipate security alerts, incidents and disasters and reduce their likelihood
● Analyze security breaches to determine their root cause
● Recommend and install appropriate tools and countermeasures
● Define, implement and maintain organizational security policies
● Train fellow employees in security awareness and procedures
● Coordinate security plans with outside vendors
● Assist in the creation, oversight, enactment, and maintenance of Citywide Information Security Governance policies and programs.
● Develop, support and maintain a Citywide Cybersecurity Awareness Program
● Prepare and distribute clear, concise, and engaging communications for both technical and non-technical audiences, at all staffing levels -- from entry-level employees to executive managers
● Provide consultation to City business customers regarding Citywide Information Security Governance policies and programs
● Support Incident Response activities when needed
● Manage and/or coordinate information security related projects
● Oversee junior-level staffing in support of the above duties

Job Requirements
● Work Experience
At least 3 years of experience as a Security Analyst.
● Degree Requirements
A bachelor’s degree in Computer Science, Cyber Security or a related field, is desired.

● Skills
The Security Analyst must have a clear understanding of the following:
○ IDS/IPS, penetration and vulnerability testing
○ DLP, anti-virus and anti-malware
○ TCP/IP, computer networking, routing and switching
○ Firewall and intrusion detection/prevention protocols
○ Windows, UNIX and Linux operating systems
○ Network protocols and packet analysis tools
○ C, C++, C#, Java or PHP programming languages
○ Cloud computing
○ SaaS models
○ Security Information and Event Management (SIEM) It is required that the Security Analyst have:
○ The ability to effectively and efficiently write, teach, and speak to a variety of audiences both large and small

● Certifications
It is desired for the Security Analyst to have one or more of the following certifications:
○ CEH: Certified Ethical Hacker
○ ECSA: EC-Council Certified Security Analyst
○ GSEC / GCIH / GCIA: GIAC Security Certifications
○ CISSP: Certified Information Systems Security Professional

Manish Pal I Technical Recruiting Lead - Resource Management Group
Intelliswift Software Inc 
39600 Balentine Dr., Suite 200 Newark, CA 94560
www.intelliswift.com   |    Phone: 510-370-4486  | Fax: 510-373-2486

CACS /STRATA/ CGI Consultant

Title                                                       : CACS /STRATA/ CGI Consultant
Location                                                : Anywhere in US
Duration                                                : 18+ Months

Employment Type                                 : Long Term Contract
Number of positions                             : 1
Starting Date                                        : 1-2 Weeks after selection
Interview type                                     : Telephonic or Skype
Rate                                                     : DOE/ TBD
Requirement – 
Need hourly consultation for CGI products - CACS and STRATA. 
The requirement is to work on high level migration approach and solution for an existing application (source) on another product (target). The source application is on vendor supported system (FICO) and the target product is built on CACS and STRATA.
1. 5-6 years implementation experience (Development/ Enhancement) on CACS and STRATA.
2. Knowledge of migration strategies
Location – Anywhere in US, Preferred Dallas/ Atlanta
Shubham Katiyar
Sr. Executive Recruiter
Pyramid Consulting, Inc.
11100 Atlantis Place | Alpharetta, GA 30022
Phone: 770-255-7718  E: shubham.katiyar@pyramidci.com