Wednesday, April 18, 2018

Network Security Engineer

Network Security Engineer 
La –Vista ,NE
6+ Months

Primary Job Responsibilities: 
As a Network Security Engineer, you will be joining a dynamic and dedicated team of engineers well-versed in packet and flow analysis as applied to network-based security and forensics. Position will leverage working knowledge of stateful firewalls, will be comfortable validating, and working with Palo Alto next-gen firewalls and deep packet inspection technology. 
Support of enterprise network security and engineering systems including IDS/IPS, URL/Content filtering and Firewalls. 
Advocate and execute proper change management principles to ensure network availability and reliability for over 35,000 active users worldwide. 
Leverage, interpret, and rely on packet and flow analysis tools to drive troubleshooting, visibility, and root cause analysis of anomalies. 
 
Job Requirements:
Knowledge of TCP/IP, IPv4, Unix/Linux/FreeBSD Experience with a variety of enterprise Networking, Network Security, and data center traffic management devices 
Familiarity with workflow ticketing systems (such as Remedy) is a plus 
Device Monitoring tools such as Nagios, Observium etc.
Networking or Network Security certifications not required, but could be a plus 
Someone who is very detail oriented Someone with strong organizational skills 
Fast learner 
 
Nice to Haves:
Palo Alto Firewalls experience nice to have 
Cisco Firewalls or Checkpoint Firewalls nice to have 
Security Experience is a nice to have 
Ability to present PowerPoints.
 

Yogesh Kapadne  |  Sr Technical Recruiter - Resource Management Group
Intelliswift Software Inc 
39600 Balentine Dr., Suite 200 Newark, CA 94560
www.intelliswift.com   |  Phone: 510-370-4452  | Fax: 510-578-7710       

Tuesday, April 17, 2018

Information Security Consultant

Information Security Consultant
Location: 
Fairfield CA
Contract: W2

Job Description:

Knowledge / hands on experience with security- and related- systems and tools including: encryption, SIEM, IDS/IPS, network monitoring and sniffing, routers/switches, firewalls, proxies, vulnerability and threat management tools, certificate management, MS Azure, MS System Center, VPN, advanced malware detection, URL filtering, dual factor systems, Windows and Unix security 
Relevant information security certifications (e.g. Security+, CISSP, and/or CCNA-Security) highly desirable 
Forensic skills highly desirable 
4 year college degree desirable 
5 years of security engineer related work experience 
Strong communication and organization skills, ability to multi-task, strong attention to details, excellent problem solving and follow-up skills required 
Work independently, make sound decisions 
Remain objective in stressful or potentially charged situations


Vaibhav Gupta
Recruiting Manager- Randstad Centralized Delivery - Woburn
Randstad Technologies
646-576-9840
vaibhav.gupta@randstadusa.com

Systems Engineer

Systems Engineer - Active Secret Clearance
Northridge, CA/91324
12+ Months Contract(High Possible Ext)


Clearance: ACTIVE Secret
Conversion: Very High
**Masters degree pref.**

Education Required:
• BS, Engineering or Computer Science
• MS, Engineering or Computer Science Desired

Required Experience:
• 5-10 years in aerospace/defense industry
• 4 years of relevant experience in the fields of computer technology, PP, AT, or Cybersecurity
• Experience in requirements generation, design, development, integration, and testing of systems for military applications
• Experience with weapon systems and real-time operating systems
• Experience leading and advising DoD customers on PP issues
• Experience with program protection concepts, anti-tamper, cryptography, and security solutions
• Familiarity with documentation and tools such as: DoD 8500 series, DoD 5200 series, NIST Special Publications (800-53, 800-37, etc.)
• Active DoD Secret Security clearance with ability to obtain Top Secret clearance
• Project management experience
o Excellent oral presentation skills
o Team player/builder
o Excellent time management skills
o Problem solver

Experience and Skills:
• DoD Secret clearance with current SSBI within last 5 years
• Cyber Certifications in accordance with DoDD 8570/DoDD 8140 such as CISSP, GSLC, CEH
• Aircraft/store integration experience


Srikanth S
687 Lee Road, Suite 250
Rochester NY 14606
(845) 473-1137 Ext.8078
srikanth@iic.com

Friday, April 13, 2018

Application Developer

Long Term Contract
Software Application Developer/Analyst – II

No Corp. to Corp. or 3rd party
Onsite position, must be available for an onsite interview if requested.

Description:

Candidate technical skills should include: 

5+ years of in-depth experience in software developing using Shell Scripts, PLSQL 
5+ years of in-depth experience with Oracle with emphasis in SQL proficiency 
5+ years of in-depth experience with UNIX/LINUX 
3+ years of in-depth experience with Data Conversion and Data Analysis 
5+ years of in-depth experience with billing systems 
Prior Experience in telecom domain is desired 
Strong inter-personal skills 

Exceptional problem solving skills
 

Christina Partap
Recruiter
Axelon Services Corporation
44 Wall Street 18th Floor

New York, NY 10005
Phone: (212) 306-0128
Fax  : (212) 306-0191
christina.partap@axelon.com

Security Analyst

Title: Jr. Security Analyst 
Location:  Monterey CA
 
 Work on problems of moderate scope where analysis of situations or data requires a review of a variety of factors
·         Exercises judgment within defined procedures and practices to determine appropriate action
·         Builds productive internal/external working relationships
·         Creative, innovative responsibilities requiring advanced decision-making skills
·         Developing professional expertise, applies company policies and procedures to resolve a variety of issues
·         Fully proficient and able to perform all responsibilities associated with the position
·         Grasps and applies new information quickly and handles more complex assignments
·         Alert Research/Investigations User Communication
·         Network Monitoring & Reporting Coordination & Scheduling
·         Network Scanning Communication with Management
·         Risk Assessments Spear-phishing Identification
 
-          Troubleshoot LANDesk tickets
-          User Interaction and support
-          ACAS/NESSUS Scanning
-          Provide CS Tier 1 support to users
-          Proofpoint Monitoring
-          Alert Research Response
-          Tool Monitoring + Checklist
-          Support Antivirus, Phishing, malware, Trojan events
-          SOC support duties
 

Jerry Smith
E TalentNetwork
http://etalentnetwork.com
8251 Greensboro Drive, Suite 250
Mclean , Virginia - 22102
jerrys@etalentnetwork.com
844-473-8568 Ext.262

Thursday, April 12, 2018

Information Security Analyst

Job Title: Information Security Analyst 
Company: BLACKSTONE TECHNOLOGY GROUP 

Primary Function 

Information Security Fraud Analyst will actively engage in protecting Bank clients and information from loss associated with malicious activity. The Analyst will recommend, implement, and continually improve a wide range of fraud detection systems; monitor, collect and analyze threat intelligence; and collaborate in incident response with other information security, information technology and business operational functions. The person in this position will also be responsible for helping protect information stored on computers and networks, and may also configure and maintain security technologies. This role is under the supervision of Lead Information Security Analyst and guidance from the Director of Information Security. 

Role and Responsibilities 

2-4+ years of Information Security experience, with two or more years in incident response, threat intelligence and fraud detection. A combination of education and experience may meet requirements. 
Experience in Information Technology and Information Security audits, review SOC reports, vendor reviews and 
Excellent problem solving and troubleshooting skills using root cause analysis techniques. 
Extensive knowledge of financial fraud, social engineering methods and information security practices and procedures 
Knowledge of malware, particularly financial malware experience preferred. 
Track and report ATM, ACH and Wire Fraud activities 
Ability to evaluate information security controls and identification of potential risk. 
Must be detailed oriented and have good analytical, documentation, time management, communication and interpersonal skills. 
Must have the ability to communicate complicated concepts in writing. 
As a part of day to day incident response requirements, you be able to respond, review, research, security alerts in a timely manner. 
Ability to identify risks to bank from policy violation, internal or external attacks or attempts to infiltrate company email, data and web-based systems 
Plan, coordinate, perform, and report on information security compliance assessments and related services 
Develop and maintain internal client relationships 
Produce security risk advisories based on newly identified threats and risk assessment 
The ability to work independently in a 24/7 complex, sophisticated technical environment 




Preferred Skills 

Provide cradle to grave lifecycle management of cyber security toolsets consumed by peer functions within the deployment, administration, maintenance, configuration change management, monitoring, troubleshooting, capacity estimation, status and service metrics reporting, decommission and other service assurance activities. 
Provide incident response support as a toolset specific SME for security sevents including but not limited to intrusion detection, malware infections, denial of service attacks, privileged account misused and network breaches. 
Collaborate with IT and other Business Unit management and SMEs. 
Experience with SIEM Technologies, log harvesting/routing/management tools, Security Analytics Platforms, Network Recording and forensic offerings. 
Additional cyber security toolsets, including fraud monitoring, data leakage prevention, and privileged access monitoring is a plus. 
Experienced with PCI-DSS, HIPAA, Bank Secrecy Act, FDIC and other regulatory frameworks is highly desired. 
Experienced working with various Securing appliances 
A sociable, likeable “people person” who gets along well with colleagues 
A capable professional communicator, able to research, prepare and deliver high quality, clearly-written awareness/training materials without grammatical or spelling errors 
Proactive and self-motivated, forward thinking, someone who is willing to take the lead on security awareness and fraud. 
Technical understanding of vulnerabilities and how attackers can exploit vulnerabilities to compromise systems 
Ability to perform and document internal and external vulnerability assessments 
Familiarity with creating lab environments and automating test procedures 
Ability to resolve network and system security issues using computer host analysis, forensics, and reverse engineering 
Ability to define and maintain standards and product selection methodology, review and approve solution architecture and design from a security perspective 
Familiarity with the following activities: 
Security tools implementation 
Security tools administration 
Intrusion detection alert evaluation and response 
Vulnerability scanning result analysis and reporting 
Network firewall monitoring 
Application firewall, antivirus monitoring 
Security event management response and reporting 
Encryption status monitoring 
Security data and alert analysis 
Network security audit 
Ability to manage technologies, including OS patches, system hardening, and application configuration is a plus 
Working knowledge of security technologies such as DLP, SIEM, IDS/IPS, Web filters, two factor authentication, web application firewalls, Active Directory

Wednesday, April 11, 2018

Cyber Security Engineer

Job Details
Title:  Cyber security Engineer (Cloud)
Location:  Mountain View, CA
Position Type: 06+ Months
 
 
Job Description:
The Cybersecurity Engineering team for Symantec’s Consumer Business Unit is looking to fill a role that brings deep expertise and experience in Azure security, to be able to engage at a technical, hands-on level with various initiatives that are migrating to Azure environments.
This person will leverage fluency with Azure and experience with information security to advise us at all levels of the security engagement as a part of the shared security model with Azure – including architecture, design and configuration review. 
The right candidate will have experience with containers, data warehouse and Mongo or NoSQL databases.
 
SKIILS
Security design reviews and supporting processes
Cloud automation software such as Terraform and Chef
Access management, roles and network security groups / rules
Azure portal, Azure CLI, and scripting languages such as Python or PowerShell
Network segmentation, Firewalls and proxy configurations
Azure storage security: RBAC, Shared Access Signature
Encryption, Azure Key Vault
NIST, ISO, PCI and other Security frameworks
 
A Harish 
Technical Recruiter | Email: aharish@softpath.net
Direct: 678-783-7456 | Work: 404 315-1555 Ext. 667 | Fax: 678-302-4488
Softpath System LLC | 3985 Steve Reynolds Blvd | Bldg C Norcross GA 30093
www.softpath.net