Tuesday, March 31, 2015

Network Engineer

Job Title: Network Engineer
Location: San Francisco, CA
Duration: 12+ Months Contact

Job Description: As a Consultant, you should have in-depth knowledge in any one technological or industry practice / functional area and overview of 2-3 other areas. You should handle solution definition/ fitment for a small sized project with a medium complexity. You should be able to build a custom Function Module with medium complexity program logic.

Key skills required for the job are:
Infra Consulting (Mandatory)
Networking Consulting (Mandatory)
Experience with IE upgrades in global environment.

Please send me your word formatted Latest resume with below details ASAP:

Full Name                             
Current Location, State:
Mobile and Home Phone No:
Email ID:
Skype ID:
Work Authorization
Expertise & Skillsets:            
Experience in Years:
Communication skills:
Interview Availability:
Available to join from:
Linked in profile / References:
Pending interviews/offers:
Pay Rate/ Employer Details:-

Suman Roy
Pyramid Consulting, Inc.
Sr. Executive- Resourcing

Cyber Incident Response Security Analyst

Location: Houston, TX
Duration: 2 year contract 
Salary: Open
Start Date: ASAP

Interview Process: One Phone Screen


Responsible for maintaining the integrity and security of enterprise-wide cyber systems and networks. Supports cyber security initiatives through both predictive and reactive analysis, articulating emerging trends to leadership and staff. 
Coordinates resources during enterprise incident response efforts, driving incidents to timely and complete resolution. Employs advanced forensic tools and techniques for attack reconstruction, including dead system analysis and volatile data collection and analysis.
Supports internal HR/Legal/Ethics investigations as forensic subject matter expert. Performs network traffic analysis utilizing raw packet data, net flow, IDS, and custom sensor output as it pertains to the cyber security of communications networks. Reviews threat data from various sources and develops custom signatures for Open Source IDS or other custom detection capabilities. Correlates actionable security events from various sources including Security Information Management System (SIMS) data and develops unique correlation techniques. Utilizes understanding of attack signatures, tactics, techniques and procedures associated with advanced threats. Develops analytical products fusing enterprise and all-source intelligence. May conduct malware analysis of attacker tools providing indicators for enterprise defensive measures, and reverse engineer attacker encoding protocols. Interfaces with external entities including law enforcement organizations, intelligence community organizations and other government agencies 

Job Description:

Responsibilities include the acquisition, vetting, and validation of cyber threat intelligence from various internal and external sources. This individual focuses on the fidelity and contextual analysis of indicators of compromise and attacker TTPs (tactics, techniques and procedures) in support of security operations. The successful candidate will be responsible for creating and executing incident response plans, processes, and procedures and performing root cause evaluations. Needs to be able to define events vs. alerts vs. incidents for the organization, and create incident classification, severity, and priority tables in line with all threats, risks and vulnerabilities. 

Must be able to identify and document incident trends and compromise patterns. The successful candidate will be located at the customer site in a leadership role representing Commercial Cyber Solutions. He or she should be able to mentor and coordinate tasking for team members.

Basic Qualifications

The Analyst would have the following experience:

Five or more years of technical experience in the information security field

Three or more years of incident response, analysis and escalation experience

Familiarity with security regulatory requirements and standards (such as NIST 800 series, ITIL, PCI)

Advanced knowledge and experience with the multiple operating systems (Windows, *nix, OSX, IOS and other
infrastructure device OS)

Advanced experience with security technologies including Intrusion Detection & Prevention Systems (IDS/IPS), Firewalls & Log Analysis, SIEM, Network Behavior Analysis tools, Antivirus, and Network Packet Analyzers, and Malware analysis and forensics tools

Advanced knowledge of the TCP and IP protocol suite, security architecture, and remote access security techniques and products

The Analyst would be responsible for:

Support cyber security initiatives through both predictive and reactive analysis.

Coordination of resources during enterprise incident response efforts, driving incidents to resolution.

Employing advanced forensic tools and techniques for attack reconstruction and intelligence gathering.

Perform network traffic analysis utilizing raw packet data, net flow, IDS, and custom sensor output as it pertains to the cyber security of communications networks. 

Utilize understanding of attack signatures, tactics, techniques and procedures associated with advanced threats.
Strong communication skills both written and oral

Desired Skills:

-Advanced understanding of networking, system of systems architecture

-In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platforms (e.g., 

Nitro/McAfee Enterprise Security Manager, ArcSight, QRadar, LogLogic, Splunk)

- Correlate actionable security events from various sources and develop unique correlation techniques.

- Review threat data from Client feeds and develop custom signatures for detection capabilities.

- Experience with malware analysis concepts and methods.

If qualified and interested, please send your most current resume as a word document to Jason Weinstein at jason.weinstein@mondo.com

Jason Weinstein
Technical Recruiter, Mondo
P: 646-230-0876
Philadelphia, PA 19103


Monday, March 30, 2015

Information Security Engineer

GapTech Statement:  GapTech is the engine behind Gap Inc.’s mission to be the world’s favorite for American style. Our technologists are driving retail technology innovation, e-commerce for all Gap Inc.’s brands and delivering global, scalable, cloud-based platform solutions, using continuous integration and open source technology. Reimagining retail has never been more fun!

Information Security Engineer
Location: San Francisco/ Pleasanton CA

The Information Security Engineer works as a member of the Threat & Incident Management team (TIM team). The TIM team is part of Gap’s Information Security organization (InfoSec), working closely with infrastructure, application, and managed service provider teams to ensure the security posture of Gap’s global enterprise is maintained, including endpoint, network, server and border security.

The IT Security engineers serve as Subject Matter Experts (SME) for InfoSec’s portfolio of monitoring and logging tools, providing research, expert advice, and direction on configuration and management of the tools.

The Security Engineer has direct responsibility for working with all GapTech teams in delivering subject matter expertise for cybersecurity incident response and computer forensics services for suspected or confirmed cybersecurity breaches, emerging threats assessment, and supporting legal e-Discovery requests.

·        Identify security issues and risks associated with security events reported by L1 or L2 InfoSec teams, or via alerts from various security tools, and develop remediation and/or risk mitigation plans
·        Leverage a wide range of security technologies including, but not limited to: SIEM/syslog, IDS/IPS, malware analysis and protection, content filtering, logical access controls, identity and access management, data loss prevention, content filtering technologies, application firewalls, vulnerability scanners, LDAP, security incident response and Identity Management software
·        Participate in incident response and investigations of suspected information technology security misuse or compliance reviews as requested by Gap’s Security Council, InfoSec management, or as required when alerts are received from InfoSec threat monitoring tools and threat intelligence sources
·        Work with InfoSec product vendors and service providers, to evaluate potential security offerings, including product evaluations, pilots and proof of concept installations
·        Assist in responses to internal and external compliance audits, e-Discovery data collection, penetration tests and vulnerability assessments
·        Coordinate maintenance of security-related systems (Anti-Virus, Patching, Intrusion Detection, Logging, Anti-spam, etc.)
·        Monitor current and proposed laws, regulations, industry standards, and ethical requirements related to information security and privacy
·        Conduct research on emerging products, services, protocols, and standards relative to the information security arena
·        Other duties as assigned
       Bachelor's degree in computer science or related field, preferred
       CISSP, GIAC or CISM certification, preferred
       Certification in operating system, directory services, firewall, VPN, router and/or other technical areas desired
       3-5 years experience with network and InfoSec components, including firewalls, intrusion detection systems, anti-malware products, e-Discovery and forensics tools and products, data encryption, VPN's, vulnerability scanners, multiple operating systems (Windows, UNIX, Linux, etc.), and directory services (Active Directory, LDAP)
       In-depth knowledge of information security risks and counter-measures for Windows and Unix/Linux platforms
       Understanding of the Payment Card Industry (PCI) data security standards (PCI DSS) and the payment application data security standards (PA DSS) as well as experience in the implementation of controls to mitigate PCI issues.
       Experience with multi-national large-scale enterprises.
       Demonstrate the strong communication skills required to discuss and present complex engineering principles and issues to both technical and non-technical business leadership and to write concise proposals and documentation.
       The demonstrated ability to work effectively in a collaborative team environment as an individual contributor.
       The ability to provide support after normal business hours, as needed.
       Must be resourceful, creative, innovative, results driven, and adaptable

Shriya Deshpande
Technical Talent Scout, GapTech

Wednesday, March 25, 2015

IT Security Consultant

Position                                IT Security Consultant
Irving, TX.
Position Type                     Contract

Duration                              6 Month
Rate                                       $Negotiable/hr
Job Description—

  • Good communications – written & oral;
  • In-depth understanding of Security Event Management – both from a technology/tool as well as process perspective;
  • In-depth understanding of ArcSight SIEM solution and its application for Threat Monitoring;
  • Gap analysis and drawing up a roadmap;
  • Awareness of ITIL concepts;
  • 10+ years of experience in Industry;
  • 7+ years in IT security domain;
  • Design and implementation of ArcSight SIEM solution (ideally v3.5 or later) – at least for 2 separate engagements;
  • Development of custom use-cases and reports on ArcSight  SIEM solution;
  • Experience of carrying out gap assessment for SIEM deployment based on ArcSight ;
  • Experience in implementation and configuration of point security solutions (SIEM, firewalls, anti-malware etc.) preferred.
  • Prior experience of working with clients from US and Europe (at least 2 yrs) is a must – ideally in a consultative capacity;
  • Bachelor of Engineering (BE) or Master Science (MS);
  • Trained on ArcSight ;
  • Certification covering security point solutions such as firewalls, IPS/IDS, SIEM etc (preferred);
  • CEH will be an added advantage;

Jag (Jagdish Tiwari)
Enterprise Solutions, Inc
Naperville, IL 60563 
Fax: 630-206-2379
Mail: jagdish@enterprisesolutioninc.com 
Web: www.enterprisesolutioninc.com

Tuesday, March 24, 2015

Problem/ Change Manager

We are assisting our direct end client SAP (Ariba) in their search for Problem/ Change Manager. This position is located in Sunnyvale, CA. It is a 6 Months Contract-to-hire position. If you would like to apply for this role, please email me your resume onpraj@lat36.com or call on 510-894-7001 or 510-390-0941.

Job description:

Job Title: Problem /Change Manager

Location: Sunnyvale, CA

Duration: 6 Months Contract-to-hire

What you need to succeed • Experience working with and improving processes within a standard ITSM framework such as ITIL. • Demonstrable ability to communicate clearly and effectively. • Ability to direct and manage incident responders and incident response processes. • Ability to effectively manage client & staff relationships, promptly respond to queries and manage expectations. • Advanced planning and organizational experience within fast-paced/dynamic business environments • Familiar and comfortable working in a 24x7, high-availability service delivery environment

Top 3 Soft Skills Manager is looking for: 1. Articulate 2. Meticulous thought process 3. Tenacity/Passion Top 3 Technical skills manager is looking for: 1. Front End Server/Application Server/Database knowledge 2. Crisis Management 3. Web Server/Stacking

Priyanka Raj | Latitude 36 Inc | Recruiting Professional W: (510) 894-7001 || E: praj@lat36.com || www.lat36.com 39465 Paseo Padre Parkway, Suite #3000, Fremont, CA 94538

Web developer

Location - Sunnyvale, CA
Duration - 6 Months

We are looking for smart, sociable and responsible web developers who are eager to tackle the challenges of rapidly growing web applications with tens of millions of daily visitors. We want to hire dedicated and conscientious people to build rich, dynamic client-side interfaces using Javascript, while leveraging new technologies like HTML5 and CSS3, and server-side technologies like Java, Dust and Play.

Position Responsibility:
You will own the front-end development for one or more of our products and collaborate with visual/interaction designers, engineers, and product managers to launch new products, iterate on existing features, and build a world-class user experience.
You will be writing state-of-the-art code to keep our company at the cutting edge of technology. Your specific expertise will be required to make efficient use of A/B testing frameworks, fast page load times, and efficient UI development. 

Position Requirements:
  • Minimum 2+ years of experience with semantic HTML and CSS
  • Experience writing clean, unobtrusive Javascript/AJAX including experience with common libraries (jQuery, etc) and debugging tools (Firebug, etc.)
  • An encyclopedic knowledge of browser quirks and their remedies
  • Knowledge of (and a passion for) current trends and best practices in front-end architecture, including performance, accessibility and usability
  • Familiarity and comfort with command-line applications
  • Experience working with a typical backend language (Java, Scala, PHP, etc.)
  • Experience working with Adobe CQ a plus
  • Bachelor's degree or equivalent experience required

Gaurav Solanki | 
TalentBurst, Inc.

Boston | San Francisco | Miami | Milwaukee | Toronto | New Delhi | Bangalore
Work: (508) 628-7566| Fax: (508) 319-3065 | Email: gaurav.solanki@talentburst.com
679 Worcester Road | Natick, MA 01760 | www.talentburst.com

Senior Software Engineer

Location: Sunnyvale, CA
Duration: 9 Months
Start Date: ASAP
Interview Process: Phone/Skype
Job Description:

  • Demonstrates up-to-date expertise in Software Engineering and applies this to the development, execution, and improvement of action plans
  • Leads and participates in medium- to large-scale projects
  • Leads the discovery phase of medium to large projects to come up with high level design
  • Leads the work of other small groups of four to six engineers, including offshore associates, for assigned Engineering projects
  • Models compliance with company policies and procedures and supports company mission, values, and standards of ethics and integrity
  • Provides and supports the implementation of business solutions
  • Provides support to the business
  • Troubleshoots business and production issues
  • Ecommerce applications or mobile software

Additional Preferred Qualifications

  • 5+ years experience in a development or architectural leadership role in a web-based J2EE product organization
  • Experience leading teams through the full life-cycle of software development through design, development, quality and deployment
  • Experience at leading teams with both onshore and offshore team members
  • Experience with service oriented open source technologies: Apache Camel, Drools, REST, Web-Services
  • Proficiency with Node.js, web services, CSS3, AJAX, JavaScript, HTML5, MVC and ExtJS
  • Experience with XML and XSLT technology
  • Experience building fast and efficient web applications
  • 2+ years experience in Agile Methodology
  • Experience with RDBMS, ORM, Web Services
  • Experience with NoSQL technologies desirable
  • Prior experience with Retail, eCommerce or SaaS offerings
Sweta Singh|Sr. Technical Recruiter
Enterprise Solutions Inc. | 500 E. Diehl Road,Suite 130, Naperville, IL 60563
Tel – 630-219-1466|Fax - 630-206-2379

Information Security Consultant

Job Title: Information Security Consultant 
Location: Irving - Texas

Job Description: 
Key skills required for the job are:

  • ArcSight(Mandatory)
As a Consultant, you should have in-depth knowledge in any one technological or industry practice / functional area and overview of 2-3 other areas. You should handle solution definition/ fitment for a small sized project with a medium complexity. You should be able to build a custom Function Module with medium complexity program logic.
Minimum work experience:8 - 10 Years

Skills and Experience Details:
Minimum Experience Required: 8-10 YEARS Mandatory Skills: ArcSight Security Compliance and Framework, SIEM - Security Information Event Management, ITIL IMPLEMENTATION, Consulting, Security Operations Design and Implementation, Branding and Thought Leadership Desirable Skills: Language Skills: English Language

If you are qualified, available, interested, planning to make a change, or know of a friend who might have the required qualifications and interest, please call me ASAP at  (732) 318-3811 even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you.

 Deepak Mishra
Gtalk ID- dmishraitrecruiter@gmail.com

eTeam Inc
(732) 318-3811
1001 Durham Avenue Suite 201
South Plainfield, NJ, 07080

Monday, March 23, 2015

Windows/Security Analyst

Job Title: Windows/Security Analyst [LOCAL TO CA ONLY]
Location: San Ramon, CA
Duration: 6+ months
Job Responsibilities:
Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines).
Responsible for the tracking and monitoring of software viruses. 
Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls. 
Ability to install and use various security tools , experience Microsoft Windows 2008 or later POWERSHELL.

Firaas Khan • Lead Technical Recruiter • Panzer Solutions LLC
45 Stuart Ave • Unit K • Norwalk, CT • 06850
Office: 203-652-1444 *117 • Fax: 203-286-1457 • Email: firaas.khan@panzersolutions.com • URL: www.panzersolutions.com

Cyber Defense Analyst

It is an IT Systems Analyst/Cyber Defense Analyst position with my healthcare client. This person is able to work either from their San Francisco or El Dorado Hills, CA location

The IT Security Services team is looking to add a Cyber Defense Analyst member to support the IT security initiatives. The Cyber Defense Analyst will apply knowledge to monitor and respond to alerts triggered by IT Security Services existing technologies, services and other IT Security incidents reported to the team.
Responsibilities (add bullets if needed):
• Event monitoring and analysis for IT security incidents
• IT security incident and vulnerability response and escalations
• Threat detection and response and escalations
• Detection and escalation of account privilege abuse
• Must have a flexible schedule that is open to changing situations and willing to perform all business related tasks assigned

Qualifications (add bullets if needed):
• A degree in Computer Science and 1-2 years dedicated to IT, IT security, and/or security infrastructure experience or related field OR a combination of equivalent work experience and education

Additional Skills (add bullets if needed):

• Good written and verbal communication skills at different levels with the ability to articulate with both technical and non-technical audiences
• Team player with strong relationship building skills that assists with interconnecting and high collaboration across all IT departments – promptly shares relevant information with others
• Strong business acumen and a commitment to integrity, process improvement and customer satisfaction
• Demonstrate strong organizational, problem solving, and analytical skills
• Positive can-do outlook, rebounds quickly from frustrations, and maintains composure and friendly demeanor while dealing with demanding situations.
• Independence – able and willing to perform tasks and duties without supervisions or with limited guidance. 
• Cooperative – willing to work and collaborate with peers, leads, and management and is compromising where necessary

• Start Date: now
• End Date: 1 year after start date
• Location: 4 in El Dorado Hills 
• Contract to hire (y/n): y
• Hours per week: 40
• Interview Process: Phone

Angela Deeb

Information Security Consultant

Job Title: Security Consultant
Location: Westlake,TX 


Job Description:
  • The SIEM Engineer is responsible for supporting the event logging and correlation needs of a large company.
  • The person in this role will work as part of a security team responsible for protecting the company's IT assets.
  • This person will not only be experienced with the traditional use of SIEM tools such as ArcSight but will also be able to advise Company staff SIEM plans with an eye toward virtualization.
  • This person needs to be very comfortable with all aspects of logging including the agents and should be able to troubleshoot logging problems either on the servers or workstations.
Essential Duties & Responsibilities
  • Support all aspects of Company's Security Information and Event Management initiative.
  • Participate in the operation of ArcSight Security Information and Event Management systems to include ArcSight ESM, Logger appliances, Windows and Linux servers, network devices and backups.
  • Configure rules within Arcsight ESM to correlate events from various devices throughout the network and identify anomalies that require further investigation.
  •  Participate in the design and implementation of ArcSight architecture upgrades and changes.
  • Establish plans to implement architecture changes.
  • Life-cycle management of the ArcSight platforms including coordination and planning of upgrades, new deployments, and maintaining current operational data flows.
  • Apply Configuration Management disciplines to maintain hardware/software revisions, ArcSight content, security patches, hardening, and documentation.
  • Develop content for a complex and growing ArcSight infrastructure. This includes use cases for Dashboards, Active Channels, Reports, Rules, Filters, Trends, and Active Lists.
  • Provide optimization of data flow using aggregation, filters, etc.
  • Create periodic reports for management showing the health of the SIEM program.
  •  Working closely with Company team to maintain security requirements for operation of
  • ArcSight systems.
  • Support all aspects of Company's Security Information and Event Management initiative.
  • Drive the development and the establishment, enhancement, and continual improvement of an integrated set of correlation rules, alerts, searches, reports, and responses.
  • Responding to day-to-day security requests relating to ArcSight operations.
  • Tunes ArcSight performance and event data quality to maximize ArcSight system efficiency.
  • Assists with analyst using ArcSight and other tools to detect and respond to IT security incidents.
  • Perform routine equipment checks and preventative maintenance.
  • Act as SME for all questions related to the ArcSight SIEM implementation.
  • Maintaining up to date documentation of designs/configurations.
  • Create shell and perl scripts to facilitate automated tasks.
  • Work with other Service Providers to support areas of common interest.
  • Working with software and hardware vendors.
  • On-call support may be required.
  • Perform other duties as assigned.
  • Desired Skills and Experience
  • BS in Computer Science or equivalent experience and education
  • A minimum of five years of experience as a security generalist
  • At least one year of experience using ArcSight or three or more years working with another SIEM product
  • Familiarity with the client application Snare
  • Understanding of logging on various operating systems including Windows and *nix
  • A basic understanding of networking principles
  • Strong written and verbal communication skills
  • CISSP or ArcSight or GCIA certification
 Preferred Knowledge and Skills
  • Bachelor's Degree
  • Experience acquired through working in a large IT environment
  • Understanding of ITIL standards

If you are qualified, available, interested, planning to make a change, or know of a friend who might have the required qualifications and interest, please call me ASAP at  (732) 318-3811 even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you.


Also, please take a few minutes to answer some of the questions below as they will help me qualify your candidature
Full Legal Name as in Driving License/ Passport:
Preferred email ID:
Day/ Evening phone numbers:
Current Location:                                       
Work Authorization:
Earliest availability for Phone/ On-Site interview:
Hourly Rate:
Earliest possible start date: 
Two Professional References:

Also, be aware that our client conducts an extensive background checks on candidates who are extended offers of employment. 

Deepak Mishra
Gtalk ID- dmishraitrecruiter@gmail.com
eTeam Inc
(732) 318-3811
1001 Durham Avenue Suite 201
South Plainfield, NJ, 07080