Monday, April 27, 2015

Web Developer

Role: Web Developer
Location: San Bruno, CA
Position Type: W2 Contractual 
Duration: 6 Months
Interview Mode: Telephonic & F2F

Seeking talented Web developer with strong front end experience building high quality scalable web applications to join our team delivering innovation to digital shopping experience. You will have the opportunity to build out great online properties and designs that balance complex customer needs with application performance. Help invent the next generation of ecommerce; integrated experiences that leverage the store, and the web to sell anything, to anyone, anywhere in the world The Opportunity: - Work in a small, high performance agile team environment - sharing innovative ideas and working collaboratively across teams. - Work with talented engineers and product visionaries to contribute to the vision and design of our web and mobile properties. - Create front end of interactive websites incorporating HTML5, CSS3, JavaScript, AJAX as well as other Web 2.0 techniques. - Be a product-oriented Web Developer creating and experimenting with new ideas that will engage and excite our customers. 
Experience/Skills required:
Bachelor's degree in Computer Science or related technical field. MS/PhD would be a strong plus. 
3+ years experience in HTML5, JavaScript, CSS3, AJAX and general Web 2.0 techniques in the context of interactive Web Applications. 
Strong understanding of responsive design techniques and principles 
A passion for all things JavaScript, UI and Front End
Must be able to work effectively both on teams as well as be self-motivated, task oriented and organized. 
Strong customer focus and obsession with quality
Ability to work in a fast-paced and agile development environment.
Chandan Narayan
Enterprise Solution Inc.
500 E Diehl Rd, Ste #130, Naperville, IL 60563
Desk: +1- (708) 843 -7185
Fax: (630) 955 -5990
Email ID:

Friday, April 24, 2015

Information Security Consultant

The Enterprise Technology Risk Management (ETRM) function is responsible for cyber security across the organization as well as the related implementation of appropriate controls for regulations such as SOX, HIPAA, CA1386 and NERC/CIP.
The function has direct responsibility for establishing cyber security standards, toolsets and processes and then matrixing them to the delivery, operation and maintenance areas across PG&E.
The Threat & Incident Management (T&IM) group is responsible for ensuring that PG&E proactively identifies and assesses threats to its network and data, monitors its network for malicious activity, investigates intrusions and other relevant events, and has a sophisticated and detailed understanding of the evolving threat landscape.

Position Summary
Responsible for the delivery of information security services including threat assessment, security event monitoring/analysis, incident response, vulnerability management and security tool administration in support of PG&E’s enterprise security goals and objectives.
Cyber Threat Specialists use a variety of commercial and custom tools and processes to provide the information security services mentioned above.
Cyber Threat Specialists are experts in the operation of these tools and have the ability to design improvised solutions on the fly when dealing with active threats.
Cyber Threat Specialists produce metrics and statistics that feed complimentary processes in PG&E such as risk assessment, patching, anti-virus, firewall management, etc.
Cyber Threat Specialists are very technically skilled and have the ability to work successfully with other technical teams within PG&E’s IT department and

Technical requirements/desires
include familiarity with scripting languages, comfort working at the command line, SQL experience, familiarity with common operating systems and expertise operating IDS/IPS systems, SIEM systems, vulnerability scanners and other security solutions.
Technical curiosity and fast learning are critical success factors for the right candidate.
Knowledge of security industry terminologies and a desire to understand how security landscapes change over time are valuable qualities in a candidate.
The candidate must possess strong written and verbal communication skills with the ability to explain complex technology designs to groups and business units outside of information technology personnel.
Experience with operational networks and industrial control systems is highly desired.

Education Required:
• Bachelor's degree in Computer Science or related field, or equivalent work experience Training, Licenses or Certifications

• (CISSP) Certified Information Systems Security Professional certification or equivalent or ability to obtain via self-study within one year of hire date Prior Experience

• 4 years of Information Technology experience, with at least 2 years of experience in information security working with security tools, security operations, security intelligence or equivalent functions

• Utility Industry experience
• Experience with Security Information and Event Management (SIEM) systems, Intrusion Prevention Systems, Forensic Systems, Malware Prevention/Detection systems, etc… Knowledge, Skills, and Abilities/ Technical Competencies

• Technical expertise in systems administration and security tools, combined with the knowledge of security practices and procedures
• Ability to understand and critically analyze technical issues in heterogeneous environment
• Programming/scripting skills
• Technical knowledge of operating systems (e.g., UNIX, Windows)
• Knowledge of all layers of the OSI stack
• Ability to read and understand network packet capture files
• Ability to effectively use IDS, IPS, and/or other signature matching technology
• Technical expertise in log collection, analysis, correlation, and alerting
• Expertise in security event monitoring / operations security technologies
• Ability to analyze events and determine severity and appropriate recommended response required
• Advanced understanding of network and systems security, system and network configuration, and application security
• Proven customer facing skills and the ability to effectively communicate at both a high-level and a technical level
• Able to identify complex security exploits, threats, and vulnerabilities
• Strong process orientation and understanding
• Security minded and knows how to handle evidence containing sensitive information
• Good grasp of information security fundamentals, concepts, and strategy
• Excellent written and verbal communications skills
• Demonstrates advanced knowledge of methods, tools, and procedures to prevent system vulnerabilities, and provide or restore security of information systems, databases and network services • Serves as a point of contact on technological issues and searches for ways to improve existing methodology and apply new technology as it becomes available • Applies advanced knowledge of developments and new applications of information technology (hardware, software) and information systems to meet organizational requirements • Develops and maintains strong work relationships, contacts, and networks; demonstrates skill in achieving cooperation from others in order to achieve a goal Personal Attributes • Strong sense of professionalism and ethics. • Acts with integrity and communicates honestly and openly
• Ability to build rapport and cooperation among teams and internal stakeholders
• Respects others and demonstrates fair treatment to all
• Methodical and detail oriented
• Self motivated
• Actively seeks to enhance the group through the sharing of knowledge

• Identify, validate and take action to mitigate network intrusions, malware outbreaks, data breaches and other types of cyber attacks • Recognizes successful intrusions and compromises through review and analysis of relevant event data; Differentiates false positives from true intrusion attempts • Analyzes and reviews security alerts generated by monitoring processes and tools, looking for trends and root causes, and working with stakeholders to resolve security issues • Collaborate with Line of Business technical teams for issue resolution and mitigation • Ensures that security controls are appropriate and operating as intended • Evaluates security alerts generated by vendors and other industry sources • Participate in cyber security incident response activities • Maintain all operations and service levels for security tools and services • Maintain proactive health check operations including run-book tasks, service monitoring alerts, and comprehensive configuration documentation for specified security tools • Maintain and enforce standardized, repeatable administrative and operational policies and procedures
• Provide subject matter expertise on security analysis services, tools, processes, and procedures, mentoring junior team members, and improving services • Ability to code complex tasks that integrate systems or produce reports or provide output that can be leveraged by other team members or systems • Perform complex administration tasks (e.g. customization, cross-tool integration) for security tools • Designs and implements improvements to current security services, tools, processes, and procedures

Asutosh Dash
Intelliswift Software Inc.
Email :
Work : 510-455-7013

Tuesday, April 21, 2015

Security Analyst

Job ID:        4075253
Job Title:    Security Analyst
Location:    Pleasanton, CA 
Duration:   6+ months   
W-2  only                  
Responsible for monitoring, analyzing, improving and troubleshooting security systems. Perform risk assessments on security systems, analyze results and provide recommendations for enhancement/improvement. Monitor and maintain firewall rules and policies. Develop, implement and maintain disaster recovery and operations continuity plans. Perform forensic analysis on security incidents. Monitor internal security tools and provide reporting as necessary. Manage virus protection software for prevention, detection and elimination. Must possess a solid understanding of intrusion detection systems, firewalls, vulnerability scanners, encryption technologies and antivirus software. 5-10 years experience required.
Participate in Compliance programs (PCI, SOX, Safe Harbor) by documenting controls, examining evidence for compliance to standards. Co-ordinate and conduct Risk Assessments in accordance with Gap Policies and Standards including Risk Rating calculation and working with the business on remediation the risks. Produce reports of individual risks and overall risk posture. Use Industry best practices to improve and enhance the Gap Risk Management Programs. Work with project development teams to identify PII and record the results in the GRC tool. Work with security engineering to ensure that appropriate Application Security evaluation is taken and document the results. Conduct periodic reviews of PII to ensure ongoing accuracy. Review Vulnerability reports and ensure that remediation is prioritized and performed in a timely manner. Review the existing Policies and Standards, make recommendation to make the documents easier to maintain, more concise and easier for end users to understand. Participate in the Information Security Vendor Management Program. Evaluate new and existing vendors and work with business partners to resolve any issues that may arise. Experience Must have: Broad knowledge of Information Security Excellent verbal and written communications skills. Be a self starter being able to manage and prioritize own workload Be a team player in a fast moving environment The ability to learn quickly and execute in a timely manner Desirable: Experience in Retail IT Working knowledge of Scrum used in Infrastructure Familiarity with GRC tools e.g. Keylight Knowledge of PCI DSS 

Qualifications Bachelors Degree

Rohit Bhargava
(O) 630 743 6012, (F) 630 206 2379
500 E. Diehl Road, Suite 130, 
Naperville, IL 60563

Monday, April 20, 2015

ICT Security Specialist

JOB TITLE:ICT Security Specialist

Performs all procedures asked to ensure the safety of Information Systems Assets and to protect systems from intentional or inadvertent access or destruction.

1) Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and
systems, including hardware, firmware and software.
2) Ensures that IS security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IS
standards and overall IS security.
3) Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future
4) Investigates and resolves security incidents and recommends enhancements to improve security.
5) Develops techniques and procedures for conducting IS security risk assessments and compliance audits, the evaluation and
testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of
security incidents.
6) Other related duties as assigned.

1) Requires strong multicultural awareness to appropriately deliver messages and adapts style to differing audiences.
2) Acts as a resource for colleagues with less experience; may direct the work of other staff members.

A Bachelor's degree in a relevant discipline.
A minimum of 4 years of relevant experience.

•A minimum of 2 years of hands-on experience with application penetration testing focused on identifying vulnerabilities in a complex enterprise environment.
•Proficiency with web application assessment/penetration tools and techniques.
•Familiarity and use of vulnerability testing tools.
•Firm understanding of frameworks like OWASP, NIST, and CERT.
•Strong grasp of SIEM alerting and ability to identify and footprint surreptitious activity using multiple data feeds.
•Demonstrated ability to independently identify and resolve complex issues through effective problem solving skills.
•Experience with security devices like: firewalls, internet proxy’s, load balancers, NIDS/NIPS, and application proxy’s.
•Previous or current member of a CIRT acting as a technical lead.
•Proficiency with Windows and POSIX administration.
•Familiarity with services like: DNS, DHCP, Wireless, SSL/VPN, IPSec, Web servers, Database applications, and authentication protocols


If your friends looking for job, kindly forward this job descriptions to your friends.
If it is not matching with your profile , please ignore it..
if you are interested kindly reply me back with your updated resume,  contact details and best time to reach you. And Your Expected pay rate on W2
Note: ** Please ignore the email in case you are not interested  OR  you're not willing to relocate  / If this project does not match your exact skills perhaps you know of someone
with the necessary experience and availability; if so, please feel free to forward this e-mail 
 AND We have openings with our clients throughout the country that match your job title and skills.
I am here to help you in getting your dream job
.  Thanks!!!!!!!!!! 
Bhanu .  Recruiter
Ageatia Technology Consultancy Services Inc
949 N plum Grove Road | Schaumburg, IL 60173
Email:-  |Board Line : 847-517-8415   EXT:322  |visit :

Security Analyst

Security Analyst
Jersey city, NJ or Charlotte, NC
Full Time
Roles and responsibility
  • Possess a broad knowledge of IT risk system controls (e.g. CISSP domains) and knowledge to identify technical, operational and business risks
  • Ability to manage and analyze data (Intermediate+ skills in Excel)
  • Advanced written and communications skills
  • Excellent interpersonal skills including negotiation, problem resolution and customer service
  • Demonstrated ability to meet project deadlines and work within a fast-paced project driven and team environment
  • Develop continuous improvements to project risk reviews
  • Contribute to governance and facilitate remediation of related risks, deficiencies, gaps or issues
  • Advise and assist project teams on compensating control alternatives where IT risk requirements cannot be met
  • Support key reporting activities associated within key function
  • Perform ad hoc IT risk analysis and reporting
  • Perform internal controls risk assessments of technology enabled projects and 3rd party vendor assessments
  • Contribute as a team member to all other risk, security, compliance initiatives and services as appropriate.
  • Collaborate with key stakeholders in IT and the Business (e.g. Risk Management, Legal & Compliance, etc.)
  • Support day to day technology controls, project risk reviews
  • Support the monitoring, analysis, identification and tracking of IT risks
  • Support the review of vendor contracts to identify potential internal control risks
  • Study industry risk trends and identify improvement in IT Risk and Compliance Management
  • Bachelor’s degree in computer science, management information systems, engineering or a related discipline and approximately 2-3 years of related work experience
  • Advise in several IT Risk domains (e.g. Access Control, Change Management, Cryptography, Secure Network Design)
  • Must have experience with integrity controls, access controls, incident response procedures, security architecture and design
  • Experience with integrity controls, access controls, incident response procedures, security architecture and design
  • Knowledge of the project and system development life cycle
  • Experience with Windows, Linux, UNIX and Virtual environments. Ability to recommend Operating System hardening for all environments and systems.
  • ISACA, SANS or CISSP certification preferred
Salman Shaikh
Enterprise Solutions, Inc
630-246-6040 (Direct) 

Friday, April 17, 2015

SEIM Engineer

Title-  SEIM Engineer( Security Event and incident management)
Location- San Diego,CA
Duration- Long term
Start- ASAP
Job description:
The Security Engineer position recommends and devises security solutions, advises on systems and application-level security configurations, and investigates/mitigates security risks as required. This position also performs security monitoring, data / log analysis, content filtering and forensic analysis to detect security incidents, and provides expert incident response against the ever-increasing list of attacks to ensure the protection and compliance of company data assets. Incident Response and SEIM tools configuration experience etc
•             Manages / administers the company’s day-to-day information security infrastructure
•             Defines, updates and maintains information security policies, processes, procedures, and standards
•             Identifies potential threats and risks, makes recommendations and system changes to mitigate these issues
•             Analyzes and assesses vulnerabilities in the company’s computing resources to demonstrate security control effectiveness
•             Manages and tracks risk mitigation efforts to ensure that risks are managed appropriately and in a timely manner
•             Provides project support for both IT and business initiatives requiring security infrastructure and services
•             Maintains and tests the company’s security incident response plan
•             Works in parallel with the Security Operations Center (SOC)
•             Develops and promotes activities to create information security awareness within the organization and across functional boundaries
•             Assists with security investigation and computer forensic analysis as needed, responds to security emergencies both during and after business hours.  May become an integral component to the IR team
•             Assists in maintaining compliance with various compliance programs, such as PCI and HIPAA
•             Develops and maintains a technology and controls roadmap to address the ever changing threat landscape
•             Follows industry best-practices for security incident, problem, and change management (ITIL)
•             Reports on information security metrics to demonstrate control effectiveness

Akhilesh Kumar
Technical Recruiter
Net2Source Inc.
Tel(201) 340.8700 Ext 454 | Fax: (201) 685.8135
Email :
Address: 15 Exchange Place, Suite # 500, Jersey City, NJ - 07302

SIEM Consultant

Role : SIEM Consultant
Location: Irving, Texas
Job Description
  • Good communications – written & oral;
  • In-depth understanding of Security Event Management – both from a technology/tool as well as process perspective;
  • In-depth understanding of ArcSight SIEM solution and its application for Threat Monitoring;
  • Gap analysis and drawing up a roadmap;
  • Awareness of ITIL concepts;
  • 10+ years of experience in Industry;
  • 7+ years in IT security domain;
  • Design and implementation of ArcSight SIEM solution (ideally v3.5 or later) – at least for 2 separate engagements;
  • Development of custom use-cases and reports on ArcSight  SIEM solution;
  • Experience of carrying out gap assessment for SIEM deployment based on ArcSight ;
  • Experience in implementation and configuration of point security solutions (SIEM, firewalls, anti-malware etc.) preferred.
  • Prior experience of working with clients from US and Europe (at least 2 yrs) is a must – ideally in a consultative capacity;
  • Bachelor of Engineering (BE) or Master Science (MS);
  • Trained on ArcSight ;
  • Certification covering security point solutions such as firewalls, IPS/IDS, SIEM etc (preferred);
  • CEH will be an added advantage;
Deepak Mishra
Technical Recruiter
eTeam Inc
1001 Durham Avenue
Suite 201
South Plainfield, NJ 07080-2300
Desk: 732-318-3811
Gtalk Id
FAX: 908-757-0800

ArcSight Analyst

Job Title:ArcSight Analyst (1912151568)
Location:Blue Bell, PA or Reston, VA
Job Type:3-6 Months Contract to Perm
Job Description:
  • At least 5 years of ArcSight experience
  • Daily duties support and maintain ArcSight systems
  • Implement new ArcSight Installations
  • Create ArcSight Connectors and install/maintain
  • Create Rules/Use Cases and reports
  • Candidate should have experience in Information Security, IDS, Firewall and server log analysis. Splunk knowledge is a plus.
  • Must have BS in technology or business, preferably Information Systems degree.

Thanks & Regards,
Mike Thomson, Recruiter
IT Solutions & Consulting Services
ObjectWin Technology Inc
D: 832-485-3680  F: • F: 713-782-828314800 St. Mary’s Lane  Suite 100  Houston, TX 77079

Thursday, April 16, 2015

Front End Developer

Title:Front End Developer
Location: San Bruno,CA
Duration:7+ MONTHS (W2)

Start Date: ASAP

Required Skills:
  • Interested in an applications engineer with knowledge in building responsive sites (Desktop and mWeb),
  • Experience in cross browser compatibility issues (especially around IE),
  • knowledge of HTML/CSS3 and especially on MVC javascripts frameworks (either backbone or angularjs).
  • Knowledge of lumbar, thorax and of other @Labs js modules is desirable but not required.
  • Nodejs knowledge is desirable but not required.
  • Prior experience in building customer facing applications is required.
Abhishek Lowanshi
Sr. US IT Staffing Specialist
Direct # 408-465-5259
Fax # 630-206-2379
CA-2855, Kifer Road, Suite 102, Santa Clara, CA 95051

Wednesday, April 15, 2015

Sr. Information Security Analyst

Title: Information Security Risk Analyst
Location: San Francisco, CA
Contract Duration: Direct Hire Perm
Title : Information Security Risk Analyst
Dept: Information Security – IS

The Overall Purpose of this Job
The Information Security Risk Analyst will support the Information Security risk management process within the Company. The Information Security Risk Analyst is the primary security liaison responsible for providing security consulting on all Company projects and initiatives.  The primary responsibilities of the position are to assess the adequacy of security and business continuity/disaster recovery controls, evaluate threats and vulnerabilities, assess solution architecture and design documentation and communicate risks and security recommendations to business units and management. 

The ideal candidate will be a self-starter and have an inquisitive, analytical mind that constantly looks for solutions to difficult problems.  The analyst must have the ability to convey complicated technology and security concepts to business units and management. Analyst should possess in-depth knowledge and/or hands-on experience in security, network and systems administration, network security, database administration, virtualization, cloud technologies, enterprise architecture or other technical domains.

The Information Security Risk Analyst should possess excellent verbal and written communication skills with the ability to understand business requirements.  To succeed in this position, the candidate must be able to develop risk management strategies that align with business goals and operations and protect the confidentiality, integrity and availability of information systems and our data.
  • Continuously identify, assess, measure and monitor information technology risk by performing independent hands-on security assessments.  
  • Includes both in house systems and vendor based solutions covering Information Security, Business Continuity and compliance risk.
  • Identify and communicate recommended security and business continuity controls and control deficiencies for business units.
  • Document and monitor the implementation of controls for technology and business project plans.
  • Develop an overall security risk management strategy for new or existing services with key business stakeholders.    
Minimum 4 year college degree required.
Knowledge and/or experience with LANs, WAN, VPNs, Routers, firewalls, and IDS/IPS systems desired.
Relevant information security certifications (e.g., CISSP, CISA, CISM, CRISC, or GIAC) preferred or the ability to gain a certification within 6 months of hire.
3 years of security or information technology related work experience.
Strong communication & organizational skills, ability to multi-task, strong attention to details, excellent problem solving and follow-up skills required. 
Work independently, make decisions and multi-task effectively in a very diverse, project oriented environment. 
Ability to complete high quality deliverables.
Sergio Ortiz  | Technical Recruiter | NTT DATA, Inc.| w. +(213) 228-2500 Ext.4008 | | Learn more at
315 East 9th Street Suite 300, Los Angeles, CA, 90015