Friday, June 30, 2017

Web Developer

Position Title:   Web Developer / Telecom Service Order Management Developer
Location:          Foster City, CA
Duration:          3 months

Develop a web based Service order Management portal for Telecom order and inventory management. Portal will link to the order entry process of at least 13 global telecom services. 
The portal will transfer installation, move, add, change and disconnect orders to the respective carriers and receive order confirmation and tracking numbers. 
In addition, the portal creates a transactional database for historical tracking and data transfer to a telecom expense management subsidiary ledger system. 
Must have 10+ years of development experience. Must have HTML, CSS coding from scratch. Javascript and Jquery. 
They will need to know basic networking techniques, and basic knowledge of computer software. Relational database admin or management skills. 
Access or SQL server would be great to have. Bachelor's Degree is a must.
o Bachelor degree in a technical field such as computer science, computer engineering or related field required. MBA or other related advanced degree preferred. 
o 10+ years experience required 
Responsibility level 
o Exercises independent judgment with direction from supervisor 
o Verbal and written communication skills, problem solving skills, attention to detail and interpersonal skills (Required) 
o Basic ability to work independently and manage one’s time (Required) 
o Basic knowledge of design networking techniques and principles involved in configuration diagrams (i.e. access switches and routers) 
o Basic knowledge of computer software, such as Visio, Telecom Networking protocol (e.g., MPLS, TDM, and VSAT), Telecom Business terms and conditions, Excel Pivot tables, Access etc 
o knowledge of computer software, such as Visio, Telecom Networking protocol (e.g., MPLS, TDM, and VSAT), Telecom Business terms and conditions, Excel Pivot tables, Access etc. 
o Wireframe/layout a website or web application, and write HTML and CSS from scratch. 
o Turn PSD into a working website and add interactivity to a website with JavaScript (or jQuery) 
o Write a basic application in an object-oriented programming language like Ruby or Python or PHP. 
Major Job Duties and Responsibilities: 
o Gather requirements from business units and translate those to programs and interfaces 
o Prepare an Excel based inventory ledger with specific data fields and layout 
o Confer with SMEs regarding the configuration and circuit information for specified networks

Rajesh T,
Bellevue, WA, 98004, United States
(650) 249-1694 Ext.1135
Aditi Staffing

AngularJS Engineer

Job Title: AngularJS Engineer
Job Location: Irving, TX
Duration: Fulltime Permanent Hire
Compensation: Base Salary + Benefits

Job description: 

  Key Skills
•         Candidate should have minimum 2 years of IT experience as a front end developer and have experience in HTML5, CSS3 and JavaScript. 
•         The candidate should have prior experience on front end technologies involving advanced JavaScript framework (Ex. Bootstrap /  Backbone / ReactJS / Angular 1/2) 
•         The candidate should have performed client facing roles and possess excellent communication skills 
Job responsibilities / Experience  
•         Experience in one or more of the following JavaScript frameworks: JQuery / BackboneJS / Bootstrap / ReactJS / Angular 1/2 
•         Can write CSS and is interested in using newer technologies such as SCSS. 
•         Can write JavaScript code that calls server-side APIs over JSON. 
•         Experience with browser differences and limitations and client- side performance 
•         Is familiar with debugging tools for Internet Explorer, Safari, Chrome and Firefox. 
•         Coordinates your work across teams to build a seamless feature. 
•         Able to look at a UI mockup and implement it using JavaScript, HTML5, Angular and CSS3. 
•         Able to communicate thoughts on your own and others’ designs and implementations in a friendly and encouraging way. 
•         Able to work independently or as part of a team. 
•         Experience working in an Agile environment.

Garima Kohli
Enterprise Solution Inc. 
Phone: 408-715-2912
Email id:-

Thursday, June 29, 2017

Information Security Engineer

Information Security Engineer

About GoPro
GoPro, Inc. is transforming the way people capture and share their lives. What began as an idea to help athletes self-document themselves engaged in sports has become a mobile storytelling solution that helps the world share itself through immersive content.
GoPro offers a fun and fast-paced work environment with passionate and motivated people who have a drive to learn, innovate and succeed.
As technology evolves, GoPro needs quality information security practitioners who can work not only with the technology and understand the threat landscape but also with our internal partners to secure our staff, intellectual property, and our customers.  You will be expected to know technology in great depth but you will also be called upon to share your knowledge with others – both technical and non-technical.  Security Awareness and relationship building are significant attributes to a successful GoPro Information Security team contributor.  If you are passionate about Information Security and like sharing it with others, we’ve been looking for a “hero” like you. 

What You Will Do: 
  • Analyze, design, install, implement, and administer information security services including, but not limited to, network monitoring, data loss prevention, SIEMs, vulnerability management solutions, intrusion detection systems, endpoint security solutions, cloud security, mobile security tools, PenTests / application security working with scrum teams throughout the CICD process.
  • Participate, review, advise, and design information security into the fabric of critical enterprise projects, processes, and business partner teams
  • Demonstrate your knowledge of Information Security to all staff in our enterprise-wide Information Security Awareness Campaign
  • Research, analyze, and create in-depth knowledge regarding threats affecting the GoPro enterprise, our staff, and the systems we use
  • In the event of an incident or investigation, you may be called upon to lead or assist in the identification of malicious actors, preserve evidence, and advise as a subject matter expert to internal staff
  • Apply all your skills you have today and will acquire tomorrow to help GoPro prevent and respond to the threats we see daily 

Skills We’re Stoked About: 
  • Experience in endpoint security (Windows, Mac, and Linux)
  • Experience in Cloud security
  • Experience in network security
  • Experience in Identity and Access Management
  • Experience in incident handling/incident response and computer forensics (SIEM solutions, IDS/IPS systems, and advanced threat analysis)
  • Experience in vulnerability management solutions
  • Familiarity with performing information security risk assessments of organizations, systems, applications, and/or enterprise projects

  • Fully-stocked kitchen with snacks galore
  • Live it. Eat it. Love it. –Two dedicated hours during your week to explore your passions and capture it with your GoPro.
  • Get your very own GoPro (Mounts and accessories included)
  • Discounted employee stock purchase plan
  • Competitive salary
  • 401(K) matching
  • Discretionary Time Off
  • 12 weeks paid Parental Leave for new Moms and Dads
  • Medical, dental, and vision insurance –premiums are fully paid for employees
  • Life insurance and disability benefits
  • Employee commuter shuttles

GoPro is an Equal Opportunity Employer.

Brittany Ludera  Recruiter
5600 Avenida Encinas, Suite 100 
Carlsbad, CA 92008

Find us online at: | Twitter | Facebook | Instagram

Security Engineer

Title                             :             Host Security Engineer III
Location                       :           Dublin, CA 94568
Duration                       :           Contract to Hire 
Department                  :           IT
Reports to (title)           :         Sr. Manager or Director


Research, evaluate, develop and implement Host Security designs and standards following industry best practices.50% 
Ensure that current and planned technical solutions are compatible with the company's business needs and strategic objectives.25% 
Work with the other IT organizations to design, develop, and implement Enterprise Security solutions in support of development, test, and production environments.10% 
Provide technical expertise and assistance to other IT and Business groups.10% 
Operate the production environment tool-sets and services5% 

Qualifications and special skills required:

  • In-depth knowledge of Host security products such as File Integrity, End Point Security, End Point Encryption, Advanced Threat, PKI/Certs
  • Strong knowledge of current security space with general understanding of current security threats, techniques, and landscape, as well as a dedicated and self-driven desire to research current information on the security landscape
  • At least 10 years of Information Security experience and at least 8 years with a large organization
  • Conceptual and practical understanding of IT Infrastructure designs, technologies, products, and services. This should include knowledge of Hosting protocols, operating systems, databases, encryption, and other technologies.
  • Bachelor degree preferred or equivalent combination of education and relevant experience
  • Excellent organizational and time management skills
  • Senior level certification or equivalent with demonstrated relevant experience
  • Able to work independently and creatively problem solve complex technical problems
  • Able to provide leadership, guidance and training to others
  • Able to provide accurate estimates of time-frames and cost estimates necessary to complete potential projects and develop milestones and project implementation plans
  • Ability to analyze and solve complex problems
  • Ability to work in a group setting and independently
  • Excellent attention and orientation toward meticulous work
  • Proficient in Microsoft Office products
Ruchika Sinha| Resource Manager
48531 Warm Springs Blvd # 405 Fremont, CA 94539
Mobile: 510-378-1964 | Fax: (775)201-9919


Information Risk Consultant

Job title: Information Risk Consultant
Location: Springfield, MA
Contract to hire
Primary Skill is in Information Risk Management area with experience in third party/vendor risk assessments.
Mandatory skills:
• Experience with industry standard Information Technology Control Policies and Standards frameworks and risk management methodologies including NIST and ISO
• Experience in risk assessment evaluation as well as identification of risk and mitigations
• Experience in conducting control self-assessments and review SOC 2 reports
• Experience in Information Risk, Information
Security, Audit, and supplier information risk management
• Experience in third party vendor risk assessments
• CISSP or CISA qualified or relevant experience
• Demonstrates a strong ability to identify, analyze, and solve problems
• Excellent oral and written communication skills, and attention to detail
Preferred skills:
• Experience with Archer GRC platform
• Experience in Cloud Security
Job Responsibility:
• Completes reviews of supplier provided artifacts including Control Self Assessments, SOC 2 Reports, and other artifact reviews using defined process and templates
• Ensures that completed materials received are in good order and follows‐up with the supplier relationship managers (SRM) where needed
• Identifies issues and mitigations from the assessment and works with the supplier SRM 
• to proactively mitigate these items
• Uses Centralized GRC tool (Archer) to input assessment evidence, assessment details, issues if identified during the assessment and supporting mitigations
• Assists with supplier assessment metrics and reporting

ANUDEEP MS | Recruiter  | Softpath System LLC 
Direct: 770-450-6330| E-Fax: 678-302-9888|Email :
Softpath System LLC 3985 Steve Reynolds Blvd | Bldg C| Norcross GA

Arcsight Administrator

Title: Arcsight Administrator
Location: Bellevue, WA
Duration: 1 year
Client: TMobile

Description: ArcSight Administration Responsible for the large scale ArcSight deployment including capacity planning, maintenance, and operations.

Description: ArcSight Administration
Responsible for the large scale ArcSight deployment including capacity planning, maintenance, and operations.

Additional Skills: Skills
* Detail oriented
* Excellent communication skills, both written and oral
* Ability to work independently
* Processes and procedure documentation
* Strong knowledge of Information Security Products and Techniques (SIEM, Firewall, Intrusion Prevention (IDS/IPS)
* Strong working knowledge of operating systems (i.e.: Windows, UNIX, RedHat Linux) and RDBMS Systems such as Oracle, MYSQL and MS SQL
* Strong Network experience and fluency in Enterprise architectures
Linux experience
* 5 plus years’ experience with ArcSight
* Administration of ArcSight SIEM environment
* Capacity planning
* ArcSight Architecture
* Perform day-to-day analysis on ArcSight servers and associated components to verify stability and optimize performance
* Deploy ArcSight devices (connectors, Loggers, ESM)
* Testing, implementation and configuration of patches and upgrades
* Research, analyze and understand logs source from various devices in the network for acquisition and integration in ArcSight
* Smart connector management and Flex connector development
* RMA of failed hardware
* Troubleshooting and break fix
* Write scripts and automation to optimize various processes involved
* Author Standard Operating Procedures (SOPs) and training documentation when needed
* Provide support in researching, designing, testing, and implementing new technologies that will enhance the organizations capabilities.

Preferred Skills:
Knowledge of the following technologies a plus:
  • Intrusion Detection / Prevention Systems for networks and hosts
  • Security Event Management Systems
  • Vulnerability Assessment Systems
  • Secure transfer protocols such as SSH, SCP and Connect Direct Secure Plus Diagnostic tools such as packet capture/decode and WAN probes IP Networking
  • Windows Systems administration and security tools
  • Experience with remote access, terminal servers, etc a plus
  • Experience in the administration of UNIX Solaris, HP/UX, or Linux and Windows operating systems a plus
  • Experience in developing and administering an information security program desirable
  • Working knowledge of and experience in the policy and regulatory environment of information security, especially in higher education is desirable 

34405 W 12 Mile Rd, Suite #137, Farmington Hills, MI 48331.

Application Developer

Pega Developer in Lewisville Texas

Applications Developer - Advanced 240377

Job Family Description: Designs, analyzes, develops, codes, tests, debugs and documents programming to satisfy business requirements. Proficient in application development skills for more than one technology as well as proficient in multiple design techniques. This position should typically be used for an advanced or lead level resource.

Database Platforms Oracle No 1 Intermediate 5-6 Currently Using
Operating Systems/APIs DB2 Yes 1 Intermediate 5-6 Currently Using
Programming Languages J2EE Yes 1 Intermediate 5-6 Currently Using
Specialties Pegaworks Yes 1 Intermediate 5-6 Currently Using

Additional Skills:

Pega, DB2 and overall understanding of web application architecture.

Roles and Responsibilities: Work closely with business and service delivery teams to ensure appropriate business
measures are defined. Create technical design recommendations for developing and
integrating programs per written specifications. Examine applications to ensure
adherence to Application Engineering guidelines, processes and procedures. Utilize
multiple programming languages and software technologies to ensure applications are
suitably fit for use and admissible for maintenance and upgrades. Test, modify, and
implement application solutions. Make standard modifications to existing software
applications and modules in accordance with high-level specifications, and application
support and industry standards including Pega 7.x, DB2, JDK 1.5+, Web Service and JMS Integration
Patterns, webspeher, Tomcat, Oracle and Subversion. Engage third party
suppliers on application support issues. Create solutions needed in financial services
industry. Adhere to Software Development Life Cycle methods including agile practices

Wednesday, June 28, 2017

Incident Response

- candidates are expected to make "quick contributions"
- have the tools to monitor and detect information for any incidents
- write reports that will help anyone on the team walk through an incident
- system analysis skills
- be able to take a "deep dive" into a hard drive and perform forensic analysis on machines and write a report on findings
- make sure Malware does not provide a means for an attacker, for ex.

Official Job Description:

Candidate should have hands-on experience with incident response.  My goal is to find someone that can make immediate contributions to the team through responding to incidents, individually contributing to the development of internal incident response procedures based on their past experience and expertise. Ability to perform deep dive forensic analysis (memory and disk-based analysis

Job Description Summary
***'s Enterprise Information Security group is seeking to add more experts to our cyber security
operations and would like to talk to you if you have demonstrable experience in network forensics, disk and
memory forensics, malware analysis, incident handling, and/or threat intelligence. We are looking for
experienced professionals to work on a team of dedicated incident responders. You will be part of a growing
cyber security program, with an opportunity to put your skills to the test in defending a large enterprise network
and safeguarding information assets while supporting the needs of our patients, physicians, colleagues and

1. Knows, understands, incorporates and demonstrates the *** Mission, Vision, and Values in
behaviors, practices and decisions.
2. Provides advanced system management, monitoring, support, troubleshooting, and resolution of all network
security issues within the enterprise network. Provides advanced technical support and manages technology
implementations of network security systems in the system office and enterprise LAN/WAN environments.
3. Provides in-depth knowledge and techniques for second level support to all service groups with network
security dependencies, such as DMZ and Internet services, VPN services and firewall services.
4. Performs root cause analysis for all related network security device outage and performance issues.
5. Assists in the development of a technology architecture plan with a network security focus, in order to ensure
integration and support of overall business requirements and strategic business objectives.
6. Supports all new project planning initiatives and project time-line development. Provides assistance in
technology design and deployment. Develops and coordinates project implementation tasks and plans.
7. Keeps abreast of current industry best practices; develops knowledge through self-study in order to increase
expertise as subject matter expert for understanding, designing, and implementing network security solutions.
8. Educates and mentors network security analysts.
9. Performs other duties as assigned.
10. Maintains a working knowledge of applicable Federal, State and local laws/regulations; the ***
Integrity and Compliance Program and Code of Conduct; as well as other policies and procedures in order to
ensure adherence in a manner that reflects honest, ethical and professional behavior.

Additional Job Description
1. Bachelor’s degree with five (5) to seven (7) years of related experience in infrastructure environments
performing enterprise level network security management and administration using hardware and software
security solutions for LANs and WANs with latest technology or equivalent combination of education and
applicable experience.
2. Must be committed to continual personal and profession growth, possess a pro-active approach with a
willingness to “go the extra mile”, every time for the customer.
3. Must possess advanced administrative experience with Advanced Threat Prevention tools (e.g, FireEye, Palo
Alto Wildfire, etc.), computer forensics tools (e.g., FTK or EnCase) and end point detection and response (EDR)
tools (e.g., Carbon Black, Crowd Strike, etc.).
4. Must have experience with available management & troubleshooting tools such as WireShark, TCPDump and
5. Experience with Linux operating systems is preferred
6. Related experience with intrusion prevention systems and monitoring, including event correlation through
Security Information Event Management system (SIEM) is preferred.
7. Must possess experience in creating technical documentation, network diagrams, and job-aids with Microsoft
applications Visio, Word, Excel and PowerPoint.
8. Demonstrated leadership ability and detailed project management skills.
9. Ability to work independently, manage multiple priorities and to effectively adapt to rapidly changing
technology and business needs with demonstrated ability to prioritize projects & work load.
10. Must be able to set and organize own work priorities, and adapt to them as they change frequently.
11. Certification designation is a plus. (GIAC Certified Forensic Examiner (GCFE) or CISSP with a security
engineering focus).
12. Must be team oriented, supportive, and committed to excellence and possess high level of initiative and
with demonstrated work ethic.
13. Must be committed to continual personal and profession growth, possess a pro-active approach with a
willingness to “go the extra mile”, every time for the customer.
14. Must be comfortable operating in a collaborative, shared leadership environment.
15. Must possess a personal presence that is characterized by a sense of honesty, integrity, and caring with the
ability to inspire and motivate others to promote the philosophy, mission, vision, goals, and values of ***

1. This position operates in a typical office environment. The area is well lit, temperature-controlled and free from
2. Incumbent communicates frequently, in person and over the telephone, with people in a number of different
locations on technical issues.

3. Manual dexterity is needed in order to operate a keyboard. Hearing is needed for extensive telephone and in
person communications.
4. The environment in which the incumbent will work requires the ability to concentrate, meet deadlines, work on
several projects at the same period and adapt to interruptions.
5. The incumbent must be capable of traveling in the course of completing project assignments.
6. Must be available for on-call rotations to support 24x7x365 service availability.
7. Must be able to travel to the various *** sites (up to 20%) as needed (may or may not apply).
The above statements are intended to describe the general nature and level of work being performed by people
assigned to this classification. They are not to be constructed as an exhaustive list of duties so assigned. 

   Molly Celestini | Sr. Technical Recruiter
  Strategic Staffing Solutions
  645 Griswold, ste 2600 Detroit, MI 48226