Thursday, April 26, 2018

Cybersecurity Analyst

Job Title : Cybersecurity Analyst
Duration : Full Time
Location : Secaucus, NJ
 
Job Responsibilities:
Maintain and improve web application Global Threat and Vulnerability Management process to ensure a consistent, repeatable well-defined program is in place.
Define security control requirements for the web environment and related infrastructure services to ensure that access to information, application functions, storage, networks, and data processing systems are adequately safeguarded
Perform application security testing to identify cyber risks for applications belonging to the Client
Work with the Client application/infrastructure/service owners and support the Client to develop and track remediation of identified improvement opportunities.
Oversee the controls recertification process across web application services to ensure quality results.
Conduct cybersecurity risk assessments for the Client and provide best practices recommendations to support team risk remediation efforts.
Support the Client cybersecurity threat intelligence program. Maintain current and new reporting methods of cybersecurity intelligence analysis to peers and leadership teams for purposes of situational awareness and making cyber intelligence actionable.
Automate security threat monitoring to collect and generate tactical intelligence to uncover attacks not detected with traditional signature or rule based methods.
Administers cybersecurity intelligence process to ensure security threat information, system log information, and sources of external intelligence are combined to provide real time response to cyber events.
 
Skills Required:
Experience in IT with experience in the Cybersecurity area
Ability to handle multiple priorities and deal effectively with the client senior management, staff members, and vendors.
Proficient in word processing, spreadsheet, and presentation creation tools
Experience with security related technologies including: Cyber Threat Intelligence Platform (Anomali, ThreatConnect, Recorded Future, Digital Shadows), Vulnerability Management systems (IBM App Scan, Veracode, Whitehat, Burp Suite, Rapid7 Nexpose and other pertinent cybersecurity technologies in this space.
Knowledge of Microsoft Windows, Red Hat Linux, VMware, and SAN storage platforms and network protocols
Experience in one or more scripting languages: SQL, Java, Python, JavaScript, Perl.
Knowledge of NIST 800-53, COBIT, ISO 27001/02
Knowledge of risk assessment methodologies to design and deliver risk assessment engagements.
CISSP, GPEN, OSCP or other relevant security certification is preferred
 

Mudit Ladha
Intellectual Capital Development
Phone: 732-903-5958 Fax: 732-875-0595

Wednesday, April 25, 2018

Security Engineer

Requisition Name: Security Engineer 4
Location:  San Jose, CA 95110
Duration: 12+  Months


Job Description:
Technical investigation and incident response as needed for Security Incidents, including memory and disk forensics Investigate potential threats based on notable events and other alerts based on suspicious activity Identify and evaluate malware-related compromise artifacts Streamline usage of security technologies in a dynamic environment through automation and orchestration platforms Identify, implement, and support solutions to aid in the detection and response of new threats Specify tuning recommendations for security tools based on observed patterns Proactively monitor the threat landscape, and conduct research on emerging security threats, attack types and malware families Develop advanced Splunk ES correlation searches and capabilities

Skills:
Solid understanding of security threats, vulnerabilities, and attacks
Strong analytical skills with the ability to creatively challenge current methods and procedures
Solid proficiency with scripting languages (Python, shell scripting, Powershell, Ruby, Javascript, etc)
Proficiency in Cloud Technologies such as AWS and Azure
Advanced knowledge of security monitoring tools and SIEMS, such as Splunk
Experience with digital forensics and response tools such as Carbon Black, Rekall, log2timeline, The Sleuth Kit (TSK), X-Ways Forensics, Volatility, GRR, etc Experience with malware analysis and reverse engineering
Excellent verbal and written communications skills

Keywords:
Education: BS/MS degree in computer science, computer engineering or similar technical major is preferred



Debra Gouthami
Lead IT Recruiter
ASK Staffing, Inc. | Global Delivery Center
Direct: 415-963-0398
Fax: 678-990-0403

UI/UX Web Developer


Position Title:IT Developer
Position Id:ISD17011
Client:Judicial Council of CA (AOC)
DurationLong term
Work LocationSan Francisco, CA

  1. Minimum Job-Specific Skills/Qualifications Required (in order of relative importance):
  • Equivalent to possession of a bachelor's degree, preferably with major course work in DevOps, system administration, web front- and back-end design and development, and other web technologies.
  • Proven track record in leading enterprise wide web solution designs and development including developing technical roadmaps, preferably for government web products.
  • Proven track record with application architecture for enterprise-wide systems such as multi-tier, distributed and web-based system architecture and development principles, and internet/intranet application delivery mechanisms.
  • Proven track record in leading analysis and developing solution designs for web processes and systems.
  • Proven track record of on-time, on-budget product development with a high degree of user satisfaction and quality.
  • Experienced with agile project management methodologies
  • Experienced with third-party integrations and customizations for seamless multi-system functionality, including content management system development and configuration.
  • Experienced with the principles of full life cycle systems design and development.
  • Experienced with the principles and techniques of web program design, development, testing, and documentation.
  • Experienced with translation of business, information, and technical requirements to provide solutions that meet business needs.
  • Experienced with the principles and techniques of systems implementation including conversion, data reconciliation, user training, and documentation.
  • Experience with preparing data sets and reports in support of more complex analysis.
  • Experienced with documenting functional and technical specifications in the development cycle.
  • Experienced with developing system test plans and test script development.
  • Experienced at establishing and maintaining effective working relationships with those contacted in the course of the work. Knowledge of relational database management systems.
  • Knowledge of object oriented design and programming architectures and design patterns.
  • Knowledge of systems security and data encryption.
  • Knowledge of digital government and digital government strategies
  • Ability to identify and evaluate alternative technical solutions, costs and benefits.
  • Ability to communicate effectively in English, orally and in writing.
  • Ability to build coalitions among the various stakeholders using excellent conflict resolution skills, where needed.
  • Excellent analytical capabilities and the ability to breakdown complex ideas into manageable pieces.
  • Excellent written and verbal communication skills, with both technical and non-technical audiences, including creating and presenting executive summaries to steering committees and other executive level leadership.
  • Proficiency with MS Office applications including Word, Excel, Project, and Visio.
 
  1. Additional Skills/Qualifications Desired:
  • Recent experience within government agencies or public bodies with projects of a similar type.
  • Experience in user research and data analysis
  • Experience in software development, data modeling and other tools, languages, and report generators.
  • Experience in system test plan development and execution from unit test to UAT







Raul Smith
E TalentNetwork
8251 Greensboro Drive, Suite 250
Mclean, Virginia – 22102
Direct: 1-(703-666-9171 Ext 272)
Email: rauls@etalentnetwork.com
Website: http://etalentnetwork.com

Information Security Project Manager

Position: Information Security Project Manager
Location: Newport Beach CA
Type: Full-Time Employment
Salary: Negotiable

The highly skilled information security engineer will be responsible for security architecture, end point security, application security, database security, identity management, and infrastructure security.
This position is responsible for designing and deploying information security technologies to directly support the director’s efforts in securing the company’s information and enforcing directives as mandated by regulations and HCA policy.

1.Develop, manage, and oversee the deployment of multiple information security technologies. The technologies include end point security, application security, database security, infrastructure security, and identity management solutions.
2.Oversee technical security design/review activities for applications, networks, servers, architecture, and databases to ensure secure deployments.
3.Oversee the adoption of information security requirements into the design, implementation, and operations within the System Development Life Cycle (SDLC).
4.Promote acceptance of security technologies within the organization, balancing business goals, security controls, and customer usability. Work with business management to communicate security risk and countermeasures.
5.May lead and manage direct reports, collaborative teams, and associated resources.

Experience in the following:
•Strong knowledge of information security products and implementations, with an emphasis on design in the areas of networks, servers, endpoints, applications, databases, and integration.
•Strong knowledge of Access Controls, Directory Services, infrastructure, and technical standards.
•Strong knowledge of Microsoft Windows and UNIX security principles and best practices.
•Strong knowledge of firewalls, intrusion detection systems, and network architecture.
•Strong knowledge of secure application development and database security.
•Working understanding of the OSI Model, TCP/IP and network security protocols.
•Knowledge of Gramm-Leach-Bliley Act (GLBA), Sarbanes Oxley Act (SOX) and other regulatory requirements.
•Project Management and staff career development.
•Excellent verbal and written communication skills with strong ability to present persuasive ideas to groups at all levels, including executive leadership.

Education and experience:
•Bachelor’s degree, preferably in Information Security, other related area with demonstrable subject matter expertise
•10+ years progressive experience in information security
•CISSP, CISM, CISA, ITIL, or other related information security certification
•Minimum 5 years’ experience in managing people
•Project Management Experience preferred
•Financial Industry Experience preferred


Vikram Singh
Phone #: 281-303-5565 (ALT); 281-402-2507 (Desk) | Fax: 1-832-201-0366 |
Email: Vikram@RConnectLLC.com | Web: http://www.RConnectllc.com

Tuesday, April 24, 2018

Cyber Security Controls Assessor

Title: IT - Cyber Security Controls Assessor - Expert
Location: San Francisco, CA
Duration: 07 Months Contract 
 

Qualifications:

Minimum:
  • B.S. degree in Computer Science, Information Systems or other related field, or equivalent year work experience
  • Minimum of 6 years of experience in IT, critical infrastructure, intelligence, and/or cybersecurity information security
  • Ability to travel up to 10% Desired:
  • Master's Degree in Computer Science or job-related discipline or equivalent experience
  • Certified Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM), Certified in Risk and Information Systems Control (CRISC), Certified Information Systems Auditor (CISA), or equivalent
  • Knowledge of Cybersecurity best practices and standards (e.g. NIST, ISO, etc.)
  • Certified Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM), Certified in Risk and Information Systems Control (CRISC), Certified Information Systems Auditor (CISA), or equivalent
  • Understanding of computer networking concepts and protocols, and network security methodologies
  • Demonstrated problem analysis and decision-making skills
  • Ability to communicate and convey complex IT/OT technical security related concepts to business and technology teams
  • Ability to influence and work with and across all levels within the business
  • Excellent written and verbal communication skills required TOP 3 MGR LOOKING FOR 1)Diverse background in Cybersecurity 2)Strong communication 3)Consulting with project teams on cybersecurity risks

    Responsibilities:
  • The Cybersecurity Risk & Strategy team focuses on identifying risks, helping partners reduce or mitigate risks, developing initiatives to protect CLIENT from cyber-attacks, and engaging with other groups to continually improve CLIENT's security posture.
  • As part of the Risk & Strategy Operational Technology team, you will concentrate on CLIENT efforts related to cyber assets for our Electric, Gas and Power Generation lines of business.
  • In the position you will engage with project teams, and collaborate with other parts of the Cybersecurity group, Information Technology partners, and experts in the lines of business to identify threats, create strategies to better protect operational technology assets, and deploy technologies and processes to put those strategies into action.
  • You will contribute to a rapidly growing team, with extensive leadership support, to strategically manage risk and proactively adapt to evolving threats and business needs.
  • Risk assessment, project development, and technology deployment skills are all important.
 
Deepthi D
Technical Recruiter – Staffing
Intelliswift Software Inc.
39600, Balentine Dr, Suite 200, Newark CA 94560
Email : 
deepthi.d@intelliswift.com  Work : 510-964-3615
Website:-www.intelliswift.com

Friday, April 20, 2018

Cybersecurity Solution Analyst

Position Title: Cybersecurity Solution Analyst
Location: San Francisco, CA, United States
Duration:6 months 

 
Complete job Description:
Job Title:
  • B.S. degree in Computer Science, Information Systems or other related field, or equivalent year work experience
  • Minimum of 6 years of experience in IT, critical infrastructure, intelligence, and/or cybersecurity information security
  • Ability to travel up to 10% Desired:
  • Master's Degree in Computer Science or job-related discipline or equivalent experience
  • Certified Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM), Certified in Risk and Information Systems Control (CRISC), Certified Information Systems Auditor (CISA), or equivalent
  • Knowledge of Cybersecurity best practices and standards (e.g. NIST, ISO, etc.)
  • Understanding of computer networking concepts and protocols, and network security methodologies
  • Demonstrated problem analysis and decision-making skills
  • Ability to communicate and convey complex IT/OT technical security related concepts to business and technology teams
  • Ability to influence and work with and across all levels within the business
  • Excellent written and verbal communication skills required
Responsibilities:
  • Leads technology assessments to understand capabilities of required systems or networks
  • Identifies and recommends cyber strategies for technology development based on stakeholder requirements
  • Drives security reviews, identifies gaps in security architecture and designs and recommends necessary security controls to be integrated within the development lifecycle
  • Develops and recommends security controls, identifies key security objectives to maximize software and system security while minimizing disruption to plans and schedules
  • Leads translation of security controls into technical specifications and guidance to stakeholders to ensure common understanding across the stakeholders and enable adequate implementation
  • Actively recommends engineering solutions in collaboration with Cybersecurity Architects and product owners to remediate inherent cyber security risks
  • Provides peer review and support for organizational deliverables

Nandini Nath
Intelliswift Software Inc.
Email : nandini.nath@intelliswift.com
Work : 510-370-4484
Website:-www.intelliswift.com
39600 Balentine Dr #200, Newark, CA 94560

Wednesday, April 18, 2018

Network Security Engineer

Network Security Engineer 
La –Vista ,NE
6+ Months

Primary Job Responsibilities: 
As a Network Security Engineer, you will be joining a dynamic and dedicated team of engineers well-versed in packet and flow analysis as applied to network-based security and forensics. Position will leverage working knowledge of stateful firewalls, will be comfortable validating, and working with Palo Alto next-gen firewalls and deep packet inspection technology. 
Support of enterprise network security and engineering systems including IDS/IPS, URL/Content filtering and Firewalls. 
Advocate and execute proper change management principles to ensure network availability and reliability for over 35,000 active users worldwide. 
Leverage, interpret, and rely on packet and flow analysis tools to drive troubleshooting, visibility, and root cause analysis of anomalies. 
 
Job Requirements:
Knowledge of TCP/IP, IPv4, Unix/Linux/FreeBSD Experience with a variety of enterprise Networking, Network Security, and data center traffic management devices 
Familiarity with workflow ticketing systems (such as Remedy) is a plus 
Device Monitoring tools such as Nagios, Observium etc.
Networking or Network Security certifications not required, but could be a plus 
Someone who is very detail oriented Someone with strong organizational skills 
Fast learner 
 
Nice to Haves:
Palo Alto Firewalls experience nice to have 
Cisco Firewalls or Checkpoint Firewalls nice to have 
Security Experience is a nice to have 
Ability to present PowerPoints.
 

Yogesh Kapadne  |  Sr Technical Recruiter - Resource Management Group
Intelliswift Software Inc 
39600 Balentine Dr., Suite 200 Newark, CA 94560
www.intelliswift.com   |  Phone: 510-370-4452  | Fax: 510-578-7710       

Tuesday, April 17, 2018

Information Security Consultant

Information Security Consultant
Location: 
Fairfield CA
Contract: W2

Job Description:

Knowledge / hands on experience with security- and related- systems and tools including: encryption, SIEM, IDS/IPS, network monitoring and sniffing, routers/switches, firewalls, proxies, vulnerability and threat management tools, certificate management, MS Azure, MS System Center, VPN, advanced malware detection, URL filtering, dual factor systems, Windows and Unix security 
Relevant information security certifications (e.g. Security+, CISSP, and/or CCNA-Security) highly desirable 
Forensic skills highly desirable 
4 year college degree desirable 
5 years of security engineer related work experience 
Strong communication and organization skills, ability to multi-task, strong attention to details, excellent problem solving and follow-up skills required 
Work independently, make sound decisions 
Remain objective in stressful or potentially charged situations


Vaibhav Gupta
Recruiting Manager- Randstad Centralized Delivery - Woburn
Randstad Technologies
646-576-9840
vaibhav.gupta@randstadusa.com

Systems Engineer

Systems Engineer - Active Secret Clearance
Northridge, CA/91324
12+ Months Contract(High Possible Ext)


Clearance: ACTIVE Secret
Conversion: Very High
**Masters degree pref.**

Education Required:
• BS, Engineering or Computer Science
• MS, Engineering or Computer Science Desired

Required Experience:
• 5-10 years in aerospace/defense industry
• 4 years of relevant experience in the fields of computer technology, PP, AT, or Cybersecurity
• Experience in requirements generation, design, development, integration, and testing of systems for military applications
• Experience with weapon systems and real-time operating systems
• Experience leading and advising DoD customers on PP issues
• Experience with program protection concepts, anti-tamper, cryptography, and security solutions
• Familiarity with documentation and tools such as: DoD 8500 series, DoD 5200 series, NIST Special Publications (800-53, 800-37, etc.)
• Active DoD Secret Security clearance with ability to obtain Top Secret clearance
• Project management experience
o Excellent oral presentation skills
o Team player/builder
o Excellent time management skills
o Problem solver

Experience and Skills:
• DoD Secret clearance with current SSBI within last 5 years
• Cyber Certifications in accordance with DoDD 8570/DoDD 8140 such as CISSP, GSLC, CEH
• Aircraft/store integration experience


Srikanth S
687 Lee Road, Suite 250
Rochester NY 14606
(845) 473-1137 Ext.8078
srikanth@iic.com

Friday, April 13, 2018

Application Developer

Long Term Contract
Software Application Developer/Analyst – II

No Corp. to Corp. or 3rd party
Onsite position, must be available for an onsite interview if requested.

Description:

Candidate technical skills should include: 

5+ years of in-depth experience in software developing using Shell Scripts, PLSQL 
5+ years of in-depth experience with Oracle with emphasis in SQL proficiency 
5+ years of in-depth experience with UNIX/LINUX 
3+ years of in-depth experience with Data Conversion and Data Analysis 
5+ years of in-depth experience with billing systems 
Prior Experience in telecom domain is desired 
Strong inter-personal skills 

Exceptional problem solving skills
 

Christina Partap
Recruiter
Axelon Services Corporation
44 Wall Street 18th Floor

New York, NY 10005
Phone: (212) 306-0128
Fax  : (212) 306-0191
christina.partap@axelon.com

Security Analyst

Title: Jr. Security Analyst 
Location:  Monterey CA
 
 Work on problems of moderate scope where analysis of situations or data requires a review of a variety of factors
·         Exercises judgment within defined procedures and practices to determine appropriate action
·         Builds productive internal/external working relationships
·         Creative, innovative responsibilities requiring advanced decision-making skills
·         Developing professional expertise, applies company policies and procedures to resolve a variety of issues
·         Fully proficient and able to perform all responsibilities associated with the position
·         Grasps and applies new information quickly and handles more complex assignments
·         Alert Research/Investigations User Communication
·         Network Monitoring & Reporting Coordination & Scheduling
·         Network Scanning Communication with Management
·         Risk Assessments Spear-phishing Identification
 
-          Troubleshoot LANDesk tickets
-          User Interaction and support
-          ACAS/NESSUS Scanning
-          Provide CS Tier 1 support to users
-          Proofpoint Monitoring
-          Alert Research Response
-          Tool Monitoring + Checklist
-          Support Antivirus, Phishing, malware, Trojan events
-          SOC support duties
 

Jerry Smith
E TalentNetwork
http://etalentnetwork.com
8251 Greensboro Drive, Suite 250
Mclean , Virginia - 22102
jerrys@etalentnetwork.com
844-473-8568 Ext.262

Thursday, April 12, 2018

Information Security Analyst

Job Title: Information Security Analyst 
Company: BLACKSTONE TECHNOLOGY GROUP 

Primary Function 

Information Security Fraud Analyst will actively engage in protecting Bank clients and information from loss associated with malicious activity. The Analyst will recommend, implement, and continually improve a wide range of fraud detection systems; monitor, collect and analyze threat intelligence; and collaborate in incident response with other information security, information technology and business operational functions. The person in this position will also be responsible for helping protect information stored on computers and networks, and may also configure and maintain security technologies. This role is under the supervision of Lead Information Security Analyst and guidance from the Director of Information Security. 

Role and Responsibilities 

2-4+ years of Information Security experience, with two or more years in incident response, threat intelligence and fraud detection. A combination of education and experience may meet requirements. 
Experience in Information Technology and Information Security audits, review SOC reports, vendor reviews and 
Excellent problem solving and troubleshooting skills using root cause analysis techniques. 
Extensive knowledge of financial fraud, social engineering methods and information security practices and procedures 
Knowledge of malware, particularly financial malware experience preferred. 
Track and report ATM, ACH and Wire Fraud activities 
Ability to evaluate information security controls and identification of potential risk. 
Must be detailed oriented and have good analytical, documentation, time management, communication and interpersonal skills. 
Must have the ability to communicate complicated concepts in writing. 
As a part of day to day incident response requirements, you be able to respond, review, research, security alerts in a timely manner. 
Ability to identify risks to bank from policy violation, internal or external attacks or attempts to infiltrate company email, data and web-based systems 
Plan, coordinate, perform, and report on information security compliance assessments and related services 
Develop and maintain internal client relationships 
Produce security risk advisories based on newly identified threats and risk assessment 
The ability to work independently in a 24/7 complex, sophisticated technical environment 




Preferred Skills 

Provide cradle to grave lifecycle management of cyber security toolsets consumed by peer functions within the deployment, administration, maintenance, configuration change management, monitoring, troubleshooting, capacity estimation, status and service metrics reporting, decommission and other service assurance activities. 
Provide incident response support as a toolset specific SME for security sevents including but not limited to intrusion detection, malware infections, denial of service attacks, privileged account misused and network breaches. 
Collaborate with IT and other Business Unit management and SMEs. 
Experience with SIEM Technologies, log harvesting/routing/management tools, Security Analytics Platforms, Network Recording and forensic offerings. 
Additional cyber security toolsets, including fraud monitoring, data leakage prevention, and privileged access monitoring is a plus. 
Experienced with PCI-DSS, HIPAA, Bank Secrecy Act, FDIC and other regulatory frameworks is highly desired. 
Experienced working with various Securing appliances 
A sociable, likeable “people person” who gets along well with colleagues 
A capable professional communicator, able to research, prepare and deliver high quality, clearly-written awareness/training materials without grammatical or spelling errors 
Proactive and self-motivated, forward thinking, someone who is willing to take the lead on security awareness and fraud. 
Technical understanding of vulnerabilities and how attackers can exploit vulnerabilities to compromise systems 
Ability to perform and document internal and external vulnerability assessments 
Familiarity with creating lab environments and automating test procedures 
Ability to resolve network and system security issues using computer host analysis, forensics, and reverse engineering 
Ability to define and maintain standards and product selection methodology, review and approve solution architecture and design from a security perspective 
Familiarity with the following activities: 
Security tools implementation 
Security tools administration 
Intrusion detection alert evaluation and response 
Vulnerability scanning result analysis and reporting 
Network firewall monitoring 
Application firewall, antivirus monitoring 
Security event management response and reporting 
Encryption status monitoring 
Security data and alert analysis 
Network security audit 
Ability to manage technologies, including OS patches, system hardening, and application configuration is a plus 
Working knowledge of security technologies such as DLP, SIEM, IDS/IPS, Web filters, two factor authentication, web application firewalls, Active Directory