Tuesday, July 31, 2018

Network Engineer

VMWare/Network Engineer
DIRECT CLIENT: Network Engineer Job
CLIENTUPDATE: Given certifications are mandatory - CISSP and/or any GIACcertifications.
Location:San Jose, CA
StartDate:  ASAP
Duration:  06-12 Months+ extensions
Priority:Very High
Interviews:Telephonic and/or skype
Jobtype: Contract
Directsubmission to implementation partner with no hidden layers.
1.            Must be able to workin a collaborative team environment. Ability to multi-task and workcooperatively with a diverse range of people. Must have strong interpersonalskills.
2.            Must be proficient innetwork architecture and design, network security, network monitoring.
3.            Ability to joinincident response bridges and provide in-depth analysis and solutions in ashort amount of time.
4.            Knowledge andexperience in the enterprise grade LAN/WAN architecture and infrastructure,design, development, monitoring, implementation, administration, and managementof network(s).
5.            Skills in strategicthinking, research, and planning to include: creativity/innovation,designtheory, advanced systems theory, risk management, disaster recovery &business continuity, integrating solutions, leveraging strategic resources,strategic partnering, conflict management, advanced change management.
6.            Strategic technicalskills to include, developing discipline specific expertise in others,enterprise-level policies, and advanced technology research and design skills.
7.            Industry relatedskills to include, in-depth knowledge of the global IT industry and trends,advanced knowledge of IT security regulations, and advanced knowledge ofcurrent and emerging IT industry issues and trends.
1.            Degree in informationtechnology field.
2.            CISSP, any GIACcertification.
1.            Knowledge wouldpreferably also include VMWare’s NSX software defined networking solution,systems engineering, applications and systems software.
2.            Scripting orprogramming capabilities in Python or any other languages would be preferred.
3.            Working knowledge ofinterior and exterior routing and switching protocols, domain name system(DNS), dynamic host configuration protocol (DHCP), proxy functions, securityprotocols, time protocols, tag and label switching, real-time protocols forvoice and/or wide area network (WAN) communication protocols. Knowledge ofvirtualization and storage area network (SAN) solutions in network, security,and computing. Knowledge of network system analysis and design techniques forvoice (wireless and wired), video, and data.
1.            Represent the Divisionof IT during product engineering, field, customer and analyst meetings,workshops or training sessions. Serves on industry, system-wide committees andindustry reference groups. Service as a technical resource for other technicalteams or organizations. Serve on enterprise level committees to developtechnical standards and direction. Serve a chair or senior member of aninformation resource team/s responsible for setting technical standards andstrategic direction.
2.            Ensures compliancewith applicable federal and state regulations and laws, System policies,regulations and rules.

3.            Lead and coordinate short and long-term analysis on network and network security systems and services. Coordinate the development of project plans, problem resolutions and service road maps and make recommendations. Establish quantity and quality standards, procedures and guidelines for design, development, testing,implementation and maintenance of enterprise solutions. Contribute to the planning of the overall organizational IT strategy. Recommend information architecture standards and methodologies.

Send responses tokevin@sancrosoftusa.com

Friday, July 27, 2018

Information Security Risk Analyst

Position Details:
Client:             Facebook
Job Title:         Information Security Risk Analyst
Job Location:  Menlo Park, CA
Job Duration:  6 months (Extension or Conversion possible)

Job Requirement:
  • Independently perform risk based security reviews of first and third parties at Facebook including internal systems, cloud providers, *aaS providers, outsourced vendors, etc.
  • Articulate security findings to internal and external stakeholders including third-party vendors.
  • Provide defensible Recommendations on technical, physical and administrative control implementations based on assessment findings while balancing the cost versus benefits.
  • Negotiate acceptance of remediation plans and timelines based on criticality of each finding.
  • Participate in the development and oversight of corrective actions relating to security issues.
  • Compile and report out security risk and operational metrics.
  • Participate in cross-functional, team, and status review meetings.
  • Recommend process improvement and strategic initiatives as related to security assessment.

  • Must have prior experience with first or third-party security assessment.
  • In-depth knowledge of security assessment lifecycle.
  • Knowledge of evaluating systems architectural designs, data-flow diagrams and technical security implementations, particularly for systems hosted on the cloud platforms, for security deficiencies.
  • Ability to identify and assess security risks and recommend mitigating controls.
  • Knowledge of security technologies, devices and countermeasures as well as the the threats they are designed to counter.
  • Good understanding of the various hacking techniques and the defensive countermeasures.
  • Good understanding of the threat landscape as related to vendors.
  • Good understanding of the cloud technology (IaaS, PaaS, SaaS) and the current IT trends in the industry.
  • Experience with developing security reporting and recommendations that are meaningful, defensible and actionable for a variety of audiences.
  • Knowledge and understanding of security controls across all security domains such as access management, encryptions, vulnerability management, authentication and authorization, network security (IPS/IDS/DLP/Gen-2 firewalls/2FA, etc.), physical security, etc.

Bachelor's Degree and/or advanced degree with a concentration in one of the followings: Computer Science, Management Information Systems, or Cyber Security

Ritvik Chaturvedi
Technical Recruiter
T: (408) 601-2182   

Cyber Security Threat Analyst

Job Title: Senior IT- Cyber Security Threat Analyst/Specialist : 18-01605
Location: Concord, CA
Tenure: 7+ Months
Tax Term: W2 Only

  • Be cross functional in the Cybersecurity space, specializing on software/supply chain/vendor vulnerabilities and exploitability; as well as the identification of IOCs and TTPs for introduction into a Threat Intelligence Platform for pro-active blocking and monitoring.
  • Ability to analyze network traffic using a SIEM.
  • Using intelligence tools, apply attribution to IOCs or actor behaviors.
  • Utilize security tools and resources to determine if Client’s systems are vulnerable.
  • Produce reports or provide output that can be leveraged by other team members or systems for a Security Software Review Board or Intelligence analysis and actor attribution.
  • Performs proficient forensic analysis using security tools and monitoring systems to Client the source of anomalous security events.
Qualifications :
  • Associate Degree or higher in Cyber-security, Networks and Security, Network Development, Computer Science, or related discipline; or equivalent experience Technical Certification(s) from: SANS, Cybrary, ISC2, CompTIA or other relevant certification bodies.
  • Experience in Cyber-security or relevant IT related positions: 4yrs or more.

Moiz Saify| Technical Recruiter | o. 408.816.2442 | moiz.saify@akraya.com | Find me on LinkedIn

Akraya, Inc. | 2901 Tasman Drive, Suite 106 | Santa Clara CA 95054

Thursday, July 26, 2018

Project Manager / Business Analyst

Job Code : RCI-VZW-13753
Job Title: Project Manager / Business Analyst
Location: Westlake, TX 76262
Duration: 9 Months
Job Description: 
Acts as project manager/team leader in support of large, complex, and multi functional computerized system(s); assists in preparation of the computer services budget; monitors assigned budget(s) for designated data processing/applications systems as assigned
  • Oversees, coordinates, and participates in organizational, operational, and procedural analyses to determine information input, work processes, and desired output for potential and/or up dated computerization for a large number of users in support of a multi departmental or county wide applications;
  • Organize and lead small groups to resolve complex business problems - Work with business customers to understand requirements and develop specifications for large-sized projects - Identifies data sources, constructs data decomposition diagrams, provides data flow diagrams and documents the process
  • Ability to handle multiple assignments Superior written and oral communication skills Able to matrix manage, have strong project work and project planning experience.
Anish Patel
Rangam Consultants Inc.
Somerset, NJ 08873
Phone: 908-704-8843 - Ext: 208
Fax: 908-253-6550
Email: Anish.Patel@rangam.com

Wednesday, July 25, 2018

Application Security Engineer

6+ month contract opportunity for an Application Security Engineer with a Global Financial Firm in Westlake, TX

• Web Application Security – OWASP Top 10 for example
• Be prepared to meet with and work with the business
• Responsible for running applications through Veracode software while in the software development lifecycle to prevent any security defects previous to production.
• Maintain and create secure development practices and programs for Client's application development teams
• Find defects to improve quality by mitigating flaws and positive / negative testing
• Work closely with Secure Software Development Lifecycle team
• Act as an ambassador for the secure development lifecycle within Client
• SAST tool experience
• Web development and web technologies like HTTP, HTML, CSS, and JSPs.
• Web Application Architecture (Client/Server model and Model View Controller design pattern, familiar with Tomcat etc.)

• Bachelor's degree in Computer Science, related discipline, or equivalent experience
• 4-7+ years of Information Security experience
• 2+ years of Application Security experience required
• Experience with Veracode or other relevant technologies (Client Fortify or Checkmarx) is required
• Security Certifications highly preferred (Tia Security+, CISM, CEH)

• Understanding of the basic concepts of programming (object-oriented, functional patterns, etc.)
• Familiarity with the OWASP Top 10
• Proficient at the secure software development lifecycle and DevSecOps
• Intermediate to expert knowledge of HTML and JavaScript
• Understanding of SAST concepts
• Development experience is only a plus (mostly Java, C#.NET, PHP, .Net, C/C++, Python, Ruby, SQL, etc.)

• Effective communication with team members and customers
• Detail oriented problem solving
• Passion for the advancement of web security
• Demonstrate good customer service, written and oral communication
• Quickly learn new languages, frameworks, and security controls through self-study
• Intermediate to expert knowledge of one or more of the following languages: Java, C#.NET, PHP, .Net, C/C++, Python, Ruby, SQL, etc.

Chris Liendo
Axelon Services Corporation
44 Wall Street 18th Floor
New York, NY 10005
(212) 488-5344

Sr. Security Analyst

Position: Sr. Security Analyst
Location: Pleasanton, CA
Duration: 6+ Months
Job ID: CR107
Job Description
The tasks for the Security Consultant include, but are not limited to, the following:
·         Act as a Lead Consultant/Subject Matter Expert/domain champion
·         Work on development of Information Security plan (ISP) and performing gap analyses
·         Assist in updating/developing ISP, policies, training materials, website, procedures, controls, etc.
·         Assist with audit remediation validation for compliance to security policies/standards
·         Assist in the evaluation of security risk assessments and gap analysis
·         Assist in updating/developing policies, training materials, website, procedures, controls, etc.
·         Assist in creating policy compliance procedures including compliance measurement reports/dashboard
·         Assist with audit remediation validation for compliance to security policies/standards
·         Assist with the implementation of the various security tools
·         Attend meetings/Represent Enterprise Security as a Senior Lead for all security matters
·         Act as Lead/Co-Lead/Backup on assigned Enterprise Security projects
Technical knowledge and skills:
·         Hardware: network switches, routers, load balancers, servers, storage systems
·         Operating Systems: UNIX, Linux, Windows
·         Network: LAN, WAN, Internet, Proxy/Filtering, Firewall, VPN, DMZ
·         Network Protocols such as TCP/IP, SNMP, SMTP, NTP, DNS, LDAP,  NFS, Samba, etc
·         Active Directory
·         Vulnerability Assessments
·         Secure Software Development Lifecycle
·         Penetration Testing
·         Security
·         Mainframe DB2
·         Oracle databases
·         Best Practices Standards: ISO 27001/27002, PCI: DSS v3; GLBA; HIPPA/HITECH; NIST 800-53; California State Administrative Manual.       
·         Excellent communication, technical writing, and customer service skills
·         Critical thinking skills
·         Must Possess Current CISA and CISSP Certifications
Professional skills: 
The Consultant resource(s) shall possess most of the following skills:
·         Strong analytical and critical thinking skills with the ability to analyze information and identify and formulate solutions to problems.
·         Provide more in-depth analysis with a high-level view of goals and end deliverables.
·         Remain proactive and complete work within a reasonable time frame under the supervision of a manager or team lead.
·         Plan and manage all aspects of the support function.
·         Extensive knowledge of and proven experience with Information Technology systems, and methods of developing, testing and moving solutions to implementation.
·         Strong knowledge in project management practices and ability to document processes and procedures as needed.
·         Work collaboratively with other support team members and independently on assigned tasks and deliverables with minimum supervision
·         Communicate effectively with users at all levels, from analyst up to senior management, verbally and in writing.
·         Self-motivated, working closely and actively communicating with team members to accomplish time critical tasks and deliverables
·         Ask questions and share information gained with other support team members, recording and documenting this knowledge
·         Elicit and gather user requirements and/or problem description information, and record this information accurately
·         Listen carefully and act upon user requirements
·         Convey and explain complex problems and solutions in an understandable language to both technical and non-technical persons
·         Present technical solutions to management and decision makers
·         Follow the lead of others on assigned projects as well as take the lead when deemed appropriate
·         Think creatively and critically, analyzing complex problems, weighing multiple solutions, and carefully selecting solutions appropriate to the business needs, project scope, and available resources
·         Take responsibility for the integrity of the solution
·         5-15+ years’ experience in information security, audit, and security/audit compliance.
·         CISSP required.  Other highly desirable security certifications may be substituted for CISSP (for e.g., CISM, CISA, etc.) 
·         Extensive experiencing conducting ISO 27k gap assessment preferred but not required 
·         Should have extensive experience in leading it security/compliance/audit projects.

48531 Warm Springs Blvd, Suite 405A, Fremont, CA 94539.
PH: 510-709-3806
Email: satyag@caspex.com
Web: www.caspex.com

Privacy Analyst

Privacy Analyst 
San Jose, CA     
12 months + 
• Job Responsibilities:
o Monitor Global Privacy mailbox and address stakeholder inquiries
o Document policies and procedures
o Develop training and socialization material for stakeholders
o Develop and manage tracking and reporting
o Coordinate and lead meetings with key stakeholders and represent the Global Privacy Team and Program
o Advise on privacy risks
o Build enhanced privacy capabilities and integrate into organizational processes and functions
o Educate stakeholders on privacy program and requirements
o Identify and drive enhancements to program initiatives
• Basic Qualifications:
o 3-5 years experience, consulting or transformational program change is desirable
o Strong writing and communication skills
o Technological and compliance aptitude
o Ability to analyze and respond to information received from stakeholders
o Ability to operate in a detail-oriented and organized fashion to ensure consistent and timely execution
o Experience in privacy and data protection

Yogesh Kapadne  |  Sr Technical Recruiter - Resource Management Group
Intelliswift Software Inc 
39600 Balentine Dr., Suite 200 Newark, CA 94560
www.intelliswift.com   |  Phone: 510-370-4452  | Fax: 510-578-7710       

Tuesday, July 24, 2018

Air Traffic Controller

Image may contain: text

Information Security Engineer

The Information Security Engineer’s primary function is to manage and maintain client security solutions, through the processing and management of incident and request tickets, as they are assigned. The Security Engineer is expected to contribute to internal documentation and adherence with SLA targets and requirements. The role includes hands on troubleshooting, interfacing with clients and associates as needed to resolve complex cases, maintaining and patching contracted managed security platforms. Security Engineers are expected to participate in, and contribute to planning and implementation of strategic and operational projects in efforts to achieve overall client and company goals. Security Engineers are expected to be able to troubleshoot complex problems with little oversight, take ownership and work independently as needed to resolve customer issues.

 3-5 years of general IT and Networking Experienc
• 1-3 years of Security Engineering Experience, preferably within a MSS or multi-tenant environment 
• Proven ability and past experience performing security analysis for information technology is required 
• Experience with a variety of information and network security tools (Microsoft AD/OMS, NetSkope CASB, TrendMicro Deep Security, SailPoint IdentityNow or similar technologies) 
• Self-starter able to complete objectives with little supervision 
• Experience in Security Analysis preferred 
• Excellent writing and communications skills 
• Experience in the administration of security technologies, SIEM, log analysis and forensics. 
• Familiarization with defense-in-depth concepts 
• Must be Green Card or US Citizen 
**Security certifications are a plus**

If you are interested, qualified and available (or know of someone who is) please send an updated resume and competitive hourly rate requirements to miranda.krayca@comcentric.com

Miranda Krayca
Comcentric Inc.

Monday, July 23, 2018

Threat Intel Analyst

Title : Threat Intel Analyst
Location:  San Jose, CA
Duration: 12 months

·         Compile cyber threat data gathered through independent research and analysis along with Security Operations Center activity, and look at emerging technology, techniques and adversarial capabilities and tactics.
·         Identify credible, new intelligence and subject matter resources relative to current and emerging threats.
·         Understand and develop threat actor profiles, the typical indicators associated with those profiles, and be able to synthesize the two to develop innovative techniques to detect threat actor activity.
·         Consistent delivery of successful Threat Intelligence Feedback Loop to inform tools and process
·         Support intelligence metric definition and reporting
·         Leverage relationships with various intelligence organizations to gain and share intelligence data.
·         Advise on countermeasures and defensive techniques based on intelligence gathered.
·         Build custom tools and scripts designed to generate threat information for subsequent analysis; this includes but is not limited to data mining, web crawling, log file analysis, click flow analysis, etc.
·         Perform threat hunting based on emerging IOCs or Vulnerabilities based on analysis of network or host activity in intrusions by advanced attackers or open source intelligence
[On-site in San Jose, CA or Remote]
Job Qualifications:
·         2+ years’ experience with cyber intelligence monitoring, analysis, and/or indicator lifecycle management
·         Solid understanding of cyber intelligence support activities provided to a security operation center or similar capability.
Desired Qualifications:
·         Self-motivated individual who can work remotely and keep up with a dynamic, fast-paced environment meeting deliverable and operational requirements
·         1+ years supporting a Security Operation Center as an analyst or Incident Responder
·         Hands-on experience in countermeasure implementation through creation of detection rules.
·         Relationships in security communities that facilitate indicator sharing.
·         Familiarity with link-analysis methods and software (Maltego) Ability to quickly develop effective solutions to unique problems using a combination of existing tools and custom code/scripts.
·         Bachelor's Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.
·         Experience in Cyber Intelligence concepts and implementation, and cyber intrusion kill chain concepts and implementation.
Knowledge in:
SIEM (Splunk ES)
Threat Client Platforms
Orchestration Platforms
Malware Analysis
Ability to program and familiarity with Python.

English Read Write Speak

Skills: Required
·         security orchestration
·         SPLUNK
·         Maltego
·         DATA MINING
·         INTRUSION
·         LOG FILE
·         PYTHON
·         MALWARE
·         OPERATIONS
·         SIEM

Oshin Rao
Technical Recruiter,
Intelliswift Software, Inc.
39610 Balentine Dr., Newark, CA 94560

Thursday, July 19, 2018

Customer Svc Specialist

Job Title: Customer Svc Specialist
Location: South San Francisco,CA 
Duration: 05 Months

Job description:
  • Provide outstanding customer service to all internal and external customers, partners and other stakeholders
  • Works with Lucentis Direct Supervisor and other team members to review/learn of business strategies, goals, as well as departmental goals and performance metrics relevant to his/her responsibilities
  • Acts as the first-line of contact for external channel customers or other related external parties, assisting with all product order and related requests
  • Provides full-time telephone coverage, customer call handling. Receives and manages high-volume telephone calls/inquiries as well as departmental faxes or other communication methods
  • Validates state licenses for all customers to ensure PDMA (Prescription Drug Marketing Act) compliance, creates, updates and issues licenses as appropriate
  • Processes all external customer product orders, entering relevant data into departmental/company systems-processing orders for both Lucentis Direct as well as The Customer Service Portfolio which may include Tamiflu order processing during flu season. Assists with Customer Service Portfolio Lytics spoilage processing as needed
  • Manages Genentech’s carriers to ensure shipments are delivered on-time and escalates any concerns/issues to Transportation as needed
  • Processes returns and invoice adjustments for various customer segments in addition to creating and issuing RA’s (Return Authorizations) and fulfilling damaged Lucentis replacement order requests
  • Decision Making - Thinks through problems clearly and logically, is decisive
  • Technical and Business Expertise - Applies emerging knowledge and trends, builds strong relationships, contributes to expertise within and beyond assigned area
  • Communication - Listens well, expresses ideas fluently and logically, is open to input and can be depended on for truthfulness
  • Teamwork and Collaboration – Creates an atmosphere of openness and trust, collaborates, offers support and encouragement
  • Achieving Results – Is goal directed and persistent, is accountable for meeting commitments, recognizes the contributions of peers
  • Qualifications:
  • The following qualifications, experience and criteria unless otherwise stated as “preferred” or “a plus” are required:
  • 2 or more years related work experience, i.e., customer service, administration-preferably gained within the pharmaceutical, biotechnology or related industry
  • Must demonstrate knowledge of data entry and good basic computer skills, e.g., proficiency with Microsoft Word, PowerPoint, Access, etc.
  • Previous database/computer systems experience, particularly in a high-volume, customer service/call center environment is strongly preferred

Gali Anthony Pramod
eTeam Inc
(732) 318-3805 Ext.461
1001 Durham Avenue, Suite 201,South Plainfield, NJ 07080
South Plainfield, NJ, 07080