Friday, August 24, 2018

Security Specialist

Title: Security Specialist
Duration: 12+ Months
Location: Mountain View CA
Responsibilities
● MS in Computer Science or equivalent practical experience.
● Experience with Java, Python, SQL
● Strong analytical and investigative skills
● Preferred: Experience in data or system security-related projects, such as information protection,
anti-abuse, fraud prevention or spam detection


Duba Koteswari
Sr. Technical Recruiter
1001 Durham Avenue South Plainfield, NJ 07080-2300
Board: 732-318-3770 Ext. 161

Thursday, August 23, 2018

Security Analyst

Job Title: Security Analyst
Location: PALO ALTO CA
Duration: 12 Months 

Looking someone who has only 3 years of experience. 

Description

  • As a Security analyst, you will be tasked with working on workflows that focus on reviewing apps that pose security risks to users.
  • You are a detail oriented and communication focused individual that is comfortable speaking and writing emails to multiple cross functional teams.
  • Managing multiple communication channels and responsibilities is just another bonus to you. Experience with malware and app development is preferred.
Key Responsibilities
  • Cross-team collaboration and communication to meet aggressive review deadlines across the security queue, various dashboards and any security incidents/projects.
  • Leverage expertise to thoroughly review at app and developer levels and relaying pertinent knowledge to the Android Security and Trust & Safety teams
  • Identify specialized violation types via multiple tools and collaborate with internal stakeholders to keep the store malware free
  • Escalation focused workflows from various stakeholders with a client focused mindset
  • Ability to identify gaps within workflows
  • and processes in addition to providing input to relevant stakeholders
  • Recognize recurring spam trends from malicious
  • developers that attempt to hide policy violating content

Skills and Experience

  • Preferred Bachelor’s Degree any field
  • Excellent verbal and written communication skills
  • Bias toward action under ambiguity. Delivery and detail oriented
  • Ability to operate in areas that are not clearly defined within policy
  • Ability to prioritize and multi-task to meet multiple, recurring workflow requirements
  • Solid understanding of customer support best practices
  • Sense of responsibility, initiative and high quality work standards
  • Proactive, flexible individual that is capable of working in a rapidly changing environment
  • Willingness to accept feedback and quickly adapt
  • Willingness to work on holidays preferred
  • Thorough knowledge of existing policies and workflows preferred
  • Project and SLA delivery experience preferred    

Paritosh Dabral  
eTeam Inc – “ACCELERATED HIRES "
1001 Durham Avenue,Suite# 201
South Plainfield, NJ 07080-2300
T: 732-318-3788
F: 908-757-0800
www.eteaminc.com
pdabral@eteaminc.com
https://www.linkedin.com/in/paaritosh-dabral-78704397/

Friday, August 17, 2018

Security Analyst

Title : Security Analyst
Location: Mountain View CA
Duration: Long term (12 Months, Possible Extensions)
 
Top Responsibilities:
  • Identifying mobile threats and classifying them
  • Drive resolution to incidents
Required Skills:
  • BA/BS degree in an engineering field or equivalent practical experience
  • 3 years of relevant work experience, for example, in security operations, abuse detection, incident management, reverse engineering or security analysis and testing
Desirable Skills:
  • Experience with Android (OS and apps)
  • Experience with Java
  • Experience with the analysis of, and response to malicious software

Subhadeep Dey || Intelliswift Software Inc.
Email: 
subhadeep.dey@intelliswift.com
Work: 510-370-4555
Website:-www.intelliswift.com
Linkedin: www.linkedin.com/in/subhadeep-dey-b757a9117/

ArcSight Administrator

ArcSight Administrator

6 Month Contract-to-Hire

Seaside, CA


Job Description:

Architect, Implement, Administer, Maintain, Configure, and Optimize ArcSight products to monitor, detect, and respond to network threats and anomaly in unclassified and classified systems.

Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.

1. Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.

2. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.

3. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.

4. Evaluate firewall change requests and assess organizational risk.

5. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.

6. Assists with implementation of counter-measures or mitigating controls.

7. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.

8. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.

9. Prepares incident reports of analysis methodology and results.

10. Provides guidance and work leadership to less-experienced technical staff members, and may have supervisory responsibilities.

11. May serve as a technical team or task leader.

12. Maintains current knowledge of relevant technology as assigned.

13. Participates in special projects as required.


Education:

Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.

Qualifications:

-8-10 years of related experience in data security administration.

-Proficient with ArcSight ESM, Logger, ArcMC, and Connectors Experience with DoD Risk Management Framework (RMF) Familiarity with and experience with Linux and Microsoft servers

-Preferred experience with IDS/IPS, HBSS, and ACAS

Unique/Additional Requirements:

Must possess a Secret-level security clearance

Up to 10% travel required

CISSP required at contract start


Desired Certifications:

CEH, GIAC


Valeria de la Garza | Technical Recruiter | Apex Systems
4630 N Loop 1604 W, Suite 217 San Antonio, TX 78249
Office: 210-239-0282 | Fax: 210-544-5050

Thursday, August 16, 2018

Security Architect

Security Architect 
Location: Plano, TX
Duration: 12+ Months
 
POSITION SUMMARY –
  • The Information Security Project Consultant (SPC) is responsible for providing security guidance to project teams responsible for delivering business solutions.
  • The InfoSec Consultant will provide security guidance, identify and prioritize security-related requirements, promote secure-by-default designs and facilitate delivery of information security services.
  • The Security Project Consultant is measured on their ability to efficiently analyze system architectures to develop appropriate requirements which enforce Our Client policies and standards.
  • Their ability to manage multiple simultaneous fast-paced projects is critical.
  • They will also be expected to perform risk assessments of information systems and infrastructure, develop appropriate risk treatment and mitigation options, and effectively articulate findings and recommendations to IT project teams and management.
  • Excellent communication and interpersonal skills are essential and will be measured critically in all performance measurements.
  • Experience reviewing vendor contracts and ensuring contracts meet the Our Client information Security requirements is a plus.
  • The InfoSec Consultant will be expected to work on multiple projects and tasks concurrently.
 
List the position Requirements:
  • Minimum 5 years previous experience as a Security Analyst, Security Architect or equivalent.
  • Experience as an information Security consultant/Architect in Banking and Financial services.
  • Familiarity with standard network security technology solutions: e.g. firewall, router, VPN, IDS
  • Additional familiarity with the use of standard security technology solutions and processes such as: access control, user provisioning, directory, vulnerability management, anti-virus, single sign on, auditing, encryption
  • Understanding of FFIEC, GLBA and SOX and their applicability to technologies and applications.
  • Excellent organization skills
  • Excellent written and verbal communication skills
  • CISSP certification
  • Needs to be Senior level and able to manage projects on their own with strong knowledge of Security and Technology Architecture
  • High level of personal integrity, and the ability to professionally handle confidential matters and exude the appropriate level of judgment and maturity
 
Must Haves:
Good interpersonal skills, Self-Starter, CISSP or other security certifications, Personal integrity, Prior experience (at least 5 years) with security tools and technologies.
Preferred/ Nice-to-haves: 
Experience in financial services
 
 

Sravan K C,
KAYGEN  
15420 Laguna Canyon Road, Suite 270, Irvine, CA 92618
O: (949) 203 5100 ext 116 |M: (949) 407 8040 | F: (949) 861 6500
sravan.c@kaygen.com I URL: www.kaygen.com | www.linkedin.com/in/sravan-kc

Wednesday, August 15, 2018

Social Media

Job Title: Social Media // Content Review Agent
Location: Mountain View - CA 
Duration:  12+ Months
 
DESCRIPTION:
5 Fri-Tues/2:30-11pm
2 Sat-Wed/2:30-11pm
2 Thur-Mon/6am-2:30pm
1 Tues-Sat/6am-2:30pm
4 Wed-Sun/6am-2:30pm
3 Thurs-Mon/2:30pm-11:00pm
4 Mon-Fri/9am-5:30pm
Review user generated content in a single review tool and classify content according to policy. The work requires junior resources to perform basic workflow activities related to content review work (review content, create tasks, follow-up on open tickets, etc). Agents will be exposed to potentially disturbing content (Abuse, violence, gore, sexual) so candidates will need a level of resilience and maturity. The work is back-office, but they will be located on client premises and requires a distinct level of professionalism.
Basic Job Functions
Review posts/content and classify according to policy
Provide insights and trends on content reviewed
Provide feedback and suggestions on review process and workflows
Provide suggestions for product innovation
General data entry related tasks
Required Credentials and Experience
Familiar with and user of social media products
Excellent work pacing (time management) skills, able to work independently
Attention to detail is essential to ensure the quality of work execution
Able to work in multiple tools/web browser windows at one time
Motivated, takes initiative, high energy
Ability to quickly utilize hot cues and key command shortcuts a plus
Familiar with Microsoft Office (mainly Excel) for updating progress
Interpersonal Skills Self-starter, can easily adapt to change (new content, changing policies)
Good problem solving and troubleshooting skills
Ability to work and collaborate in a team environment

Keshav Kumar
eTeam Inc
(732) 983-5567 
1001 Durham Avenue
South Plainfield, NJ, 07080

Security Analyst

Work Location :  Rochester, NY
Start Date         :  08/23
Duration            :  6-12 months

Job Details :

Significant experience in Information Technology, which includes substantial experience in a risk management specialism.
 Understands and uses appropriate methods and tools and applications.
 Demonstrates analytical and systematic approach to problem solving.
 Takes initiative in identifying and negotiating appropriate development opportunities.
 Contributes fully to the work of teams.
 Can plan, schedule and monitor own work. Is able to absorb and apply new technical information.
Minimum  Is able to work to required standards and to understand and use the appropriate methods, tools and applications.
Minimum  Appreciates wider field of information systems, how own role relates to other roles and to the business.
Has a basic business knowledge and an understanding of current and emerging information and communications technologies and their level of maturity.
Minimum  Is able to obtain information from business people in face to face situations, and to analyze information on users occupational tasks obtained by a variety of formal and informal means.
Has an analytical and creative approach to problem solving.
Is familiar with the principles and practices involved in development and maintenance and in service delivery.
Minimum  Has good technical understanding and the aptitude to remain up to date with IS security and developments.
Minimum  Possesses a general understanding of the business applications of IT.
Minimum  Is effective and persuasive in both written and oral communication.
Demonstrates basic knowledge of information security principles.
Has experience in moderate to large technology implementations and background as an administrator of IT systems, databases, or processes.
Any one of the Certifications ;

CISSP, SANS GSEC, CIPP, FBCP are desired


Aman Aggarwal
Sr. IT Technical Recruiter
Noralogic Inc
307-316-7171
6701 Democracy Blvd STE 300 Bethesda, MD 20817

Sr. Security Analyst

Position: Sr. Security Analyst
Location: Pleasanton, CA
Duration: 6+ Months
Job ID: CR107
 
Job Description
The tasks for the Security Consultant include, but are not limited to, the following:
·         Act as a Lead Consultant/Subject Matter Expert/domain champion
·         Work on development of Information Security plan (ISP) and performing gap analyses
·         Assist in updating/developing ISP, policies, training materials, website, procedures, controls, etc.
·         Assist with audit remediation validation for compliance to security policies/standards
·         Assist in the evaluation of security risk assessments and gap analysis
·         Assist in updating/developing policies, training materials, website, procedures, controls, etc.
·         Assist in creating policy compliance procedures including compliance measurement reports/dashboard
·         Assist with audit remediation validation for compliance to security policies/standards
·         Assist with the implementation of the various security tools
·         Attend meetings/Represent Enterprise Security as a Senior Lead for all security matters
·         Act as Lead/Co-Lead/Backup on assigned Enterprise Security projects
 
Technical knowledge and skills:
·         Hardware: network switches, routers, load balancers, servers, storage systems
·         Operating Systems: UNIX, Linux, Windows
·         Network: LAN, WAN, Internet, Proxy/Filtering, Firewall, VPN, DMZ
·         Network Protocols such as TCP/IP, SNMP, SMTP, NTP, DNS, LDAP,  NFS, Samba, etc
·         Active Directory
·         Vulnerability Assessments
·         Secure Software Development Lifecycle
·         Penetration Testing
·         Security
·         Mainframe DB2
·         Oracle databases
·         Best Practices Standards: ISO 27001/27002, PCI: DSS v3; GLBA; HIPPA/HITECH; NIST 800-53; California State Administrative Manual.       
·         Excellent communication, technical writing, and customer service skills
·         Critical thinking skills
·         Must Possess Current CISA and CISSP Certifications
 
Professional skills: 
The Consultant resource(s) shall possess most of the following skills:
·         Strong analytical and critical thinking skills with the ability to analyze information and identify and formulate solutions to problems.
·         Provide more in-depth analysis with a high-level view of goals and end deliverables.
·         Remain proactive and complete work within a reasonable time frame under the supervision of a manager or team lead.
·         Plan and manage all aspects of the support function.
·         Extensive knowledge of and proven experience with Information Technology systems, and methods of developing, testing and moving solutions to implementation.
·         Strong knowledge in project management practices and ability to document processes and procedures as needed.
·         Work collaboratively with other support team members and independently on assigned tasks and deliverables with minimum supervision
·         Communicate effectively with users at all levels, from analyst up to senior management, verbally and in writing.
·         Self-motivated, working closely and actively communicating with team members to accomplish time critical tasks and deliverables
·         Ask questions and share information gained with other support team members, recording and documenting this knowledge
·         Elicit and gather user requirements and/or problem description information, and record this information accurately
·         Listen carefully and act upon user requirements
·         Convey and explain complex problems and solutions in an understandable language to both technical and non-technical persons
·         Present technical solutions to management and decision makers
·         Follow the lead of others on assigned projects as well as take the lead when deemed appropriate
·         Think creatively and critically, analyzing complex problems, weighing multiple solutions, and carefully selecting solutions appropriate to the business needs, project scope, and available resources
·         Take responsibility for the integrity of the solution
·         5-15+ years’ experience in information security, audit, and security/audit compliance.
·         CISSP required.  Other highly desirable security certifications may be substituted for CISSP (for e.g., CISM, CISA, etc.) 
·         Extensive experiencing conducting ISO 27k gap assessment preferred but not required 
·         Should have extensive experience in leading it security/compliance/audit projects.

 
 
Satya
Caspex
48531 Warm Springs Blvd, Suite 405A, Fremont, CA 94539.
PH: 510-709-3806
Email: satyag@caspex.com
Web: www.caspex.com

Data & Application Security Engineer

Data & Application Security Engineer
Sunnyvale, CA    
12 months +
 
Responsibility:
• Find the best ways to identify security issues, risks and incidents and suggest improvements and create automation as needed to detect and mitigate those risks
• Designs vulnerability testing processes and security breach mitigation tactics
• Develop and interpret security policies and procedures.
• Develop and implement the data encryption program to protect the sensitive information and other security products and procedures
• Develop or implement open-source/third-party tools to assist in detection, prevention and analysis of security threats
• Develop and deliver training materials and perform general security awareness and specific security technology training
• Evaluate and recommend new and emerging security products and technologies
• Work within the team to design, develop, deploy and operate security technologies and solve challenges around events, alerts, monitoring, intrusion detection, vulnerability detection and tracking, file integrity
monitoring and other similar technologies and challenges at cloud scale
• Find the best ways to monitor and automate the security on/in multiple non-production, production environments to achieve available, reliable, stable, consistency and most importantly secure services that
we offer to our customers
• Be able to analyze the security problems, and engineer solutions that are reproducible
• Identify improvements to and as needed write scripts to automate security technologies to improve our ability to implement in cloud-based infrastructure (new environments, re-deployments, updates, and
upgrades). Ideally using Python or Ruby or Power shell, etc.)
• Research, document and solve complex security problems. These could include developing an encryption key management (PKI using reputable public sources), testing and deploying DLP, Creating a API
automation, etc...
• Configuration of Windows and Linux host-based security as well as network and cloud-based security systems
• Assisting with the installation and configuration of network security architectures, including firewalls, Demilitarized Zones (DMZ), router ACLs (Access Control Lists), and web content filters Required experiences and skills:
• Strong technical skills and the ability to learn and continue to maintain cutting edge skills and knowledge on a variety of technical areas (Unix/Linux, Application Security, Data security, Vulnerability Management, Incident Management, etc...)
• At least 5+ years in a relevant technology field with at least two years being in a technical security engineer role with the ability to demonstrate and produce examples of your relevant work
• Offensive security and penetration testing experience (Metasploit, Meterpreter, Websploit, Nmap, Nessus, Burp Suite, SSL Strip, Websploit, Penetration Testing, Brute Force)
• Hands on experience in security implementation techniques and development of security test tools for portals, APIs and cloud-based applications
• Knowledge and Specific Information Security related experience including encryption, IDS/IPS, Firewalls, SEIMs and Log Management, syslog analysis, web related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS, routing protocols) and vulnerability assessment including analyzing the request/response
• Knowledge of security vulnerabilities and remediation techniques, including red team operations, development of exploits and incident response
• Strong understanding of endpoint security solutions to include File Integrity Monitoring and Data encryption, protection and loss Prevention
• Experience and understanding of engineering processes, especially SDLC
• Certified Information Systems Security Professional (CISSP)
• Effective communication; in both written and oral communication. Be able to break down complex topics and be able to educate others on security concepts
• Ability to collaborate effectively with others and the ability to multi-task and work on multiple projects concurrently
• Demonstrate high energy and a sense of urgency and work within potentially compressed time frames
• Strong analytical and logistical skills with equally strong attention to details
• Experience developing best practices and written documentation for all existing security implementations and technology.
 
If you are interested to pursue the engagement, please send us your updated resume along with the following details:
Full Name:
Present Location:
Ready to relocate (Y/N):
Work Authorization:
Preferred mode of contact / Phone #:
Expected Pay Rate/Salary (all-inclusive)
Earliest availability for the assignment (Date):
Earliest availability for phone Interview, Please provide a few timeslots for next few days:
Earliest availability for onsite Interview, Please provide a few timeslots for next few days.
 
Yogesh Kapadne  |  Sr Technical Recruiter - Resource Management Group
Intelliswift Software Inc 
39600 Balentine Dr., Suite 200 Newark, CA 94560
www.intelliswift.com   |  Phone: 510-370-4452  | Fax: 510-578-7710