Tuesday, October 30, 2018

Front End Developer

Job Title: Front End Developer
Location: Frisco, TX 75034
Duration: 12 Months

Job Description: 
The Provider Software Group (PSG)is looking to hire a talented Front-End Developer to support development for web and touchscreen products used by health care Practices to manage patient care, treatment plans, and pharmaceutical inventories. Our core objectives are: We help fight disease by helping those who fight it best; We provide the tools that our customers use to increase safety and quality while decreasing cost; We develop high-quality software quickly so that we can help our customers adapt to this changing market.

PRIMARY DUTIES AND RESPONSIBILITIES:

• Develops user interface design prototypes to serve as a guide for system/program development.
• Build high-fidelity prototypes with working HTML/CSS/JavaScript directly from a UX/UI static and dynamic prototype designs from designers
• Build and maintain HTML and CSS for different components and styles in a live style guide
• Ability to complete documentation on how to use components in the style guide
• Ability to diagnose UI bugs in the working application and fix them in the web application
• Stays abreast of new trends and produces proof of concepts to show design team what is possible.
• Travel is estimated to be below 5%
• Experience working in an agile environment, updating tasks in scrums, meeting commitments provided to different agile teams
• Participate in collaborative review of functional and technical requirements.

REQUIRED SKILLS, KNOWLEDGE, AND ABILITIES:

• Ideal team player personality: Candidate must be Humble, Hungry, and Smart.
• Ability to work well with both technical and non-technical team members in both small and large settings particularly UX/UI designers, back-end devs, QA, and project managers.
• Willingness to learn (from teammates and professional sources) as well as readily share knowledge
• 1+ years in front end development particularly HTML5, CSS, SCSS, and JavaScript
• Basic understanding of design sensibilities focusing on ensuring outstanding usability and aesthetics characteristics.
• Experience with Web Application development and Responsive Design Framework.
• Experience with JavaScript libraries such as jQuery, AngularJS, etc.
• Strong organizational, writing, and verbal skills. Able to attend meetings, take notes, and ensure tasks are completed

Anish Patel
Rangam Consultants Inc.
Somerset, NJ 08873
Phone: 908-704-8843 - Ext: 208 Fax: 908-253-6550
Email: Anish.Patel@rangam.com

Monday, October 29, 2018

Security Analyst

Position Title:     Security Analyst
Location:              Pleasanton, CA
Job Duration:     12+ Months
 
Description:
The Technical Security Program Project Specialist will assist Enterprise Security in the management, development, and implementation of assigned security projects in accordance with Security Best Practices.
 
DELIVERABLES
1. The tasks for the Security Consultant include, but are not limited to, the following:
2. Act as a Lead Technical Security Project Specialist/ Senior/Lead Consultant/Subject Matter Expert/Domain Champion
3. Advise the Chief Information Security Officer/ESEC Team on matters involving organizational, strategic, tactical, and security best practices.
4. The Technical Security Project Specialist is the primary senior technical advisor who can act both as a technical project specialist/manager as well as work hands-on the day-to-day analytical technical security functions (e.g. Risk Assessment, reports, phishing tests, etc.).
5. Work on developing/updating of Information Security plan (ISP) and performing gap analyses, drive assessments, analysis, and provide recommendations
6. Assist with audit remediation validation for compliance to security policies/standards
7. Assist in the evaluation of security risk assessments and gap analysis
8. Knowledge transfer to and training of State Fund employees
9. Assist in updating/developing policies, training materials, website, procedures, controls, etc.
10. Assist in creating policy compliance procedures including compliance measurement reports/dashboard
11. Assist with the implementation of the various security tools (e.g. GRC, etc.)
12. Knowledge transfer to and training of State Fund employees
13. Attend/Conduct meetings/Represent Enterprise Security as a Senior Lead for all security matters
14. Act as Lead/Co-Lead/Backup on assigned Enterprise Security projects
15. Other duties as assigned.
 
TECHNICAL KNOWLEDGE AND SKILLS:
• Technical Security Project Management
• Hardware: network switches, routers, load balancers, servers, storage systems
• Operating Systems: UNIX, Linux, Windows
• Network: LAN, WAN, Internet, Proxy/Filtering, Firewall, VPN, DMZ
• Network Protocols such as TCP/IP, SNMP, SMTP, NTP, DNS, LDAP, NFS, Samba, etc
• Active Directory
• Vulnerability Assessments
• Penetration Testing
• Security
• Security GRC and Forensic Analysis Tools
• Mainframe DB2
• Oracle databases
• Best Practices Standards: ISO 27001/27002, PCI:DSS v3; GLBA; HIPPA/HITECH; NIST 800-53;
• Excellent communication (Oral/Written), Project Management, technical writing, and customer service skills
 
Kindly mail your resumes in word format at manish.pal@intelliswift.com

Manish Pal I Technical Recruiting Lead - Resource Management Group
Intelliswift Software Inc 
39600 Balentine Dr., Suite 200 Newark, CA 94560
www.intelliswift.com   |    Phone: 510-370-4486  | Fax: 510-373-2486

Thursday, October 25, 2018

Security Specialist

Job Title: Security Specialist
Location: Foster City, CA
 
 
Primary Capability / Specialty: Security Consulting & Implementation / Security Monitoring & Analytics
Primary Skill: Security Information and Event Management (SIEM)
  • Security Information and Event Management - Real time monitoring of ArcSight and Securonix consoles, email inbox, Client Threat Intel alerts 
  • Events and Incident triage and analysis 
  • False-positive and False-negative Analysis and verification 
  • Perform Incident Investigations 
  • Conduct root cause analysis for Priority 1 to identify changes in monitoring content, tuning, etc. 
  • Perform malware analysis using various tools. For example: analyzing system memory and/or logs using different tools. 
  • Acquire artifacts from a client or server during an investigation 
  • Recommend security monitoring or device tuning to reduce false positive detections 
  • Building of Phishing Campaigns 
  • Supporting Forensics data collection and High-Level incident research 
  • Supporting Malware analysis and recommendation 
  • Conduct Vulnerability assessment and exploit testing 
  • Perform Annual Penetration Testing using Metasploit and other security tools 
  • Safely and effectively exploit vulnerabilities to demonstrate proof of vulnerability

Rahul Kumar 
eTeam Inc
(732) 983-5608
1001 Durham Avenue, Suite 201
South Plainfield,, NJ, 07080

Senior Security Analyst

Title: Senior Security Analyst

Type: 6+ month contract
Location: San Jose, CA (on-site)
Rate: DOE
Start: ASAP

Interview process: Phone interview then a face to face or skype

Day to Day:
  • Drive Corporate Security Program based on the NIST CSF – Identify, Detect, Protect,Respond and Recover.
  • Identify and Monitor the Corporate Networks to determine if there have been any attacks.
  • Analyze network traffic to identify anomalies and test information security controls for weaknesses.
  • Design and implement safeguards to protect the system with the help of network engineers and other members of the Technology Services team.
  • Respond to threats by taking mitigating actions to contain the activity and minimize damage
  • Participate in risk assessments and breach readiness exercises for incident management.
  • Facilitate forensics analysis to determine the source of the threat. Document lessons learned as well as identify process improvements.
  • Communicate security issues to management via reports, dashboards. Provide weekly metrics on overall security posture.
  • Research emerging threats and work with the Security Operations Center (SOC).
  • Drive the Vendor Security Program including annual self-assessments.
  • Participate in the security toll-gates on SSDLC projects.

Must Haves:
  • Knowledge of software development, computer networks and Internet threat activity.
  • Knowledge of Security Incident and Event Management (SIEM) tools (Splunk, Qualys).
  • Previous enterprise or platform/cloud vulnerability management experience.
  • Previous experience leading an information security program in large, national or international enterprise a plus.
  • Excellent written and verbal communication skills, including experience engaging with executive and technical audiences.
  • Must be able to work in a fast paced, high profile environment.
Nice to haves:
  • Industry Certifications – Network Security or Certified Information System Security Professional (CISSP) with professional experience in Network Security.
Jeremy Sherin 
Phone: (215) 383-2877    Email: jeremy.sherin@mondo.com    Website: mondo.com
Address: 2000 Market Street Philadelphia PA 19103 

Junior Security Specialist

Job Title: Junior Security Specialist
Location: Foster City - CA 
Duration: 12 + Months
 
DESCRIPTION:
Primary Capability / Specialty: Security Consulting & Implementation / Security Monitoring & Analytics
Primary Skill: Security Information and Event Management (SIEM) (P4 - Expert)
Security Information and Event Management - Real time monitoring of ArcSight and Securonix consoles, email inbox, Client Threat Client alerts
Events and Incident triage and analysis
False-positive and False-negative Analysis and verification
Perform Incident Investigations
Conduct root cause analysis for Priority 1 to identify changes in monitoring content, tuning, etc.
Perform malware analysis using various tools. For example: analyzing system memory and/or logs using different tools.
Acquire artifacts from a client or server during an investigation
Recommend security monitoring or device tuning to reduce false positive detections
Building of Phishing Campaigns
Supporting Forensics data collection and High-Level incident research
Supporting Malware analysis and recommendation
Conduct Vulnerability assessment and exploit testing
Perform Annual Penetration Testing using Metasploit and other security tools
Safely and effectively exploit vulnerabilities to demonstrate proof of vulnerability

Keshav Kumar
eTeam Inc
(732) 983-5567
1001 Durham Avenue
South Plainfield, NJ, 07080

Infrastructure Security Engineer

Position: Infrastructure Security Engineer

Location: Milpitas, CA

Duration: 15 Months

Job Description:
·         At least 2-4 years hands-on experience in cyber/info security in network security with a successful NAC technical implementation, including technical hands-on integration, deployment, configuration and fine tuning with routers, switches and firewalls and modern NAC.
·         At least 2-4 years hands-on experience in cyber/info security in hands-on technical implementation of DLP IP Protection involving USB, detection, integration, process.
·         At least 2-4 years hands-on technical implementation experience and completed major project in cyber/info enterprise security in Insider Threat Detection, Analysis, Hunting, analytics analysis - automation - instrumentation and fine-tuning, and Insider threat incident response. Has developed meaningful insider threat and IP protection security analytics based on feeds and integrations from several devices and data of various types/sources in a mid-to-large size.
·         At least 2-4 years hands-on technical implementation experience in Cyber SOC metrics development and automation, security instrumentation and fine-tuning, to produce meaningful security analytics based on feeds/data integrations from several devices/sources (system, network, security, etc.)
·         At least 2-4 years hands-on experience in cyber/info security in network security with a successful application firewall technical implementation, including technical hands-on integration, deployment, configuration and fine tuning with routers, switches and firewalls and systems/app tuning
·         At least 2-4 years hands-on experience developing Cyber security / Blue Team processes, policies, playbooks, checklists, Tactics, Techniques and Procedures (TTPs) including first-line and incident response and reporting / notification thresholds, malware analysis and other Blue Team checklists to guide cybersecurity response and quick reaction and to formalize other cybersecurity processes/policy.
·         At least 2-4 years hands-on experience in MS Active Directory, Server, Web, App and endpoint security hardening and configuration/implementation with successful hands-on examples.


Krishna
Account Manager
IDC Technologies, Inc
Work: +1 (408)-715-1264
Mailto: 
krishna@idctechnologies.com

Wednesday, October 24, 2018

Security Operations Center Analyst

Positions: 10+. 

Role: SOC/ Security Operations Center Analyst. 

Location: Reston, VA. 

Duration: 12 months (Might be contract to hire)

Skills
1. SOC/ Security Operations Center Analyst experience
2. Incident Response experience 
3) SIEM

Kushal Zulzule
Sr. Technical Recruiter
Saicon Consultants, Inc.  
(913) 257-3377 x 157 (Work)
URL:  
www.saiconinc.com 

Cyber Security Threat Analyst/Specialist

PG&E - Concord, CA
Cyber Security Threat Analyst/Specialist – Senior
1 year contract

Qualifications:
Bachelors in Computer Science, or related discipline, or equivalent experience Certified Information Systems Security Professional (CISSP) certification Experience in Information Technology (IT), 6yrs 

Responsibilities: 
Acts as a subject matter expert in area of field. Performs moderately complex tasks and supports projects which are cross functional. Leads development of framework for implementing tools and processes to improve quality and timeliness of reports. Performs complex IT product and system administration tasks (e.g. customization, cross-tool integration) for security tools. Parses application logs and IT system event data to support advanced analytics and system integration. Expert in area of field and applies extensive knowledge of concepts, principles, and practices. Codes complex tasks that integrate systems, produce reports or provide output that can be leveraged by other team members or systems. Performs analysis using security tools and monitoring systems to discover the source of anomalous security events. Assists in performing basic research internally and externally. 

Amanda Vazquez 
Recruiting Director

Randstad Technologies
1545 River Park Dr. Suite 501
Sacramento, CA 95815
T 916.256.3667
F 916.840.7975

Security & Risk Analyst

Job Title: Security & Risk Analyst 
Location: Foster City, CA 
Duration: 12 + Month on W2
  • Programs within Identity and Access management landscape.The Senior IT Security Analyst is a key member of the Information Security and Privacy team and works closely with cross functional IT and business led IT teams to ensure that all applications and systems are built, maintained and protected in accordance with identity and access governance process, policies, standards, and compliance requirements so that the risk is managed appropriately.
  • The candidate will assist with developing and implementing the desired end state of the Information Security and Privacy 
  • As part of the Security Operations team, the Sr. Security Analyst will provide end-to-end daily support and participate in projects for all Identity and Access Management solutions.
  • Daily operation and project responsibilities will include working with system owners across the organization to onboard IAM services onto their system landscape.
Kunal Singh
eTeam Inc
(732) 983-5587 Ext.518
1001 Durham Avenue, Suite 201,South Plainfield, NJ 07080
South Plainfield, NJ, 07080

Tuesday, October 23, 2018

Senior Linux Admin

  • Location: San Ramon CA/ San Fransisco, CA
  • Position Type: Contract
  • Duration: 6+ months- 12 months

Job Description
Job Summary:
  • This Senior Linux Administrator position is on a project team focused on building Linux servers and supporting application teams with configuration through the project lifecycle. Duties will include but are not limited to:
  • Installing RHEL OS
  • Configuring OS to application specifications
  • Installing and configuring internal tools (Such as security tools, backup, etc.) and providing system administration support to application needs
  • The OS and respective patches are installed via RedHat Satellite so basic knowledge on Satellite use is mandatory.

Required Skills:
  • Red Hat Linux (RHEL) 7 System Administration
  • Basic VMware knowledge
  • Satellite Server Knowledge

Desired Skills:
  • AIX Administration


Shreya Ghosh, Talent Advocate
Global Technical Talent, Inc. - All current GTT Openings
233 Vaughan Street, Suite 102
Portsmouth, NH 03801
Ph: (603) 516-4424 / Fax: 800-775-3135
sghosh@gttit.com / www.gttit.com

Security Analyst

Description/Comment:
We have a new opportunity for an Information Security Analyst in the Enterprise Information Security, Cyber Threat Management organization. The individual selected for this position will provide cyber threat intelligence analysis, assess and analyze attack surface, conduct threat modeling, and deliver 'actionable intelligence' with focus on current and emerging cyber-attacks against financial sector assets. The candidate will work with internal teams to identify and analyze, share correlated and enriched threat Client to assist incident response and threat detection, allowing faster time to action.

  • •Drive threat modeling exercises that help Wells Fargo Lines of Business (LOB) personnel understand the potential cyber threats against their products and systems; the mitigating controls we have in place; and the remaining residual risk.
  • •Actively monitor and research cyber threats on the Internet and Dark web with a direct or indirect impact/relevance to financial services, business operations, technology infrastructure, and client trust.
  • •Collect, process, and scan for indicators of compromise (IoC) across the Wells Fargo enterprise.

Required Qualifications:
  • •5+ years of information security administration experience
  • •1 + years of threat intelligence experience within the financial services industry

Desired Qualifications:
  • Experience with Splunk, ThreatConnect, and other indicator of compromise (IoC) handling tools
  • Ability to manage complex issues and develop solutions
  • Proficiency in Microsoft Word, PowerPoint, and Excel
  • Excellent verbal and written communication skills
  • Experience deriving actionable intelligence and threat indicators out of intelligence feeds •Ability to present complex material in a digestible, consumable manner to all levels of management
  • Ability to execute in a fast paced, high demand, environment while balancing multiple priorities •Ability to work effectively, as well as independently, in a team environment •Experience working in a large enterprise environment
  • A BS/BA degree or higher Other Desired Qualifications
  • Advanced hands-on experience in threat management and/or vulnerability management
  • Have a working knowledge in one or more of the following areas:
    • - Threat Modeling Framework
    • - APT & AET
    • -Cyber crime
    • - Fraud
    • - Emerging Threats
    • - Social Engineering
    • - Insider Threats
    • - Technology Applications

Ryan Robinson
INT Technologies
Asheville, NC
919.439.4569
rrobinson@inttechnologies.com

Security Technology Business Risk Advisor

Job Title: Cyber Security Technology Business Risk Advisor / Analyst - Expert
Duration: 12 Months Contract
Location: San Francisco, CA

US Citizens and Green Card Holders and those authorized to work in the US are encouraged to apply. We are unable to sponsor H1b candidates at this time

Summary
  • For this particular position, technical design and architecture skills take priority over governance and assessment skills.
  • You will collaborate with other Cybersecurity groups, Information Technology partners, and business experts to identify threats to Client's key cyber-assets.
  • You will then create innovative strategies to better protect those assets, deploy technologies and processes to put those strategies into action, and evaluate the technologies and processes to demonstrate that improvements have been made.
  • In this role, you will also engage with project teams to support the delivery of business and operational technologies in the core lines of business at Client, getting a front-row view into a real-life version of the Internet of Things.
  • You will also contribute to a rapidly growing team, with extensive leadership support, to strategically manage risk and proactively adapt to evolving threats and business needs.
  • Risk assessment, project development, and technology deployment skills are all important.
  • You will also be able to grow design and architectural expertise through working with our affiliated architecture group to design, develop, and implement technical solutions to meet the challenges presented by adversaries seeking to attack Client's systems and compromise client's data.

Specific Responsibilities include:
  • Leads technology assessments to understand capabilities of required systems or networks.
  • Identifies and recommends cyber strategies for technology development based on stakeholder requirements.
  • Drives security reviews, identifies gaps in security architecture and designs and recommends necessary security controls to be integrated within the development lifecycle.
  • Develops and recommends security controls, identifies key security objectives to maximize software and system security while minimizing disruption to plans and schedules.
  • Leads translation of security controls into technical specifications and guidance to stakeholders to ensure common understanding across the stakeholders and enable adequate implementation.
  • Actively recommends engineering solutions in collaboration with Cybersecurity Architects and product owners to remediate inherent cyber security risks.
  • Provides peer review and support for organizational deliverables.

Top Three Attributes
  • Technical capabilities
  • Ability to work in an agile environment
  • Understanding of best practices in cybersecurity

Minimum Qualifications:
  • B.S. degree in Computer Science, Information Systems or other related field, or equivalent year work experience
  • Minimum of 6 years of experience in IT, critical infrastructure, intelligence, and/or cybersecurity information security
  • Ability to travel up to 10% to meet the needs of the business
Desired:
  • Master's Degree in Computer Science or job-related discipline or equivalent experience
  • Certified Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM), Certified in Risk and Information Systems Control (CRISC), Certified Information Systems Auditor (CISA), or equivalent
  • Knowledge of Cybersecurity best practices and standards (e.g. NIST, ISO, etc.)
  • Certified Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM), Certified in Risk and Information Systems Control (CRISC), Certified Information Systems Auditor (CISA), or equivalent
  • Understanding of computer networking concepts and protocols, and network security methodologies
  • Demonstrated problem analysis and decision-making skills
  • Ability to communicate and convey complex technical security-related concepts to business and technology teams
  • Ability to influence and work with and across all levels within the business
  • Excellent written and verbal communication skills required


Sam Thornton, Senior Technical Sourcer
GTT, LLC
233 Vaughan Street, Suite 102
Portsmouth, NH 03801
PH : 603-516-4448 Fax: 800.775.3135

Thursday, October 18, 2018

Information Security Engineer

Immediate need for Information Security Engineer, Full-Time position in Issaquah, WA


Description of position:
The role of every Information Security team member is to support the overarching values and business goals of Client Wholesale as they relate to meeting legal, ethical and regulatory obligations; protecting member privacy; and maintaining a security technology environment for our operations. The Information Security Engineer provides consultative services, works with vendors for product consideration and recommendation, performs monitoring and auditing of information system activities, creates and maintains documentation related to policies, standards and procedures; and, mentors team members with lesser subject matter expertise.

 

Tasks and responsibilities:
Works with stakeholders to provide security solutions that support their business requirements

Works to create roadmap for consolidation and integration of enterprise and/or security platforms

Performs the project manager role on security-related projects
Identifies existing security gaps and design remediation efforts to address those gaps

Assess and/or design centralized user and configuration management systems

Performs and/or coordinate regular security assessments of existing or new infrastructure

Performs duties necessary to assist in establishing practices and system configurations to ensure the safety of information systems assets and to protect information systems from intentional or inadvertent access or destruction

Works with information systems custodians (i.e., department managers, user community and systems administrators) at different levels in the organization to understand their respective security needs and assist with implementing practices and procedures consistent with Client’s Information Security Policy
Assists with monitoring and auditing of information systems activities and systems to confirm information security policy compliance and provide management with security policy compliance assessments and system monitoring reports

Develops and maintains centralized information systems security standards, procedures, and guidelines

Identifies, develops, and implements mechanisms to detect security incidents in order to enhance compliance with and support of security standards and procedures in place.

Conducts security risk assessments on new products and systems, periodic security risk assessments on existing systems and identify and/or recommend appropriate security countermeasures and best practices

Responds to discovered security incidents by informing appropriate custodians, determining root cause, and identifying and executing remedial actions (if necessary) required to re-establish respective information system security

Coordinates activities or engagements with loss prevention, interact with legal and law enforcement as required

Assists in other areas of the department and company as necessary
 

Required skills, abilities, and certifications:
A Bachelor’s degree in Computer Science or a minimum of 6 years of information systems security experience in a leadership role preferred
One or more professional security certifications such as CISA, CEH, GIAC or CISSP (or equivalent experience)

Ability to work effectively, independent of assistance or supervision
Innovative, creative, and extremely responsive, with a strong sense of urgency

Willing to share knowledge and assist others in understanding technical and business topics

Willingness to work outside of regular business hours as required which can include evenings, weekends and holidays

Experience with firewalls, routers, load balancers and DMZ silos, and packet capture technologies helpful

Working knowledge of information systems security standards and practices (e.g., access control and system hardening, system audit and log file monitoring, security policies, and incident handling)

Demonstrated experience of “hands on” security knowledge of the following platforms: Windows in a large Active Directory environment, Linux, AIX, Ubuntu and other UNIX variants

Web technologies such as Websphere, IIS, Apache, IHS
Scripting knowledge including Perl, Python, Powershell, etc.
Ability to clearly communicate Information Security matters to executives, auditors, end users, and engineers, using appropriate language, examples, and tone

Experience with tools such as NMAp, NetCat and Enum
Experience with IDS (Sourcefire, SNORT) and SIEMS technologies such as ArcSight, Splunk ES

Working knowledge of protocols and technologies such as TCP, UDP, SSL/TLS.

Working knowledge of HTML, CSS, JavaScript and WML

At least one technical certification related to a major Client platform (Microsoft, Linux or Cisco)

Ability to interpret information security data and processes to identify potential compliance issues (SOX, HIPAA, PCI)

Ability to quickly understand security systems in order to identify and validate security requirements using logical, risk based prioritization methods

Experience with performing computer forensics and analysis
 
Vinay
Technical Recruiter
Office# 732-481-2938