Monday, September 30, 2019

Incident Response & Threat Hunting

Role: Lead – Incident Response & Threat Hunting
 
Location: Wilmington, DE
Position: Full Time
Job Description:
Security Operations Center (SOC)
SIEM – IBM QRadar
SOAR Platform – Service Now, Demisto
Security Incident Management
Secure Eye – Intsights – Threat Intelligence
Lead 24x7 SOC teams providing operational and strategic planning, including fostering innovation, planning projects, and organizing and negotiating the allocation of resources.
Ensure timely reporting of metrics, security control gaps, and vulnerabilities to leadership by providing quantitative insight into security posture
Hands on Experience in providing Level 3 incident Response & Threat Hunting
 Manual Log analysis of various security devices - Server, FW, IPS/IDS etc.
Threat modeling & hunting using security tools.
SIEM Tool (IBM QRadar)- Administration & Support
Use Case Development/Enhancement
Content Development, Co-relation Rule creation / modification / review
Oversee program to prepare organization for active threat and vulnerability defense and remediation, and security incident management
Lead the development of Cyber crisis management playbooks, run books and plans to ensure effective response during a significant event.
Lead will evolve the incident response program that aligns with the enterprise incident management framework and includes incident detection, analysis, containment, eradication, recovery and forensic artifacts required for additional investigations.
Hands-on experience finding and responding to advance persistent cyber-attacks (APT) in a global network setting
Change agent with ability to drive accountability & outcomes across a diverse threat landscape
Strong Technical escalation management experience.
Ensure delivery compliance to SOW &  service level adherence
Interface with customer  & delivery team
Regular customer connect &  escalation management
Technical delivery parameter compliance tracking & reporting
Implementation Standardize service delivery  framework across multiple accounts
Essential Technology Skills
Security Operations Center (SOC)
SIEM – IBM QRadar
SOAR Platform – Service Now, Demisto
Security Incident Management
Secure Eye – Intsights – Threat Intelligence
Must Have
8-10 years in IT related roles and 5-8 years of experience in at least two security operations disciplines within an enterprise scale environment (such as tier 3/4 incident management, cyber threat analyst, cyber intelligence analyst, cyber investigation, Threat Hunting)
Experience with SOC incident response and management including 24x7x365 continuous monitoring, detection and analysis of potential intrusions in real-time
Detailed knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits
Experience with attacks and mitigation methods, with experience working in two or more of the following: Network protocols and secure network design; Operating system internals and hardening (e.g. Windows, Linux, iOS, Android); Web application and browser security; Security assessments and penetration testing; Authentication and access control; Applied cryptography and security protocols; Security monitoring and intrusion detection, Incident response and forensics; Development of security tools, automation or frameworks.

Ganesh Yadav
408-898-2687

QA Automation Engineer

Role: Lead – Incident Response & Threat Hunting
 
Location: Wilmington, DE
Position: Full Time
Job Description:
Security Operations Center (SOC)
SIEM – IBM QRadar
SOAR Platform – Service Now, Demisto
Security Incident Management
Secure Eye – Intsights – Threat Intelligence
Lead 24x7 SOC teams providing operational and strategic planning, including fostering innovation, planning projects, and organizing and negotiating the allocation of resources.
Ensure timely reporting of metrics, security control gaps, and vulnerabilities to leadership by providing quantitative insight into security posture
Hands on Experience in providing Level 3 incident Response & Threat Hunting
 Manual Log analysis of various security devices - Server, FW, IPS/IDS etc.
Threat modeling & hunting using security tools.
SIEM Tool (IBM QRadar)- Administration & Support
Use Case Development/Enhancement
Content Development, Co-relation Rule creation / modification / review
Oversee program to prepare organization for active threat and vulnerability defense and remediation, and security incident management
Lead the development of Cyber crisis management playbooks, run books and plans to ensure effective response during a significant event.
Lead will evolve the incident response program that aligns with the enterprise incident management framework and includes incident detection, analysis, containment, eradication, recovery and forensic artifacts required for additional investigations.
Hands-on experience finding and responding to advance persistent cyber-attacks (APT) in a global network setting
Change agent with ability to drive accountability & outcomes across a diverse threat landscape
Strong Technical escalation management experience.
Ensure delivery compliance to SOW &  service level adherence
Interface with customer  & delivery team
Regular customer connect &  escalation management
Technical delivery parameter compliance tracking & reporting
Implementation Standardize service delivery  framework across multiple accounts
Essential Technology Skills
Security Operations Center (SOC)
SIEM – IBM QRadar
SOAR Platform – Service Now, Demisto
Security Incident Management
Secure Eye – Intsights – Threat Intelligence

Must Have
8-10 years in IT related roles and 5-8 years of experience in at least two security operations disciplines within an enterprise scale environment (such as tier 3/4 incident management, cyber threat analyst, cyber intelligence analyst, cyber investigation, Threat Hunting)
Experience with SOC incident response and management including 24x7x365 continuous monitoring, detection and analysis of potential intrusions in real-time
Detailed knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits
Experience with attacks and mitigation methods, with experience working in two or more of the following: Network protocols and secure network design; Operating system internals and hardening (e.g. Windows, Linux, iOS, Android); Web application and browser security; Security assessments and penetration testing; Authentication and access control; Applied cryptography and security protocols; Security monitoring and intrusion detection, Incident response and forensics; Development of security tools, automation or frameworks.

Regards ....
Ganesh Yadav
408-898-2687

Information Security Business Analyst

Information Security Business Analyst
San Francisco, CA
Immediate interview
Job Description –
a) 8+ years of business systems analysis experience, business systems design experience, or a combination of both
b) 5+ years of Information Security experience
c) Deep understanding of information security protocols, vulnerability remediation and overall data security requirements
d) Results driven individual who is self-starter, critical thinker, problem solver and detail oriented
e) Create quality documentation to convey both business and technical requirements, including experience creating requirements traceability matrix
f) Experience in financial projects
d) Ability to clearly articulate how technical solutions map to business requirements
g) Ability to understand current state and map to future state technologies and architecture
h) Generate interview questions as they relate to requirements gathering
i) Ability to translate business and technical requirements into use cases for Agile development
j) Understanding of BI and Analytics tools and appropriate use cases
k) Experience gathering non-functional requirements



Friday, September 27, 2019

Job Title: Senior SIEM (QRadar) Engineer (SSE)

Job Title: Senior SIEM (QRadar) Engineer (SSE)
Location: Las Vegas,NV 
Duration: CONTRACT 
Note:- Need visa copy and passport number for submission
 
 
A Senior Security Engineer (not just analyst) role that brings deep expertise and experience in Security Information & Event Management (SIEM), specifically IBM QRadar, to be able to engage at a technical, hands-on level with various SIEM optimization initiatives. This person will have advanced subject matter expertise in the build, configuration, day to day administration, maintenance and tuning activities, along with in depth knowledge of the various capabilities, integrations and applications available within on prem, cloud and MSSP managed QRadar instances. They will also have a demonstrated deep understanding of security fundamentals and associated SIEM options, in order to advise at all levels of the security engagement including architecture, design, and configuration review.

Desired critical QRADAR service areas of experience:

· Management of hosts (architecture) and licenses

· Log source setup, integration, validation and optimization

· Use case, rules and detection signature creation, tuning, development and extension

· Integrate and optimize Intelligence feeds and workflow 

· Create, update, run and distribute reports

· Create custom parsers (DSM editing), offenses, alerts, response correlations, automation and workflows

· Build and tune correlation rules to eliminate false positives and identify possible false negative instances

· Platform upgrade, patching and migration experience

· Creation of detection mapping against the MITRE Telecommunication&CK framework to identify and close gaps

 Essential Duties & Responsibilities:

· Provide technical leadership, solution design, and hands-on development support of security controls for infrastructure and software deployments

· Develop Threat Models and Perform Security Health Checks of the hybrid on prem multi cloud environments

· Develop and deliver training content and playbook content for SOC I analysts

· API and application integration
 

 
Vivek Rana
Associate Technical Recruiter
eTeam Inc.
(732) 210-9149
1001 Durham Avenue, Suite 201,South Plainfield, NJ 07080
South Plainfield, NJ, 07080

Test Architect

Position: Test Architect
Location: Bolingbrook, IL
Job Description:
  • Expertise to create test strategy test plan, test cases, unit tests for a project/program
  • Assist in the review of test plans and automated cases for other team members
  • Experience with programming skills like Java, React JS, Html, CSS, Scripting languages like JS, python etc.
  • Experience testing in JSON, CSS, HTML5, React JS and Angular.js frameworks
  • Understanding of web technologies including web services, RESTful APIs, web servers etc.
  • Experience in test automation with Selenium, Protractor, Jasmine for React JS apps
  • Enhance and extend test automation frameworks,
  • Extensive experience in white box and black box testing
  • To providing test architecture quality engineering on enterprise software products and systems.
  • Knowledge of Ecommerce industry practices with a focus on test integration on DevOps and Prod environments
  • Experience leading test case design to provide efficient optimal coverage
  • Experience with deployment tool chain (GCP, Docker, Kubernetes)
  • Experience with Continuous Integration systems such as Jenkins or Bamboo and good knowledge on CI/CD pipeline
  • Experience in writing scripts for testing RESTful services
  • Experience in framework architecture and design
  • Ability to lead technical projects and code at the same time
  • Experience with Agile / SCRUM methodology for product development
  • Proven ability and desire to deliver projects on time with high quality.
  • Excellent verbal and written communication skills
  • Experience working in SaaS environment




Sourav Jha
408-746-1812
IDC Technologies Inc.

IT Security

IT Security
Culver City, CA
12+ Months
Telephonic + Face 2 Face

Job description:
  • Lead or manager experience
  • Strong infrastructure logs and security experience
  • ISO experience
  • CISM or CISP
  • Patch Management
  • Penetration Testing
  • Privileged Account Management
  • Windows system administration and Active Directory



Vijay Saraswat
IDC Technologies, Inc
Work: 408-827-9854

Mailto: vijay.saraswat@idctechnologies.com
 

Sr. Application Security Engineer

Sr. Application Security Engineer-(937597N)
Job Responsibilities 
  1. Maintain the day to day operations, configuration and scaling of the SAST, DAST, CLM & Mobile Automated assessments
  2. Assist with the development and maintenance of automations as part of the enterprise DevSecOps model to ensure assessments are being performed regularly and data results are available for consumption by stakeholders
  3. Be subject matter expert on common web application security findings such as the OWASP top 10 and provide remediation recommendations
  4. Assist with false positive reports from developers for findings from the static or dynamic assessment platforms and develop false positive reduction strategies and guidance
  5. Support triage and validation of security vulnerabilities detected in production and/or reported via responsible disclosure processes
  6. Maintain and compose operational process documentation regarding program execution.
  7. Interface with other CIS organizations such as Governance, Risk, Business Information Security and Threat Intelligence to report on program status and coordinate risk identification
What We're Looking For:
To make it clear, we're not looking for just anyone. We're looking for someone special, someone who
has in-depth experience and clearly demonstrates these skills:
  1. Bachelor's degree in Computer Science, Information Technology, Cyber Security, or related discipline or equivalent experience
  2. 5+ years of IT professional experience, with previous information security experience
  3. Direct experience maintaining enterprise level static & web application assessment platforms such as Microfocus Fortify & WebInspect, Veracode, WhiteHat, AppSpider, etc
  4. Intermediate to advanced knowledge of secure code development practices and OWASP Top 10 web application security issues
  5. Expertise in interpreted languages (Python, Javascript) and compiled languages (Java, .Net) with full-stack development experience and strong knowledge of software development lifecycles
  6. Previous experience deploying and maintaining configuration as code systems, services, containers and applications in AWS, Azure and/or GCP
  7. Experience with data analytics with the ability to provide qualitative analysis and recommendations
  8. Strong verbal and written communication skills
  9. Strong attention to detail, data accuracy, and data analysis
  10. Self-motivated and operates with a high sense of urgency and a high level of integrity
Previous experience working in large scale environments with diverse technologies

Required

  • .NET
  • DATA ANALYSIS
  • DATA ANALYTICS
  • GCP
  • INFORMATION SECURITY

Additional

  • JAVA
  • JAVASCRIPT
  • MICROFOCUS
  • PYTHON
  • QUALITATIVE ANALYSIS
  • SECURITY
  • SOFTWARE DEVELOPMENT
  • CODING
  • CYBER SECURITY
  • DOCUMENTATION
  • ENGINEER
  • GOVERNANCE
  • MAINTENANCE
  • MARKETING ANALYSIS
  • MICRO FOCUS
  • OPERATIONS
  • PROCESS DOCUMENTATION
  • QUANTITATIVE
  • REMEDIATION
  • STRUCTURED SOFTWARE
  • SUBJECT MATTER EXPERT


Jessica Hughes | Centizen, Inc. | 503-922-0469

Senior Java Developer

Senior Java Developer
Charlotte , NC
fulltime


Skills Required:

Relevant Experience
(in Yrs)-6+ Yrs
• Technical/Functional Skills -Good and Hands on experience in designing and developing applications using Java EE platforms.
• Good Object oriented analysis and design using common design patterns.
• Experience in production support of critical business applications utilizing Java, J2EE.
• Knowledge on frameworks (Struts/Spring/JSF), Web Services, Apache Tomcat, IBM Websphere Application Server, SiteMinder, jUnit testing.
• Good communication, interpersonal skills backed by sound analytical, technical and leadership skills.
• Experience in monitoring tools – Dynatrace, Nimsoft and SolarWinds
• Results oriented, focused on meeting deliverable timelines & Eagerness to learn new technologies.
Experience Required-6+ Yrs
• Roles & Responsibilities-Involving in trouble shooting application server, web server logs and analyzing them using Log Analyzer in case of any critical issue and providing thread dumps to the application teams.
• Configuring SPLUNK to monitor the logs, collect metrics for reporting.
• Assist Development team for onboarding new consumer
• Guiding Application monitoring team to make the application monitored both on infrastructure level and application performance level
• Generic Managerial Skills-Develop and maintain positive working relationships with team members and other stakeholders, including business partners and all levels of IT leadership.
• Provide mentoring to fellow administrators.


Nitish Yadav
Work: 408-418-5778  EXT 3058
Mailto: Nitish@idctechnologies.com

Wednesday, September 25, 2019

Application Security Engineer

Position: Application Security Engineer
Location: Santa Clara, CA
Duration: Long Term

Responsibilities:
• Act as liaison between Security and software development teams
• Assist development teams implementing secure SDLC practices
• Threat model web applications and work with development team throughout the SDLC
• Perform web application vulnerability assessments and penetration tests
• Provide security and compliance requirements for software development projects
Required Qualifications:
• BS in Computer science or equivalent experience
• Experience in web application security testing (assessment/penetration testing)
• Familiarity with OWASP guidelines
• Knowledge of agile and secure SDLC
Additional Preferred Qualifications:
• One or more Certifications (CISSP, GWEB, GPEN, GWAPT, OSWE, OSCE, OSCP)
• Software development or scripting experience (Python, Shell, Java, json, Scrum, Jira, etc)
• Familiarity with network and web application protocols (Http, Https, TCP/IP, SAML 2.0, OAuth 2.0, Rest APIs, etc)
• Knowledge or experience implementing SDLC frameworks like OpenSAMM or BSIMM
• Database knowledge


Priyanka Sharma
Technical Recruiter

Shimento Inc.
1700 N Broadway # 300 Walnut Creek, CA 94596
(O) 510-402-2460 (Mail) priyanka.s@shimento.net

SOC Analyst

SOC Analyst
Job Number: 19-07779

Use your skills where innovative technology solutions begin. Eclaro is looking for a SOC Analyst for our client in San Francisco, CA.

Eclaro’s client is a leading technology solutions provider, collaborating with customers to manage their needs and achieve success in their business goals. If you’re up to the challenge, then take a chance at this rewarding opportunity!

Required Qualifications:
·         Knowledge of security incident and event management, log analysis, network traffic analysis, malware investigation and remediation, SIEM correlation logic and alert generation.
·         Demonstrated ability to analyze, triage and remediate security incidents.
·         Ability to analyze data from a variety of sources over time, work with the tool owners, and create logical narratives of the observed behaviors.
·         Ability to create Standard Response and Operating Procedures for common alerts.
·         Understanding of Security principles, techniques and technologies such as SANS Top 20 Critical Security Controls, PICERL Framework, and OWASP Top 10.
·         Basic Knowledge of SIEM solution such as RSA Security Analytics, ArcSight, LogRhythm, QRadarr, Splunk or similar.
·         Must be able to manage multiple priorities simultaneously.
·         Basic knowledge of networking fundamentals (TCP/IP, Network Layers, etc.)
·         Basic knowledge of malware operation and indicators
·         Basic knowledge of current threat landscape (threat actors, APT, cyber-crime, etc.)
·         Basic knowledge of security related technologies and their functions (IDS, IPS, EDR, IRP, FW, WAF, SIEM, etc.)
·         Basic protocol analysis experience (Wireshark, tcpdump, Netwitness, Snort, Bro, etc.)
·         Basic knowledge of audit requirements (PCI, HIPPA, SOX, etc.)
·         Basic programming skills in various disciplines including scripting languages.
·         Strong communication skills both written and verbal
·         Moderate knowledge of security issues inherent in common corporate environments.
·         At least 3 Years of experience in incident handling and intrusion detection
·         Prior experience with security compliance standards across industries such as PCI, SOC 1, SOX, NIST 800.
·         One or more certifications: (Examples)
o    Certified Forensics Analyst (GCFA)
o    Certified Network Forensic Analyst (GNFA)
o    Certified Incident Handler (GCIH)
o    Certified Cyber Threat Intelligence (GCTI)
o    Certified Reverse Engineering Malware (GREM)
o    Certified Intrusion Analyst (GIAC)
o    Certified Ethical hacker (CEH)
o    Certified Expert penetration tester (CEPT)
o    Certified Information Systems Security Professional (CISSP)
o    Networking Certifications (CCNA, etc)
o    Platform Certifications (Microsoft, Linux, Solaris, etc)

Preferred Qualifications:
·         Relevant Degree Information Technology

If hired, you will enjoy the following Eclaro Benefits:
·         401k Retirement Savings Plan administered by Merrill Lynch
·         Commuter Check Pretax Commuter Benefits
·         Eligibility to purchase Medical, Dental & Vision Insurance through Eclaro



Ashly T. Velasco
Technical Recruiter
Phone: 646-357-1236
SMS: 224-310-3251

Information Security Program Manager

Position: Information Security Program Manager
Location: Santa Clara, CA
Duration: 6-12+ Month Contract
Interview: Phone and Skype

Job Description:
The successful candidate will thrive in a fast-paced environment where energy, drive, and a collaborative approach are key to success.

Responsibilities:
  • Provide program management leadership for enterprise deployment of Information Security and Product Security programs and projects
  • Develop program and project plans, schedules, and resource requirements to drive projects to closure
  • Effectively communicate and influence cross-organizational teams and ensure appropriate exposure of issues and challenges
  • Work with leadership and stakeholders to define and drive successful delivery of program and project plans, monitor progress, resolve issues, and communicate as appropriate
  • Develop and manage deadlines and activities

Qualifications:
  • A minimum of 7 years relevant experience in an enterprise IT, product security or information security environment with an emphasis on program management and development
  • Experienced in driving large cross-functional programs and projects.
  • Excellent communication, organization, and influence skills
  • Ability to resolve conflicts and drive issues to resolution and escalate when necessary
  • Understands and thrives in a dynamic environment; remains flexible and calm in the face of uncertainty
  • An expert in communicating and collaborating with cross-functional team members to achieve goals; contributes positively to the team and organization
  • Self-motivated and proactive with demonstrated creative and critical thinking capabilities
  • Proficient with applications, tools, and methodologies used to organize, manage, report progress, and deliver programs and projects 

Education:
  • Prefer degree in Engineering, Computer Science, Information Systems, Management, or equivalent work experience
Amit Dabas
IDC Technologies, Inc.
Milpitas, CA 95035, USA
Phone: 408-418-5778 ext. 3038
Empowering Technologies Services
Remote Services | IT Services | BPO |
IT Consulting | Staffing Solutions |