Friday, November 8, 2019

Microsoft Security Engineer

No Opt’s & H1B’s.

Role               : Microsoft Security Engineer
Location        : Louisville, KY
Duration       : 6-12 Months
Experience   : 7+ years

Roles & Responsibility:

  • Candidate should be from Infra background. Good if he has hands on over MDM.
  • Microsoft Security
  • Security Malware protection capabilities like ATP, Anti-Spam, Anti-Phising configuration
  • Advanced information Protection(AIP)Management, such as DLP

Praveen Mahendra
Sr. Technical Recruiter
IDC Technologies.
Ph: 408-868-5126

SAP Security & GRC

Role: SAP Security & GRC
Location: Hillsboro, OR

Primary Skills/Experience SAP Security GRC, Role Design
  • 5+ years, SAP Security & GRC AC-PC Experience (Implementation)
  • In-depth knowledge of SAP authorization concepts for ECC, S/4 HANA, FIORI
  • AP Security, S4/HANA Security, FIORI Security, ECC Security,  All modules
  • SAP modules desired: FI, CO, GL, MM, PM, SD, LE, TM, PP, HR
  • Expert in SAP Security best practice concepts for Role Design
  • Expert Profile Generator and authorizations for role changes
  • Role Management and User Management standard processes
  • Clear understanding of continuous compliance processes and concepts
  • 5+ years’ exp. designing, deploying, supporting SAP security roles/user for large organization
  • 5+ years’ exp. designing, deploying, supporting SAP GRC 10.1 AC or PC
  • Expert on GRC AC SOD reports and SOD remediation role level
  • Issue Resolution: Ability to research, identify, recommend & communicate solutions
  • Hands on GRC AC & PC set-ups including ARA, EAM, ARM, BRM)
  • Expert GRC connectors setups to multiple environments
  • S4/Hana FIORI Tiles, Launch Pad, Transactional apps, Personas
  • BASIS & SolMan & Service Marketplace knowledge nice to have
  • Provide ongoing training of support team of other team members in collaborative environment
  • Expert Documentation and status reporting abilities

Soft Skills – Requirement
  • English Language Proficiency
  • Excellent communication skills both written and verbal is required and ability to interact with a diverse group including subject matter experts, managers/directors, business process owners, role owners
  • Effective time management and organization skills and ability to meet deadlines & communicate results
  • Excellent customer facing skills and communication leadership skills
  • Self-Starter, detail oriented & demonstrated ability to achieve goals & objectives with minimal direction
  • Proficient on MS office suite: Excel, PowerPoint, Word
  • Strong ability to prioritize, adapt to changes efficiently, and work in project life cycles and agile methods
  • Experienced in working with individuals and teams with diverse backgrounds
  • Strong ability to prioritize and adapt to changes efficiently
  • Ability to translate the business vision into technology deliverables
  • Able to perform duties within a team to maximize team effectiveness

Preeti Thakur
Technical recruiter
Contact- 408-457-9381 (ext- 4089)

Tuesday, November 5, 2019

Cyber Physical Intelligence Analyst

Job Title:   Cyber Physical Intelligence Analyst   
Work Location:   Milpitas, CA
Duration: 12+ Months

Research and craft analytic papers and deliver intelligence briefings under short deadlines on various geographical and functional topics
Answer specific customer intelligence questions and requests on particular threats or concerns they encounter
Identify, assess, and track tactics, techniques, and procedures of cyber threat actors
Use knowledge, creativity, and analytic tradecraft best practices to obtain solutions to complex problems
Work independently and collaborate throughout the FireEye organization to develop and coordinate the production of intelligence
Develop OT security subject matter expertise
Stay abreast of new developments pertaining to the OT threat environment.

Yamini Priya |  Trilyon, Inc.
Phone: 408-300-6964 

GRC Consultant

Role: SAP Security GRC Consultant
Location: Carlsbad, CA
Duration: Long Term

Well experienced in SAP GRC configuration.
Experienced on SAP GRC integration to LDAP, MSMP workflow configuration.
Expert in SAP Security fundamentals and handle large user base of 10K users.
Expert on security best practices on ECC 6.0, GRC, Nice to have knowledge on S4HANA.
Experience working in Complex environment, attention to details, process oriented.
Experience in Security testing process.
Good communication skill who can lead the task and drive them to completion
Work with Globle team member and meet project deadline in agile methodology.
Ability to learn and adapt to new technologies s/4 HANA, SAP cloud platform, Fiori technologies
We already have all these system implemented, basic understanding of these concepts and wiliness to learn.

Sachin Srivastava
IDC Technologies Inc
Work: 512-240-6510, Ext – 3271 

Direct: 408-458-7107

Mainframe Consultant

Job details are Shared below:
Job Title:
 Mainframe Consultant
Location: Schaumburg, IL 60159
Job Duration: 12 Months
Type Of Hire: Contract
No: of Positions: 2

Primary Skills: 
COBOL,DB2 and Endeavor ,Eztrieve , CICS and Strong SQL
5+ years of experience in COBOL,DB2  and Endeavor ,Eztrieve , CICS and Strong SQL  
Good communication
Should be able to work independently and willing to work with offshore in the overlap hours.

Kushal Zulzule
Sr. Technical Recruiter
Saicon Consultants, Inc.  
(913) 257-3377 x 157 (Work) URL: 

Friday, November 1, 2019

Incident Response Analyst

Job Title: Cyber Security Incident Response Analyst
Location: Concord, CA
Duration: W2 Contract for 6+ Months

Job Description:
• Monitor incoming event queues for potential security incidents; identify and act on anomalous network activity
• Perform thorough analysis of APT/nation state attack, anomalous network behaviour
• Detailed analysis, documentation, and strong understanding of the attack vectors, persistence mechanisms, and detection avoidance tactics
• Perform proficient forensic analysis using security tools and monitoring systems to Client the source of anomalous security events
• Perform hunting for malicious activity across the network and digital assets
• Perform detailed investigation and response activities to assist in identification, containment, eradication and recovery actions for potential security incidents
• Analyse complex malware analysis through endpoint and network traffic forensics to determine if *** systems are impacted.
• Develop innovative monitoring and detection solutions using *** tools and other skillsets such as scripting
• Work with Security engineering team to analyse SIEM use cases
• Recommend implementation of counter-measures or mitigating controls
• Ensures all pertinent information is obtained to allow for the identification, containment, eradication, and recovery actions to occur in a time sensitive environment
• Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity
• Mentor junior staff in cybersecurity techniques and processes
• Create and continuously improve standard operating procedures used by the SIOC
• Monitor external event sources for security intelligence and actionable incidents
• Establish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the IT organization as well as business units
• Must comply with any regulatory requirements

1. Prior Incident Response experience
2. Memory forensic analysis experience
3. Strong networking skills

Minimum Qualifications
• Bachelor's degree in Computer Science or related field, or equivalent work experience
• 6 years of relevant work experience within security information technology
• Prior experience in Computer Incident Response team(CIRT)/Computer Emergency Response team(CERT), or a Security Operations Center(SOC)
• Extensive experience in network security monitoring, network packet analysis, host and server forensics.

Siva | Recruitment Specialist | (408) 731 6341
Amiseq, Inc. 1551, McCarthy Blvd, Milpitas, CA 95035