Friday, August 21, 2020

IT - Cyber Security Controls Assessor

Role:  IT - Cyber Security Controls Assessor


Location: San Francisco, CA

Duration: 12+ Months


Minimum:

Microsoft Office, Remedy, SharePoint, Security tools
Self-motivated
Able to follow Safety First principles
Results driven and customer focused
Attention to work quality and research driven.
Effective communication to peers and clients.
Able to balance workload and priorities
 Able to balance the priorities of the business and maintain/stay customer focused
Multi-Platform knowledge (UNIX/LINUX, Windows Servers/Desktops, Cisco hardware, etc.)
 Ability to influence and lead behavior change Competency in making sense of complex, high quantity, and sometimes contradictory information to effectively solve problems
Competency in making good and timely decisions that keep the organization moving forward
Competency in developing and delivering multi-mode communications that convey a clear understanding of the unique needs of different audiences
Competency in building partnerships and working collaboratively with others to meet shared objectives
Ability to energizes coworkers to maintain a positive attitude towards the team and the business directions
Strong analytical, critical thinking and decision-making skills
Ability to lead and manage cross-functional compliance projects and initiatives
Ability to guide and direct junior team members


Nitin Gera | 408.503.6915 | nitin.gera@amiseq.com
Amiseq, Inc. 1551, McCarthy Blvd, Milpitas, CA 95035

Friday, August 14, 2020

Security & Risk Analyst

 Job Title: Security & Risk Analyst - II

Location: CA 94404
Job Duration: 6 Months Contract

Primary Skills:
Description: Serves as a resource to other security professionals in their area of expertiseDevelops plans for the future of an area(s) of security, for management reviewLeads the security element on projects that entail moderate risk and implicationsBrings new information on security developments into the organization, includinginformation on new tools, procedures and systemsLeads the investigation of some complex and sensitive security investigationsMay provide input to manager on staff performance relating to technology but doesnot prepare or deliver reviewsIdentifies new developments in IT security administration tools, procedures andsystems available in the marketplace, and makes recommendations to managementDesigns controls / standards with broad implications, requiring systems integration ofone or more technical platforms In-Take Notes: We are looking for someone one with experience with SIEM technology - specifically log collection, aggregation, and correlation in ArcSight. Experience with Windows & Linux and Networking are all required.


Pavan Sharma

Saicon Consultants, Inc.             

(913) 257-3377 x 187 (Work)

(913) 273-0058 (Fax)

URL:  www.saiconinc.com

Email: psharma@saiconinc.biz

Security Engineer

Our client is looking for a top level technical expert in one or more highly specialized areas of applications environment, design and/or programming. Acts independently under general direction. Provides technical leadership on complex integrated projects. Contributes strategic vision and integrates a broad range of ideas regarding applications structure. Recognized across the organization for applications environment expertise and sought as a resource for resolution of unique or complex application problems. Undertakes the most complex applications projects involving multiple disciplines and may impact multiple business units.



RESPONSIBILITIES:
  • Manage technical design of new projects and enhancements to ensure they are compliant with architecture standards, meets the project's capacity and performance needs, and maximize solution re-use.
  • Responsible for delivery of project components.
  • Approve technical approach to solutions development by performing impact analysis for major design options.
  • Provide the authority, leadership, and direction for the resolution of complex integrated technical issues that cannot be adequately resolved at the detailed design stage. This includes serving as an escalation point for software and/or application issues.
  • Mentor junior level staff by assisting to develop their skills and transfer knowledge
  • Assign, review, and direct staff in the conversion of business requirements into technical specifications and/or implementation plans
  • Advise management on project scheduling, technical recommendations, and vendor selections
  • Participates on cross functional teams in technical advisory capacity
  • Accountable for maintaining effective internal controls over the processes and transactions under areas of responsibility including the completeness and accuracy of financial information and transactions, compliance with applicable laws and regulations, and the effectiveness and efficiency of operations


REQUIREMENTS:
 
  • Strong in Java or Python
  • ETL ToolsStrong hands-on experience in Informatica suite of applications
  • Experience working with AWS services – S3, EC2, Glue, EMR, RedShift, RDS and migrating data from on-premise data stores/file systems to Cloud platform would be an added advantage
  • Hands-on experience in SQL, PL/SQL and experience building data integrations involving RDMS databases (Oracle 11/12, DB2, SQL Server), NoSQL (Mongo DB, HBase) databases
  • File based sources (Mainframe COBOL, SAS, HL7, XML, JSON)
  • Expert technical knowledge of all phases of applications systems analysis
  • Expert knowledge of relational database concepts including the normalization of data
  • Expert knowledge of software life cycle
  • Expert knowledge in many technical disciplines that transcend platforms
  • Knowledge of business processes
  • Knowledge of programming languages (Siebel)
  • Strong understanding of object-oriented languages and development methods

Holly Germaine
Recruiter
Contech Systems, Inc.


Direct: (732) 491-8926
Main: 732-632-8818
E-Mail: hgermaine@contech-it.com

Wednesday, August 12, 2020

Security Engineer

 POSITION: Security Engineer

LOCATION: Brooklyn, NY

DURATION: 6+ Months CTH

INTERVIEW TYPE : Phone/Skype to hire

 

Visa: USC/GC

 

Required Knowledge, Skills, and Abilities

 

Candidates should have:

·         strong IT skills and a deep understanding of cyber hacker methodology

·         excellent verbal and written communication skills, interpersonal skills, and analytical skills

·         thorough work ethic and attention to detail

·         skills of perception, critical thinking, and problem-solving aptitude.

 

Rapid7 Nexpose, SPLUNK, PaloAltoFirewalls, NAC - Network Access Control (CISCO ISE, Aruba, Forescout)

Certifications that would be helpful: GCIH/incident inhandlin, GMON /monitoring, GOSCP / offensive security certified professional

Global experience or not daunted by size and complexity

Self-starter, tenacious, resilient

 

Jonas Kevin

Sr US IT Recruiter

Office: +1 609 309 6625

Email-  jonas@techlogixinc.com

Monday, August 10, 2020

Regulatory Reporting Analyst

Client: Union Bank 


Location: Oakland, CA or Remote work 


Title: Regulatory Reporting Analyst 


Duration: 3+ Month contract 


PR: $65/hr on W2  

 


1. Responsible for executing financial regulatory reporting requirements for the FR Y-14Q and FR Y-14M and ensuring completeness and accuracy within the requisite processes and controls. 

2. Partnering closely with business areas in the completion of the report including, Treasury, Risk, Controllers, Technology, and Business line management across multiple entities as part the reporting process. 

3. Develop analytical tools for internal monitoring that include proper controls and work with data providers towards continuous improvement in data quality. 

4. Develop deep understanding of Axiom SL and use available functionality to build synergies. 

5. Utilizing Generally Accepted Accounting Principles (“GAAP”) to preform analytical procedures over income statement, balance sheet accounts, and cash flow statements while focusing on evaluating trends to be in line with expectations and providing variance explanations for anomalies in fluctuations. 

6. Provide enhancements and analytical support as it relates to data collection and submissions and data management including data aggregation, extraction, management, and analysis of large databases from multiple sources utilizing analytic tools. 

7. Actively monitor and implementing new/revised regulatory reporting requirements and socialize the reporting and regulatory data requirements to business partners. 

8. Managing the execution on selected process enhancements and remediation of management-identified issues, including liaising with IT groups to formulate business requirements and system change requests and user acceptance testing. 

9. Maintain proper documentation and procedures as per bank policy manuals. 


If you are interested please do share me your updated word format resume.

Chithra B

chithra.b@collabera.com

T: +1 (973) 798 - 1149

Monday, August 3, 2020

Cyber Threat Intelligence Analyst

Our client, a global leader in financial services technology, is looking for 2 Cyber Threat Security Analysts to work with their teams in Alpharetta, GA and Jersey City, NJ. Due to Covid-19, these roles will start fully remote, but eventually onsite work will be required in those locations. These roles will research and analyze large amounts of structured and unstructured data from many sources, and ideal candidates will have knowledge of intelligence gathering principles, policies, and procedures. 

Paul Andra
Technical Recruiter
O: (470) 228-5060?
E:
 paul.andra@dtglobalstaffing.com

Monday, July 27, 2020

Cyber Security Forensic Analyst

Job Role : Cyber Security Forensic Analyst

Location : Austin, TX

Duration : Contract

 

Job Description:

IBM is seeking a Cyber Security Forensic Analyst professional to work on the Cyber Security Incident Response team (CSIRT) This position requires a strong technical security professional, who will be responsible for conducting highly technical and confidential investigations.  (e.g. data loss, advanced persistent threats, malware analysis etc)  

 

The role will be responsible for conducting forensic investigations and analysis in support of cyber incidents that are reported into the CSIRT team.  This role will require the ability to triage and conduct thorough examinations of all types of digital media within a heterogeneous environment, the ability to determine containment and/or remediation activities that may be required as well as identify potential threats.  Reporting and collaborating with the different areas of Business will be required, as well as providing relevant lesson learned output that can be fed into the IBM threat landscape.

 

Essential Duties and Responsibilities

Conduct examination of digital media (hard drives, network traffic, mobile phones, etc.).

Capture / analyze network traffic for indications of compromise.

Review log-based data, both in raw form and utilizing SIEM or aggregation tools.

Employ best practices and forensically sound principals such as evidence handling and chain of custody.

Perform live network assessments using leading packet capture and analysis software tools.

Establish timelines and patterns of activity based on multiple data sources.

Identify, document and prepare reports on relevant findings.

Utilize varied forensic software such as FTK, Encase, IEF, etc.

Effectively communicate with clients to establish timelines, manage expectations, and report findings.

 

Required Knowledge, Skills and Abilities

Demonstrated computer forensic investigations experience.

Expert-level knowledge of common attack vectors and penetration techniques.

Solid working knowledge of networking technology and tools, firewalls, proxies, IDS/IPS, encryption.

Demonstrated knowledge of forensic tools such as Encase, FTK, Axiom, Black Bag, SIFT.

Experience with malware analysis (reverse engineering).

Excellent technical writing and presentation skills.

Excellent general writing skills in presenting information in a non-technical manner; Business Case construction, Proposals, and Plans.

Ability to successfully lead and facilitate information gathering meetings with client senior-level employees.

Event analysis and correlation.

Experience managing large and small scale cyber security incidents.

Ability to coach and training junior level analysts in industry best practices and methodologies.

An ability to understand and correlate strategic decisions/methodologies into their practical application at an operational level.

Demonstrated understanding of database structures and SQl

Experience with Linux operating systems

 

Required:

At least 5 years of experience in IT Security Digital Forensics

At least 2 years of experience in Incident Response in a global corporate enterprise

 

Preferred:

Certified in EnCE, CFCE, CCE, DFCP, GCIA, GCIH, GREM, CSIH

Strong understanding of networking protocols.

Experience in fast-paced investigations. 

Experience with programming or scripting languages.

Familiar with Q-Rader SIEM tool is a plus

Demonstrated system administration skills.

Ability to present highly technical information to non-technical audiences.

 

Technical Recruiter

IDC Technologies.

Ph: 408-903-4154

Email: sami.uddin@idctechnologies.com

Friday, July 24, 2020

Forensic Investigator

Our client, a global financial services technology company, is looking for a Forensic Investigator/Information Security Analyst for a long-term contract role. This role will work remotely to start due to Covid-19, but eventually would need to work onsite at their Alpharetta GA or Jersey City NJ locations. Ideal candidates will have at least 3 years of experience with IT forensics, Windows Forensics/Registry, understanding of mainframe logs, digital traffic flows, etc. 

Sarah Dash

(470) 241-1420

Security Engineer

Job Title: Security Engineer

Location: San Antonio, TX

 

Job Description:

  • Cybersecurity - End point Security, Data Loss Prevention, Cloud Security, Devops, Elastic Search (preferred) , Logstash, Kibana, Kafka ,Git and Docker Containers.
  • Proficiency in Python, Java REST development , Power Shell , Linux/Unix, GitHub
  • AWS , GCP and Azure.
  • Docker, Kubernetes.
  • Independent and good communication skills.

Rahul Sharma |Team Lead

a: IDC Technologies Inc. | 920 Hillview  Court, Suite 250 |95035 Milpitas, CA

e: rahul.sharma5@idctechnologies.com | p: 716-988-1225

Hangout mail id: usitteamlead2019@gmail.com

Friday, July 17, 2020

Security & Risk Analyst

Job Title: Security & Risk Analyst - II
Location: Foster city, CA 94404
Job Duration: 6 Months


Description: 

Serves as a resource to other security professionals in their area of expertiseDevelops plans for the future of an area(s) of security, for management reviewLeads the security element on projects that entail moderate risk and implicationsBrings new information on security developments into the organization, includinginformation on new tools, procedures and systemsLeads the investigation of some complex and sensitive security investigationsMay provide input to manager on staff performance relating to technology but doesnot prepare or deliver reviewsIdentifies new developments in IT security administration tools, procedures andsystems available in the marketplace, and makes recommendations to managementDesigns controls / standards with broad implications, requiring systems integration ofone or more technical platforms In-Take Notes: We are looking for someone one with experience with SIEM technology - specifically log collection, aggregation, and correlation in ArcSight. Experience with Windows & Linux and Networking are all required.


Pavan Sharma

Saicon Consultants, Inc.             

(913) 257-3377 x 187 (Work)

(913) 273-0058 (Fax)

URL:  www.saiconinc.com

Email: psharma@saiconinc.biz

Tuesday, July 14, 2020

Incident Response Engineer

Best Rate: $73.59/hr on W2 + Benefits.

 

Roles & Responsibilities

Must demonstrate expert knowledge in Incident Response and one or more of the following areas:

Threat Hunting, Digital Forensics, Monitoring and Detection, Cyber Intelligence Analysis, Data Loss Prevention

 

Core Job Functions Include:

 

•             Investigations -Investigating computer and information security incidents to determine extent of compromise to information and automated information systems, must be familiar with notable event triage, Host Forensics, Network Analysis.

•             Escalations- Responding to escalated notable events from security tooling to develop/execute security controls, Defense/countermeasures to prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems.

•             Research - Researching attempted or successful efforts to compromise systems security and designs countermeasures.Stay educated on latest trends, techniques, tactics and procedures.

•             Communications -Provides information and updates to shift leads, creates pass-downs for the next shift, works closely with supporting teams, provides feedback for new security policy and standards, and engages with other teams.

•             Digital Forensics- As it relates to information systems, performs HR investigations and legal holds in a forensically sound manner. Consults with HR and legal subject matter experts to adhere to local country laws.Must be willing and able to perform shift work, weekends, and holidays as well as participate in a rotating shift consisting of four (4) 10 hour shifts with four days on, three (3) days off and rotations across Day, Swing, and Graveyard shifts as needed.

 

To be successful in this position, you should be proficient with:

•             Incident Response – Getting people to do the right thing in the middle of an investigation.

•             Offensive Techniques - Penetration testing, IOCs, and exploits at all layers of the stack. Need to be very familiar with real world scenarios and current attacker behavior.

•             Logs - you should be very comfortable with a SEIM to be able to gather and analyze logs to recreate incidents and hunt for threats. Should have experience developing and tuning detection logic.

•             System Forensics -Understanding of image acquisition techniques, memory forensics, host forensics.

•             Networking Fundamentals -TCP/IP Protocols and associated analysis tools eg. Wireshark/TCPDump.

•             Scripting -Should be familiar in scripting in at least one of the following: BASH, Python, Perl or a similar language.

•             Risk Analysis -Taking an event in a particular environment and understanding the practical associated risk is a critical part of our jobs.

•             Automation -Creating and/or modifying scripts to automate repetitive and mundane tasks, freeing up time to focus on advanced investigations and other projects.

•             Enterprise Security-Should be familiar with enterprise security issues, working at scale.

 

Qualifications:

Minimum five (5) years of professional experience in incident detection and response, malware analysis, digital forensics.

 

If you are interested, please do send me your most updated resume and let me know the best time and number to reach you.

 

Souptik Dasgupta

Principal Recruiter | K2 Nest

phone:  +1-(415)-287-1931

email:  souptik@k2nest.com

Monday, July 13, 2020

Security Engineer

Role :- Security Engineer
Location: San Bruno, CA
Contract: 6 months

 

Requirements:

6 +years’ experience securing ecommerce applications or mobile software.
Current CISSP certification (Certified Information Systems Security Professional)
Experience with DNS, CDNs, load balancing, APIs.
Experience with Go, Java, Python, Ruby, or another server-side programming language.
Writing and maintaining secure SQL queries.
Linux
E-commerce experience
Experience with Go(golang) is highly preferred!!
Experience with Salt, Chef, Puppet or other configuration management tools is desired

 

Ajay Kumar | Sr. Technical Recruiter | IDC Technologies Inc. |
Work#: (669) 209-1567
Mailto: Ajay.Kumar@idctechnologies.com

Thursday, July 9, 2020

Application Security Tester

Job Title:-Application Security Tester

Job Location;- Bellevue WA

Long term Contract

 



Required:-

- Extensive experience developing in Java Python JavaScript i.e. NodeJS AngularJS TypeScript variants i.e. Angular 2 and common scripting languages i.e. Bash .
- Deep experience working with XML and web services including SOAP and REST.
- Thorough understanding of coding concepts such as authentication mechanisms data serialization.
- Thorough understanding of application architectures such as n tier client and server API Postman microservices etc.
- Performs static dynamic code testing manual code inspection threat modeling design reviews and penetration testing of internal web applications and external partner applications to identify vulnerabilities and security defects.
- Supports the implementation and enforcement of secure design principles according to policies standards and patterns of Information Security.
- Provide subject matter expertise and mentorship on architecture authentication and system security.
- Develops and implement manual and automated web application security testing of web applications to enforce security standards.
- Functional API Testing with Postman Newman and BlazeMeter
- Works with security product vendors and service providers to evaluate their security offerings.
- Must be familiar with the below Tool sets
- Fortify Web Inspect Expertise Advanced must be able to automate where possible
- Nessus
- Nmap
- Veracode
- Burp Suite
- ZED attack proxy
- SCAP
- Threat Modeling e.g. STRIDE
- Must be very well versed with OWASP Top 10 vulnerabilities and must demonstrate to exploit such vulnerabilities in mobile web and console applications.
- Understanding of both application and network layer security considerations and how to fix them such as buffer overflow ToC vs. ToU input validation encapsulation insecure protocols MITM attacks SQLi etc.
- Ability to work well both independently as well as within a team.
- Excellent verbal written and interpersonal communications skills.
- Ability to handle several tasks be organized make decisions and work efficiently effectively under deadlines.

Qualifications

- Bachelor of Science with 3 years of experience in cybersecurity

 

 Sandip Kumar

Noralogic Inc.

109 East 17th St, Cheyenne WY 82001

Call: 307-316-7223,964-393-6389

Email: sandipkumar@noralogic.com

Wednesday, July 8, 2020

Cyber Security Analyst

Job Title: IT Security Analyst 3

Start Date: 06/23/20

Location: Dimondale, MI

End Date: 06/23/21

 

Monitor and advise on information security issues related to the systems and workflow at an agency to ensure the internal IT security controls for an agency are appropriate and operating as intended.

 

Member of the Michigan Security Operations Center (MiSOC) and will focus on Engineering supporting the following functional areas:

 

  • Vulnerability Management
  • Incident Response
  • Forensics
  • Security Operations
  • Threat Analytics
  • Configure, troubleshoot, upgrade and support security infrastructure devices
  • Support various security platforms, including but not limited to: Vulnerability Management platform (Tenable); Security Incident Event Management (SIEM) platform (IBM s QRadar); Content Filtering (WebSense); and various Symantec security platforms.
  • Identify and define system security requirements
  • Design computer security architecture and develop detailed cyber security designs
  • Prepare and document standard operating procedures and protocols
  • Engineer, implement and monitor security measures for the protection of computer systems, networks and information
  • Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
  • Ensure that the company knows as much as possible, as quickly as possible about security incidents
  • Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement


Inderpal Singh

IDC Technologies Inc.

4089630818

Monday, July 6, 2020

Information Security Engineer

Job Title : Information Security Engineer

Location : Media, PA

Duration : 6  Months contract

 

Job Summary: 

In consultation with the Information Security, Development and Infrastructure teams, the Security Engineer Contractor will help integrate information security requirements and controls as captured in security policies, standards and best practices into current and future architectures and designs. The Security Engineer will help in detecting and addressing (reactively and proactively) risks and vulnerabilities in Customer’s IT landscape. Play a key role in driving the evolution of Customer’s technical architectures and IT operations and ensure that security controls are embedded throughout future designs and plans.

 

Principal Duties:

1.      Engineer and implement security measures for the protection of computer systems, networks and information.

2.      Maintain awareness of information security policies, standards and requirements.  Stay current on information security trends and risks.

3.      Drive identification and definition of system security requirements.

4.      Develop and document cloud, automation, and API security requirements.

5.      Analyze, design, develop, and continually evolve modern software-defined infrastructure and application patterns.

6.      Analyze cloud architecture and application vulnerabilities using cloud-native tools.

7.      Continuously evaluate the organization's existing cloud infrastructure security practices and help to define, standardize and measure security-related activities.

8.      Support cloud certification activities such as system hardening, vulnerability testing and scanning.

9.      Work closely with development, infrastructure and information security teams in an agile workflow to promote and mature DevOps methodologies.

10.  Design computer security architecture and develop detailed cyber security designs (network, applications, software development, operating system, virtualization, cloud, automation, etc) with input from various stakeholders (Information Security, IT, etc) while working in a hybrid cloud/traditional data center environment.

11.  Prepare and document designs, architectures, configuration standards, standard operating procedures and protocols.

12.  Act as an advisor to internal teams enabling them to build and design products securely and efficiently.

13.  Develop technical solutions to help mitigate security vulnerabilities and automate repeatable tasks to reduce the risk of fraud, abuse and misuse.

14.  Communicate technical application security concepts to employees, including developers, architects, and managers.

15.  Assess the security posture, develop risk profiles, specify security requirements, and identify mitigation measures to safeguard public facing Web applications.

16.  Streamline usage of security technologies in a dynamic environment through automation and orchestration platforms.

 

Essential Functions:

1.      Ability to work well individually as well as in a team environment

2.      Excellent oral and written communication skills, including documentation skills specifically with the drafting and updating of process and procedures.

3.      Excellent customer service and interpersonal skills

4.      Ability to work with little or no supervision

5.      Detail oriented and strong organizational skills

6.      Strong analytical and problem-solving skills

7.      Ability to handle multiple projects simultaneously and independently

8.      Proven self-starter with demonstrated ability to make decisions

9.      Ability to learn new technologies quickly and independently

 

Basic Qualifications:

1.      Bachelor’s degree in Information Technology or a technical discipline (e.g., engineering) preferred, or technical certifications, or related experience

2.      Certified in one or more of the following preferred: CISSP, CISA, CISM, CEH, technology specific (proxy, data loss prevention, firewall, etc).

3.      Minimum of 7+ years working in Information Technology Security.

4.      Working knowledge of information security concepts and technologies such as: least privilege, networking, network segmentation, firewalls, IPS\IDS, network analyzers, encryption technologies, proxies, etc.

5.      Proven work experience as a system engineer or system security engineer

6.      Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocols

7.      Cloud security (AWS - Azure) architecture, environment, and WAF experience

8.      Experience with container management and containerization technology.

9.      Experience on Authentication, Single Sign-On Infrastructure (AD, Azure AD, VDS, Ping Federate); Experience implementing multi-factor authentication, single sign-on, identity management or related technologies

10.  Extensive experience on authentication and authorization strategies using SAML/OpenID/OAuth;

11.  Extensive experience in usage related Identity & Access Management & defining standards around data at & data in transit - encryption, authorization, authentication, and security mechanisms, especially the foundational elements of the Public Key Infrastructure.

12.  Experience in building and maintaining security controls

13.  Detailed technical knowledge of application, network, database and operating system security

14.  Hands on experience in security systems, controls and concepts

15.  Experience with network security and networking technologies

16.  Working knowledge of sub netting, DNS, encryption technologies and standards, VPNs, VLANs, VoIP and other network routing methods

17.  Network and web related protocols (TCP/IP, UDP, IPSEC, HTTP, HTTPS, routing protocols, etc.)

18.  Advanced Persistent Threats (APT), phishing and social engineering, network access controllers (NAC), gateway anti-malware and enhanced authentication

19.  Thorough understanding of the latest security principles, techniques, and protocols

 

 Abhishek Singh                         

IDC Technologies, Inc

Mail to : abhishek.singh@idctechnologies.com

Phone: 408-648-2523

Senior ATG Developer

Job Title: Backend Engineer (ATG/Java)
Location: Sunnyvale, CA
Duration: 12 Months
 
Minimum Qualifications
Bachelor's Degree in Computer Science or related field and 6 years' experience building scalable e-commerce applications
ATG is mandatory
• 5+ years of experience with building scalable, high performing and robust Java applications
• Experience with big data methodologies involving Hive/Hadoop/ Spark;
• Experience with Hadoop workflow management using Azkaban, Oozie, Hamake or Cascading
• Hadoop stream processing using Storm/Spark
• Experience with no-sql technologies like Cassandra, couchbase, Flume or Hbase.
• Advanced scripting skills in at least one of the following: Python or Shell and willingness to learn new technologies
• Experience with Eclipse or other IDE development tools
• Experience with Continuous Integration and related tools (i.e. Jenkins, Hudson, Maven)
• Experience with Code Quality Governance related tools (Sonar, Gerrit, PMD, FindBugs, Checkstyle, Emma, Cobertura, etc)
• Experience with Source Code Management Tools (Github)
• Knowledge of standard tools for optimizing and testing code
• Ability to operate effectively and independently in a dynamic, fluid environment
Additional Preferred Qualifications
• Experience developing using J2EE technologies such as Servlet/JSP/Filters, JNDI, JDBC, JMS, JMX, RMI, Java Web Services or related skill
• Experience with Eclipse or other IDE development tools
• Experience developing with web/app containers such as Apache/Tomcat, Nginx
• Experience developing using relational databases such as Oracle or MySQL
 
 
Siva | Recruitment Specialist | (408) 731 6341
Amiseq, Inc. 1551, McCarthy Blvd, Milpitas, CA 95035