Monday, April 27, 2020

Jr. Business Analyst

Title: Jr. Business Analyst / Workflow Implementation Specialist
Location: San Jose, CA
Note : You can work remotely till Corona Virus(COVID 19) situation is in control after that you have to be onsite.
 
Qualifications:
Degree in Computer Science or related technical field or equivalent practical experience
Coding experience with a general purpose programming language (e.g. Java, C/C++, Python)
Familiarity with basic data structures, type changes
Experience in creating Flow diagram / Decision Tree, taking a requirement from the client and transforming them into flow diagrams).
Ability to learn new tools.
Ability to understand API output and correctly include in the flow logic.
Experience working on technical projects and strong track record of solving complex problems
Excellent analytical skills solving complex issues / problems
Ability to handle multiple requests in a challenging environment
Excellent written and verbal communication skills, with a track record of handling multiple Stakeholders and streams of work.
Preferred Qualifications
Background on Connect Composer, implementing the logical flow as requested and depicted in the diagram.

Details of the role :
·         This is a 12+ month contact position with tech Giant.
·         Onsite role.
·         The work location address is : San Jose, CA - Onsite role - Onsite role
·         Client also have free food facility for the contractors.
·         There are 2 rounds of interview  - Google hangout video interview.
·         If you are offered this role, you will join within 2 weeks of the extension of an offer – Client on boards only on Mondays
·         Regular work hours – no night shifts.
 

Anil Chamoli | Sr. Technical Recruiter 
Artech Information Systems 
Cell: 973 922 1844
Mailanil.chamoli@artech.com

Tuesday, April 14, 2020

Cyber Security Solution Architect

Job Title: Cyber Security Solution Architect
Location: San Francisco, CA
Duration: 12 Months Contract with high possibility of extension


Job Description:
Minimum: Six years in IT including experience in solution architecture and project implementation experience. B.S. degree or equivalent work experience in computer science, computer engineering, business administration, or related field; or equivalent experience. Desired: At least one relevant certification such as Certified Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM), Certified in Risk and Information Systems Control (CRISC), Certified Information Systems Auditor (CISA), or equivalent Exposure to and basic understanding of solution architecture discipline, processes, concepts and best practices. Experience with operational support for applications, systems, or infrastructure. Demonstrated knowledge of technological trends and developments in cybersecurity. Knowledge of cybersecurity technologies and products deploying those technologies. Knowledge of regulatory requirements (including but not limited to HIPAA, SOX, NERC-CIP, TSA, CCPA, other privacy legislation). Experience providing direction to design and engineering staff.

Responsibilities:
Position Summary As a Cybersecurity Solutions Architect in the Cybersecurity Architecture team, you will be responsible for the development and implementation of repeatable and practical solutions to support the secure design and delivery of technology platforms to protect our client against cyberattacks. In this position, you will be particularly responsible for the architecture and design of interoperable platforms to implement effective security controls and to meet compliance requirements. Some solutions will also support physical security requirements. You will be expected to lead technology integration efforts for cybersecurity platforms and solutions, and to work with information and operational technology leaders to ensure that controls against cyberattacks are built into solutions and major initiatives. You will be expected to ensure that security requirements are met in an efficient, sustainable, adaptable, and reusable manner. You will be collaborating with multiple teams, both within the Security department and with other our client lines of business. Job Responsibilities Your roles and responsibilities will broadly encompass solution architecture and design as well as solution integration. Strategy and tactics are complementary and equally important, with both top-down and bottom-up analysis required depending upon individual circumstances. You will be exposed to all levels of architecture and design in this role. Solution Architecture and Design You will leverage your application and network expertise to provide cybersecurity solution engineering and oversight through the deployment lifecycle for security solutions. You will actively engage with IT and LOB network and systems engineering teams to ensure that security best practices are incorporated into deployed platforms. You will identify deficiencies in existing design patterns and propose new design patterns based on the realities of the our client environment. You will engage with risk consultants to ensure that solutions will mitigate cyberattack risks. Solution Integration You will ensure that deployed solutions meet our client security standards. You will develop solution blueprints for projects and initiatives. You will create and update technical infrastructure specifications and build documentation for projects and initiatives. You will determine requirements for each stage of testing during the project lifecycle. You will create a service introduction plan for each project that you support. You will Interact with Cybersecurity Services (engineering team) to determine project deployment plans. You will participate in processes to govern the introduction and lifecycle of security technologies. To be successful in this role, you will need to demonstrate the following skills and attributes: Foremost, a collaborative and mutually supportive attitude with architecture team members. Collaboration with stakeholders such as Cybersecurity Services (platform operations), the Security Information and Operations Center, and the Cloud Center of Excellence. Flexibility within numerous changing situations, working with individuals and groups. The ability to change ideas or perceptions in response to changing circumstances. Focus on customer service with the attitude of delivering excellent outcomes. Thinking strategically and tactically about business, product, and technical challenges. Courage to speak up to identify gaps and problems. Comfort with ambiguity and large, complex technology environments. Ability to prioritize, multi-task, and plan around deadlines. Striking the right balance between operating independently and following established standards and procedures. Effective analysis and problem-solving skills, often under deadline pressure. Effective and polished verbal and written communication. Commitment to quality design and implementation.

 
 
Siva | Recruitment Specialist 
(408) 503-6898
Amiseq, Inc. | 1551, McCarthy Blvd, Milpitas, CA 95035

Java Developer

Java Developer
Location - Plano, Texas
Position - Full-time
 
NO SPONSORSHIP

Remote Work Available till National Emergency Gets Revoke

Job Description 


Looking for Experinced Java Developer with min 2 years experience.
Excellent with Spring boot

 
Akhil Shah
Technical Recruiter
Enterprise Solutions Inc

Monday, April 13, 2020

Security Engineer

Job Title: Security Engineer
Location: Bellevue, Washington
Duration: 6-12 Months

Remote till COVID 19

Phone Hire

Job Description:

o Experience in IT/Eng/Security/Risk/Infrastructure teams preferred
o Interested in Cyber Security Analytics
o Familiarity with Analytics principles and tools
o Desire to be a key player on a growing team
o Self-driven, organized, and consistent in delivery (can work remote effectively)
o Willingness to learn
o Excellent communicator
o Technical documentation experience preferred
o Creative and thinks outside the box (knows when to ask the tough questions)
o Analytical, technical, and comfortable with large data sets and complex problems
o Familiarity with T-Mobile helpful
o Kind and selfless team player (meets T-Mobile’s ethos and competencies)
o Desire to work in a fast paced agile software development environment


Ashish Verma
IDC Technologies Inc
Work: 408-650-6283

Mailto: ashish.v@idctechnologies.com

Information Assurance/Security Engineer III

Security Engineer - Threat Management Team

No Security Clearance Required
US Citizen or Green Card Required
Must be onsite San Diego, CA
Perspecta will pay one rate for all hours worked.
The Security Engineer will operate out of Perspecta’s Rancho Bernardo, California office, reporting to the Director of Cyber Security Operations. This position plays a key role in the success of the Cyber Security Group. The person in this role will be responsible for various aspects related to the day-to-day operations of the Cyber Security Group. These will include coordination with various matrix’d teams within the corporation and supporting vendors, as well as operation and maintenance of various capabilities that encompass the security services that support our customers. The person in this role will also assist internal Perspecta Teams in driving client success by delivering Security and Threat Intelligence services, best practices, and continuous improvement

PREFERRED CERTIFICATION(s) CISSP, CISA, CISM, GIAC*, Security +

EDUCATION / EXPERIENCE: Bachelor’s degree or six years of hand-on verifiable operational experience with increasing responsibility in an Security, Compliance, Audit, Risk, Threat Intelligence, Web Services Security or Identity Management role. 
Akash Goswami
InfiCare Technologies| 22375 Broderick Drive #225 Dulles VA 20166 |
703-652-7764 Direct | akash.g@infiCareTech.com
www.infiCareTech.com

Thursday, April 9, 2020

Core Java

Job Title: Core Java
Job Location: San Francisco, CA
Job Duration: 12 Months(Remote work)

Primary Skill- Core Java

Job Description:
·         10+ years overall experience in relevant industries and positions
·         Deep understanding of building framework/libraries/tools/component/ connector
·         Deep understanding of a micro services architecture, including professional experience in the design
·         Build, and operations of micro services in a production environment
·         Experience designing REST APIs and implementing RESTful web services
·         Understanding of SOAP web services
·         Experience in designing data persistence system using both SQL and NoSQL
·         Technologies Stack
·         Java 8
·         Multithreaded development
·         Spring Framework
·         Spring Boot
·         Netflix OSS
·         Gradle
·         Unix
·         Github
·         12 Factor principles
·         Understanding of Platform as a Service
·         CI/CD
·         Kafka/ RabbitMQ / MQ
·         Postman
·         JSON 


Technical Recruiter
Saicon Consultants, Inc.
(913) 738-0266

Wednesday, April 8, 2020

Senior SOC Cyber Security Analysts

We have an immediate need for TWO (2) Senior SOC Cyber Security Analysts for (REMOTE) work-from-home, contract-to-hire position.
The senior Managed SOC Analyst’s primary function is to provide managed security operations center (SOC) analysis associated with customer monitoring activities through the processing and management of incident and request tickets, as they are assigned. Deeper dives into threat hunting are also in scope. The responsibilities include receiving and managing escalations from other Analysts, customers, and other internal groups, as well as managing the full incident handling lifecycle with customers. The analyst is expected to contribute to internal documentation and adherence to SLA targets and requirements. The role includes forensic log root cause analysis and interfacing with clients and associates as needed to resolve complex cases. Senor Analysts are expected to participate in and contribute to planning and implementation of strategic and operational projects in efforts to achieve overall MSS goals. Senior analysts are expected to be able to troubleshoot complex problems with little oversight, take ownership and work independently as needed to resolve customer issues.
Qualifications:
  • 2-3 years of Managed Security Service Provider (preferred)
  • 3-4 years of SOC or NOSC analyst experience
  • Threat Intelligence or Forensic background is a plus
  • Must be U.S. citizen and bachelor’s degree in Computer Information Systems or related field
  • 5+ years of Information Security experience
  • Working experience with integration with different security systems and devices
  • Familiarization with a variety of information and network security monitoring tools (ArcSight SIEM, QRadar SIEM, Splunk, Arbor DDoS Mitigation, Cisco IDS/IPS, Netcool, and Imperva WAF, among others)
  • Preferred Certification in one or more of the followings: Certified Information Systems Security Professional (CISSP), ISSEP, SSCP, CompTIA Security+, Certified Ethical Hacker (CEH), Certified Security Analyst (ECSA, Certified Incident Handler (ECIH), CompTIA Cybersecurity Analyst (CSA+), etc.

Caroline Cagle
Recruiter
Comcentric Inc.
(980) 621-4320
caroline.cagle@comcentric.com 

Monday, April 6, 2020

Security Engineer Tier 3

Job Title: Security Engineer Tier 3
Duration: Long-term
Location: Austin, TX (Remote till COVID 19)
Phone Hire

Job Description
The preferred candidate will have a total of 10 years' experience in the Information Technology/ Information Security industry, with minimum of 5 years of experience as a Security Engineer configuring and maintaining Network Security technologies.

This is an engineer role and the candidate must be able to demonstrate ability to install, manage and maintain Firewalls in both on-premise and cloud environments.  Demonstrated experience in supporting CISCO Firewalls as an engineer is REQUIRED.   Holding one or more CISCO Security Certifications is REQUIRED. Holding one or more vendor-neutral security certifications (e.g., Security +, CISM, CISSP) is a plus for this position.

Selected candidates must be US Citizens, pass a CJIS background check process, and complete basic safety and security training to meet the customer requirements.
Responsibilities
·        Provision firewalls for customer.
·        Perform Changes to Firewalls as specified by customers.
·        Develop and maintain rule sets for firewalls.
·        Help determine tactics, techniques, and procedures (TTPs) for firewalls.
·        Recommend computing environment vulnerability corrections.
·        Vendor certifications such as CCNP or Fortinet Network Security Expert Level 4 or better are desirable.
·        Other industry certifications such as CISSP, GCIH, CEH, etc. are a plus.
·        Ability to configure, deploy, and troubleshoot Cisco and Fortigate Firewall Platforms
·        Ability to configure, deploy, and troubleshoot Imperva and Fortigate Web Application Firewall Platforms
·        Under limited supervision support and engineering of the WAF and Firewall policies
·        Engineer and Architect solutions using WAFs, firewalls or other security products. Develops and maintains WAF and firewall security design documentation.
·        Work with internal delivery teams to integrate applications with WAF policies
·        Provide accurate and timely reporting on all project deliverables
·        Recommends secure and effective solutions for system/application development in compliance with Information
·        Ability to analyse firewall configurations and rule sets.
·        Working knowledge of VMWare NSX or Fortigate VMX
·        Working knowledge of McAfee SIEM/Security Suite knowledge preferred
·        Working knowledge of Windows Active Directory Domains
·        Working Knowledge of various Linux OS
·        Strong Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
·        Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).
·        Knowledge of computer networking concepts and protocols, and network security methodologies.
·        Knowledge of cybersecurity and privacy principles.
·        Knowledge of cyber threats and vulnerabilities.
·        Knowledge of encryption algorithms, cryptography, and cryptographic key management concepts.
·        Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).
·        Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
·        Knowledge of incident response and handling methodologies.
·        Knowledge of network traffic analysis methods.
·        Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
·        Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
·        Knowledge of key concepts in security management (e.g., Release Management, Patch Management).
·        Knowledge of security system design tools, methods, and techniques.
·        Knowledge of what constitutes a network attack and its relationship to both threats and vulnerabilities.
·        Knowledge of defense-in-depth principles and network security architecture.
·        Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).
·        Knowledge of the common attack vectors on the application layer.
·        Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
·        Knowledge of cyber attackers (e.g., script kiddies, insider threat, nation/non-nation state sponsored).
·        Knowledge of system administration, network, and operating system hardening techniques.


Ashish Verma
IDC Technologies Inc
Work: 408-650-6283
Mailto: ashish.v@idctechnologies.com

Saturday, April 4, 2020

Data Privacy and Security

Position Type:                   Data Privacy and Security 
Duration:                           Long Term 
Location:                           Tempe, AZ  

Job Duties/Responsibilities:
15 years of experience with a minimum of 6-7 years of experience in Data Privacy and Security
AWS Cloud implementation background is a Value ADD
Excellent communication skills

Yashpal Thakur
yashpal.t@shimento.net
Shimento Inc.
1700 N Broadway # 300 Walnut Creek, CA 94596
(D) 424-285-5620 (Yashpal.t@shimento.net)
www.Shimento.com