Monday, July 27, 2020

Cyber Security Forensic Analyst

Job Role : Cyber Security Forensic Analyst

Location : Austin, TX

Duration : Contract


Job Description:

IBM is seeking a Cyber Security Forensic Analyst professional to work on the Cyber Security Incident Response team (CSIRT) This position requires a strong technical security professional, who will be responsible for conducting highly technical and confidential investigations.  (e.g. data loss, advanced persistent threats, malware analysis etc)  


The role will be responsible for conducting forensic investigations and analysis in support of cyber incidents that are reported into the CSIRT team.  This role will require the ability to triage and conduct thorough examinations of all types of digital media within a heterogeneous environment, the ability to determine containment and/or remediation activities that may be required as well as identify potential threats.  Reporting and collaborating with the different areas of Business will be required, as well as providing relevant lesson learned output that can be fed into the IBM threat landscape.


Essential Duties and Responsibilities

Conduct examination of digital media (hard drives, network traffic, mobile phones, etc.).

Capture / analyze network traffic for indications of compromise.

Review log-based data, both in raw form and utilizing SIEM or aggregation tools.

Employ best practices and forensically sound principals such as evidence handling and chain of custody.

Perform live network assessments using leading packet capture and analysis software tools.

Establish timelines and patterns of activity based on multiple data sources.

Identify, document and prepare reports on relevant findings.

Utilize varied forensic software such as FTK, Encase, IEF, etc.

Effectively communicate with clients to establish timelines, manage expectations, and report findings.


Required Knowledge, Skills and Abilities

Demonstrated computer forensic investigations experience.

Expert-level knowledge of common attack vectors and penetration techniques.

Solid working knowledge of networking technology and tools, firewalls, proxies, IDS/IPS, encryption.

Demonstrated knowledge of forensic tools such as Encase, FTK, Axiom, Black Bag, SIFT.

Experience with malware analysis (reverse engineering).

Excellent technical writing and presentation skills.

Excellent general writing skills in presenting information in a non-technical manner; Business Case construction, Proposals, and Plans.

Ability to successfully lead and facilitate information gathering meetings with client senior-level employees.

Event analysis and correlation.

Experience managing large and small scale cyber security incidents.

Ability to coach and training junior level analysts in industry best practices and methodologies.

An ability to understand and correlate strategic decisions/methodologies into their practical application at an operational level.

Demonstrated understanding of database structures and SQl

Experience with Linux operating systems



At least 5 years of experience in IT Security Digital Forensics

At least 2 years of experience in Incident Response in a global corporate enterprise




Strong understanding of networking protocols.

Experience in fast-paced investigations. 

Experience with programming or scripting languages.

Familiar with Q-Rader SIEM tool is a plus

Demonstrated system administration skills.

Ability to present highly technical information to non-technical audiences.


Technical Recruiter

IDC Technologies.

Ph: 408-903-4154


Friday, July 24, 2020

Forensic Investigator

Our client, a global financial services technology company, is looking for a Forensic Investigator/Information Security Analyst for a long-term contract role. This role will work remotely to start due to Covid-19, but eventually would need to work onsite at their Alpharetta GA or Jersey City NJ locations. Ideal candidates will have at least 3 years of experience with IT forensics, Windows Forensics/Registry, understanding of mainframe logs, digital traffic flows, etc. 

Sarah Dash

(470) 241-1420

Security Engineer

Job Title: Security Engineer

Location: San Antonio, TX


Job Description:

  • Cybersecurity - End point Security, Data Loss Prevention, Cloud Security, Devops, Elastic Search (preferred) , Logstash, Kibana, Kafka ,Git and Docker Containers.
  • Proficiency in Python, Java REST development , Power Shell , Linux/Unix, GitHub
  • AWS , GCP and Azure.
  • Docker, Kubernetes.
  • Independent and good communication skills.

Rahul Sharma |Team Lead

a: IDC Technologies Inc. | 920 Hillview  Court, Suite 250 |95035 Milpitas, CA

e: | p: 716-988-1225

Hangout mail id:

Friday, July 17, 2020

Security & Risk Analyst

Job Title: Security & Risk Analyst - II
Location: Foster city, CA 94404
Job Duration: 6 Months


Serves as a resource to other security professionals in their area of expertiseDevelops plans for the future of an area(s) of security, for management reviewLeads the security element on projects that entail moderate risk and implicationsBrings new information on security developments into the organization, includinginformation on new tools, procedures and systemsLeads the investigation of some complex and sensitive security investigationsMay provide input to manager on staff performance relating to technology but doesnot prepare or deliver reviewsIdentifies new developments in IT security administration tools, procedures andsystems available in the marketplace, and makes recommendations to managementDesigns controls / standards with broad implications, requiring systems integration ofone or more technical platforms In-Take Notes: We are looking for someone one with experience with SIEM technology - specifically log collection, aggregation, and correlation in ArcSight. Experience with Windows & Linux and Networking are all required.

Pavan Sharma

Saicon Consultants, Inc.             

(913) 257-3377 x 187 (Work)

(913) 273-0058 (Fax)



Tuesday, July 14, 2020

Incident Response Engineer

Best Rate: $73.59/hr on W2 + Benefits.


Roles & Responsibilities

Must demonstrate expert knowledge in Incident Response and one or more of the following areas:

Threat Hunting, Digital Forensics, Monitoring and Detection, Cyber Intelligence Analysis, Data Loss Prevention


Core Job Functions Include:


•             Investigations -Investigating computer and information security incidents to determine extent of compromise to information and automated information systems, must be familiar with notable event triage, Host Forensics, Network Analysis.

•             Escalations- Responding to escalated notable events from security tooling to develop/execute security controls, Defense/countermeasures to prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems.

•             Research - Researching attempted or successful efforts to compromise systems security and designs countermeasures.Stay educated on latest trends, techniques, tactics and procedures.

•             Communications -Provides information and updates to shift leads, creates pass-downs for the next shift, works closely with supporting teams, provides feedback for new security policy and standards, and engages with other teams.

•             Digital Forensics- As it relates to information systems, performs HR investigations and legal holds in a forensically sound manner. Consults with HR and legal subject matter experts to adhere to local country laws.Must be willing and able to perform shift work, weekends, and holidays as well as participate in a rotating shift consisting of four (4) 10 hour shifts with four days on, three (3) days off and rotations across Day, Swing, and Graveyard shifts as needed.


To be successful in this position, you should be proficient with:

•             Incident Response – Getting people to do the right thing in the middle of an investigation.

•             Offensive Techniques - Penetration testing, IOCs, and exploits at all layers of the stack. Need to be very familiar with real world scenarios and current attacker behavior.

•             Logs - you should be very comfortable with a SEIM to be able to gather and analyze logs to recreate incidents and hunt for threats. Should have experience developing and tuning detection logic.

•             System Forensics -Understanding of image acquisition techniques, memory forensics, host forensics.

•             Networking Fundamentals -TCP/IP Protocols and associated analysis tools eg. Wireshark/TCPDump.

•             Scripting -Should be familiar in scripting in at least one of the following: BASH, Python, Perl or a similar language.

•             Risk Analysis -Taking an event in a particular environment and understanding the practical associated risk is a critical part of our jobs.

•             Automation -Creating and/or modifying scripts to automate repetitive and mundane tasks, freeing up time to focus on advanced investigations and other projects.

•             Enterprise Security-Should be familiar with enterprise security issues, working at scale.



Minimum five (5) years of professional experience in incident detection and response, malware analysis, digital forensics.


If you are interested, please do send me your most updated resume and let me know the best time and number to reach you.


Souptik Dasgupta

Principal Recruiter | K2 Nest

phone:  +1-(415)-287-1931


Monday, July 13, 2020

Security Engineer

Role :- Security Engineer
Location: San Bruno, CA
Contract: 6 months



6 +years’ experience securing ecommerce applications or mobile software.
Current CISSP certification (Certified Information Systems Security Professional)
Experience with DNS, CDNs, load balancing, APIs.
Experience with Go, Java, Python, Ruby, or another server-side programming language.
Writing and maintaining secure SQL queries.
E-commerce experience
Experience with Go(golang) is highly preferred!!
Experience with Salt, Chef, Puppet or other configuration management tools is desired


Ajay Kumar | Sr. Technical Recruiter | IDC Technologies Inc. |
Work#: (669) 209-1567

Thursday, July 9, 2020

Application Security Tester

Job Title:-Application Security Tester

Job Location;- Bellevue WA

Long term Contract



- Extensive experience developing in Java Python JavaScript i.e. NodeJS AngularJS TypeScript variants i.e. Angular 2 and common scripting languages i.e. Bash .
- Deep experience working with XML and web services including SOAP and REST.
- Thorough understanding of coding concepts such as authentication mechanisms data serialization.
- Thorough understanding of application architectures such as n tier client and server API Postman microservices etc.
- Performs static dynamic code testing manual code inspection threat modeling design reviews and penetration testing of internal web applications and external partner applications to identify vulnerabilities and security defects.
- Supports the implementation and enforcement of secure design principles according to policies standards and patterns of Information Security.
- Provide subject matter expertise and mentorship on architecture authentication and system security.
- Develops and implement manual and automated web application security testing of web applications to enforce security standards.
- Functional API Testing with Postman Newman and BlazeMeter
- Works with security product vendors and service providers to evaluate their security offerings.
- Must be familiar with the below Tool sets
- Fortify Web Inspect Expertise Advanced must be able to automate where possible
- Nessus
- Nmap
- Veracode
- Burp Suite
- ZED attack proxy
- Threat Modeling e.g. STRIDE
- Must be very well versed with OWASP Top 10 vulnerabilities and must demonstrate to exploit such vulnerabilities in mobile web and console applications.
- Understanding of both application and network layer security considerations and how to fix them such as buffer overflow ToC vs. ToU input validation encapsulation insecure protocols MITM attacks SQLi etc.
- Ability to work well both independently as well as within a team.
- Excellent verbal written and interpersonal communications skills.
- Ability to handle several tasks be organized make decisions and work efficiently effectively under deadlines.


- Bachelor of Science with 3 years of experience in cybersecurity


 Sandip Kumar

Noralogic Inc.

109 East 17th St, Cheyenne WY 82001

Call: 307-316-7223,964-393-6389


Wednesday, July 8, 2020

Cyber Security Analyst

Job Title: IT Security Analyst 3

Start Date: 06/23/20

Location: Dimondale, MI

End Date: 06/23/21


Monitor and advise on information security issues related to the systems and workflow at an agency to ensure the internal IT security controls for an agency are appropriate and operating as intended.


Member of the Michigan Security Operations Center (MiSOC) and will focus on Engineering supporting the following functional areas:


  • Vulnerability Management
  • Incident Response
  • Forensics
  • Security Operations
  • Threat Analytics
  • Configure, troubleshoot, upgrade and support security infrastructure devices
  • Support various security platforms, including but not limited to: Vulnerability Management platform (Tenable); Security Incident Event Management (SIEM) platform (IBM s QRadar); Content Filtering (WebSense); and various Symantec security platforms.
  • Identify and define system security requirements
  • Design computer security architecture and develop detailed cyber security designs
  • Prepare and document standard operating procedures and protocols
  • Engineer, implement and monitor security measures for the protection of computer systems, networks and information
  • Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
  • Ensure that the company knows as much as possible, as quickly as possible about security incidents
  • Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement

Inderpal Singh

IDC Technologies Inc.


Monday, July 6, 2020

Information Security Engineer

Job Title : Information Security Engineer

Location : Media, PA

Duration : 6  Months contract


Job Summary: 

In consultation with the Information Security, Development and Infrastructure teams, the Security Engineer Contractor will help integrate information security requirements and controls as captured in security policies, standards and best practices into current and future architectures and designs. The Security Engineer will help in detecting and addressing (reactively and proactively) risks and vulnerabilities in Customer’s IT landscape. Play a key role in driving the evolution of Customer’s technical architectures and IT operations and ensure that security controls are embedded throughout future designs and plans.


Principal Duties:

1.      Engineer and implement security measures for the protection of computer systems, networks and information.

2.      Maintain awareness of information security policies, standards and requirements.  Stay current on information security trends and risks.

3.      Drive identification and definition of system security requirements.

4.      Develop and document cloud, automation, and API security requirements.

5.      Analyze, design, develop, and continually evolve modern software-defined infrastructure and application patterns.

6.      Analyze cloud architecture and application vulnerabilities using cloud-native tools.

7.      Continuously evaluate the organization's existing cloud infrastructure security practices and help to define, standardize and measure security-related activities.

8.      Support cloud certification activities such as system hardening, vulnerability testing and scanning.

9.      Work closely with development, infrastructure and information security teams in an agile workflow to promote and mature DevOps methodologies.

10.  Design computer security architecture and develop detailed cyber security designs (network, applications, software development, operating system, virtualization, cloud, automation, etc) with input from various stakeholders (Information Security, IT, etc) while working in a hybrid cloud/traditional data center environment.

11.  Prepare and document designs, architectures, configuration standards, standard operating procedures and protocols.

12.  Act as an advisor to internal teams enabling them to build and design products securely and efficiently.

13.  Develop technical solutions to help mitigate security vulnerabilities and automate repeatable tasks to reduce the risk of fraud, abuse and misuse.

14.  Communicate technical application security concepts to employees, including developers, architects, and managers.

15.  Assess the security posture, develop risk profiles, specify security requirements, and identify mitigation measures to safeguard public facing Web applications.

16.  Streamline usage of security technologies in a dynamic environment through automation and orchestration platforms.


Essential Functions:

1.      Ability to work well individually as well as in a team environment

2.      Excellent oral and written communication skills, including documentation skills specifically with the drafting and updating of process and procedures.

3.      Excellent customer service and interpersonal skills

4.      Ability to work with little or no supervision

5.      Detail oriented and strong organizational skills

6.      Strong analytical and problem-solving skills

7.      Ability to handle multiple projects simultaneously and independently

8.      Proven self-starter with demonstrated ability to make decisions

9.      Ability to learn new technologies quickly and independently


Basic Qualifications:

1.      Bachelor’s degree in Information Technology or a technical discipline (e.g., engineering) preferred, or technical certifications, or related experience

2.      Certified in one or more of the following preferred: CISSP, CISA, CISM, CEH, technology specific (proxy, data loss prevention, firewall, etc).

3.      Minimum of 7+ years working in Information Technology Security.

4.      Working knowledge of information security concepts and technologies such as: least privilege, networking, network segmentation, firewalls, IPS\IDS, network analyzers, encryption technologies, proxies, etc.

5.      Proven work experience as a system engineer or system security engineer

6.      Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocols

7.      Cloud security (AWS - Azure) architecture, environment, and WAF experience

8.      Experience with container management and containerization technology.

9.      Experience on Authentication, Single Sign-On Infrastructure (AD, Azure AD, VDS, Ping Federate); Experience implementing multi-factor authentication, single sign-on, identity management or related technologies

10.  Extensive experience on authentication and authorization strategies using SAML/OpenID/OAuth;

11.  Extensive experience in usage related Identity & Access Management & defining standards around data at & data in transit - encryption, authorization, authentication, and security mechanisms, especially the foundational elements of the Public Key Infrastructure.

12.  Experience in building and maintaining security controls

13.  Detailed technical knowledge of application, network, database and operating system security

14.  Hands on experience in security systems, controls and concepts

15.  Experience with network security and networking technologies

16.  Working knowledge of sub netting, DNS, encryption technologies and standards, VPNs, VLANs, VoIP and other network routing methods

17.  Network and web related protocols (TCP/IP, UDP, IPSEC, HTTP, HTTPS, routing protocols, etc.)

18.  Advanced Persistent Threats (APT), phishing and social engineering, network access controllers (NAC), gateway anti-malware and enhanced authentication

19.  Thorough understanding of the latest security principles, techniques, and protocols


 Abhishek Singh                         

IDC Technologies, Inc

Mail to :

Phone: 408-648-2523

Senior ATG Developer

Job Title: Backend Engineer (ATG/Java)
Location: Sunnyvale, CA
Duration: 12 Months
Minimum Qualifications
Bachelor's Degree in Computer Science or related field and 6 years' experience building scalable e-commerce applications
ATG is mandatory
• 5+ years of experience with building scalable, high performing and robust Java applications
• Experience with big data methodologies involving Hive/Hadoop/ Spark;
• Experience with Hadoop workflow management using Azkaban, Oozie, Hamake or Cascading
• Hadoop stream processing using Storm/Spark
• Experience with no-sql technologies like Cassandra, couchbase, Flume or Hbase.
• Advanced scripting skills in at least one of the following: Python or Shell and willingness to learn new technologies
• Experience with Eclipse or other IDE development tools
• Experience with Continuous Integration and related tools (i.e. Jenkins, Hudson, Maven)
• Experience with Code Quality Governance related tools (Sonar, Gerrit, PMD, FindBugs, Checkstyle, Emma, Cobertura, etc)
• Experience with Source Code Management Tools (Github)
• Knowledge of standard tools for optimizing and testing code
• Ability to operate effectively and independently in a dynamic, fluid environment
Additional Preferred Qualifications
• Experience developing using J2EE technologies such as Servlet/JSP/Filters, JNDI, JDBC, JMS, JMX, RMI, Java Web Services or related skill
• Experience with Eclipse or other IDE development tools
• Experience developing with web/app containers such as Apache/Tomcat, Nginx
• Experience developing using relational databases such as Oracle or MySQL
Siva | Recruitment Specialist | (408) 731 6341
Amiseq, Inc. 1551, McCarthy Blvd, Milpitas, CA 95035