Hi Please let me know if you have any resources for the below opening...
*Title*: Security Consultant Needed *Duration*: 6 months to hire *Location*: Madison, WI* * With minimal oversight, gathers information and defines customer needs and documents requirements. Can translate requirements to functional design and clearly identify feature functions of a new product or modifications to existing product. Demonstrated ability to write test cases and draft text for user documentation. Typically as 2-4 years of experience. *CONTRACTOR FOR HIRE (after 6 months)* Perform the work necessary to maintain operational excellence for IT Security systems and software. Develops information security policy and strategy and executes operations and processes required to maintain the confidentiality, integrity, availability and accountability for all aspects of safeguarding or protecting information or data, in whatever form, for the client and its subsidiaries. Dedicated to providing operational support in the performance of documented routine tasks required to support technology and processes in the IT Security department. You must bring to the table Bachelor of Science degree in CS/MIS or equivalency in education and related professional experience; At least 1-year demonstrated proficiency with an Information Security Audit, Identity Management or Architecture function in a business or academic environment. Ability to clearly and effectively communicate business and technical information, both verbally and in writing; Ability to provide a high level of customer service. Experience in at least (2) areas listed of the CISSP Common Body of Knowledge: Access Control Systems and Methodology, Operations Security. Experience with information security concepts in at least (4) of the following: - Digital forensics; - Cryptography; - Incident response; - Managed security services; - web, url, mobile code filtering; - Network; - Security; - Patch, configuration management; - penetration testing; - Spyware, anti-virus, anti-worm detection; - Vulnerability management; - Web, e-commerce security; - Wireless, mobile security; - Security information management; - Os, platform security; - Application development security; - Database security; end-point security; - Business continuity, disaster recovery; - E-mail security; - Storage security; - Access control software; - Strong authentication; - Pki, digital signatures, certificate authorities; - Identity management, entitlement, authorization; - Password management, provisioning, single sign-on; - Audit & compliance; - Security policy; - Risk management; - Software development lifecycle, systems development lifecycle. Technical certifications, training and professional experience in (2) technologies currently deployed at Client site is Identity Management or IT Security. Regards, *Rama PolyTera | Jeevan Technologies Inc* Tel : 732-917-4804 Fax : 888-699-4786 Email:r...@polytera.com <email%3amo...@polytera.com> www.polytera.com -- ♫ “A day without laughter is a day wasted” - Charlie Chaplin -- You received this message because you are subscribed to the Google Groups "AJAX_Tools" group. To post to this group, send email to ajax_to...@googlegroups.com. To unsubscribe from this group, send email to ajax_tools+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/ajax_tools?hl=en.