Hi

Please let me know if you have any resources for the below opening...

*Title*: Security Consultant Needed
*Duration*: 6 months to hire
*Location*: Madison, WI*

*

With minimal oversight, gathers information and defines customer needs and
documents requirements.

Can translate requirements to functional design and clearly identify feature
functions of a new product or modifications to existing product.

Demonstrated ability to write test cases and draft text for user
documentation.

Typically as 2-4 years of experience.



*CONTRACTOR FOR HIRE (after 6 months)*

Perform the work necessary to maintain operational excellence for IT
Security systems and software.

Develops information security policy and strategy and executes operations
and processes required to maintain the confidentiality, integrity,
availability and accountability for all aspects of safeguarding or
protecting information or data, in whatever form, for the client and its
subsidiaries.

 Dedicated to providing operational support in the performance of documented
routine tasks required to support technology and processes in the IT
Security department.

You must bring to the table

 Bachelor of Science degree in CS/MIS or equivalency in education and
related professional experience;

At least 1-year demonstrated proficiency with an Information Security Audit,
Identity Management or Architecture function in a business or academic
environment.

 Ability to clearly and effectively communicate business and technical
information, both verbally and in writing; Ability to provide a high level
of customer service.

 Experience in at least (2) areas listed of the CISSP Common Body of
Knowledge: Access Control Systems and Methodology, Operations Security.

 Experience with information security concepts in at least (4) of the
following:

   - Digital forensics;
   - Cryptography;
   - Incident response;
   - Managed security services;
   -  web, url, mobile code filtering;
   - Network;
   - Security;
   - Patch, configuration management;
   -  penetration testing;
   - Spyware, anti-virus, anti-worm detection;
   - Vulnerability management;
   - Web, e-commerce security;
   - Wireless, mobile security;
   - Security information management;
   - Os, platform security;
   - Application development security;
   - Database security; end-point security;
   - Business continuity, disaster recovery;
   - E-mail security;
   - Storage security;
   - Access control software;
   - Strong authentication;
   - Pki, digital signatures, certificate authorities;
   - Identity management, entitlement, authorization;
   - Password management, provisioning, single sign-on;
   - Audit & compliance;
   - Security policy;
   - Risk management;
   - Software development lifecycle, systems development lifecycle.

 Technical certifications, training and professional experience in (2)
technologies currently deployed at Client site is Identity Management or IT
Security.


Regards,

*Rama
PolyTera | Jeevan Technologies Inc*
Tel : 732-917-4804
Fax : 888-699-4786
Email:r...@polytera.com <email%3amo...@polytera.com>
www.polytera.com




-- 

♫ “A day without laughter is a day wasted” - Charlie Chaplin

-- 
You received this message because you are subscribed to the Google Groups 
"AJAX_Tools" group.
To post to this group, send email to ajax_to...@googlegroups.com.
To unsubscribe from this group, send email to 
ajax_tools+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/ajax_tools?hl=en.

Reply via email to