Hello All, Hope you are doing well.
Below are the jobs descriptions and the skills required. Let me know if you would be interested to apply for this position. Role 1: QA- C# Selenium Cleveland, Ohio, USA 1 Year FullTime Job Description: 6+ Years of experience in Selenium automation with C# Experience in working on Agile projects Experience on CI/CD integration Experience on Testing methodologies. Role 2: Unix System Administrator Santa Clara, CA (Day 1 onsite) Full-Time (Mid-level 3 – 8 yrs exp) Skills:- Unix and CentOS, SUSE, Ubuntu, Redhat Server exp Job Details: We are looking for a Unix System Administrator to Design, develop, modify, Manage, adapt and implement short and long term solutions to information technology (IT) needs through new and existing applications, systems architecture and applications infrastructure for Next generation Applied Materials tools using but not limited to Embedded HW Setup, CENTOS, UBUNTU, RHAT, SUSE, clustering, Diskless clients, DHCP, PXE, Shell, Perl, Python, IPMI SoL, x86 Hardware, virtualized environments, Ensuring security, integrity and high-availability of enterprise systems and related components is essential. This includes ensuring the availability of client/server applications, configuring and installing updates, and developing processes and procedures for ongoing monitoring and management of mission critical services. Must be able to take ownership and independently manage the small to medium LINUX environment as well as analyze functional requirements and recommends technical solutions to stakeholders. Must have excellent interpersonal and communication skills. Required skills: Bachelor's degree in Computer Science or equivalent experience (5 – 7 Years) Semiconductor tools IT infrastructure experience (1- 2 years) Enterprise Linux server management (CentOS, SUSE, Ubuntu, Redhat) Networking protocols, including HTTPS, TCP/IP, UDP, SSL, SSH, SMTP Proficiency in scripting and automation – bash, perl, python, etc Experience in clustering solutions Experience with physical and virtual server environments, such as x86 and VMware Experience with PXE and Diskless clients Experience with storage solutions including, RAID, and SAN technology. Networking experience with Cisco or comparable devices, Enterprise Load Balancers, IPTABLES, Next Generation Enterprise Firewalls Role 3: Oracle RAC DBA Cincinnati, OH - Initial Remote Full-Time ORACLE EBS R12 /11i DBA Job Description: 1.Comprehensive expert level knowledge of Oracle EBS R12 application administration, including installation, configuration, cloning, and upgrades, using Oracle EBS R12 Applications DBA (AD) utilities and other tools to apply patches and system updates 2.Expert level knowledge of Oracle 12C or 19C database administration, maintenance, security implementation, upgrade and patching, database performance tuning, sizing and capacity planning, database backup and recovery in a Linux O/S using RMAN and Oracle export/import utilities, administration, and maintenance to provide backup and disaster 3.Expereince in Oracle EBS Sysadmin activities - Concurrent manager configs/maintainance , Conc Managers Load monitoring , EBS Code moves, well versed with EBS Application file system, setting up SFTP SSH keys , EBS Application performance issues debuging and EBS user access management 4.Manage and support the current AWS DB and help in future AWS DB migration strategies 5.Expereince in Disaster recovery Sites setup and DR tasks Secondary Skill set: Experience working with (a) Load Balancers for Oracle Applications; (b) Lightweight Directory Access Protocol (LDAP) integration; and (c) Secure Sockets Layering (SSL). Experience in Oracle9i/8i databases desired or nice to have Responsibilities: Installation, configuration and upgrading of Oracle EBS Database and related products. Monitoring the application related products like oacore,oafm apache etc. Establish and maintain backup and recovery policies and procedures Take care of the Database design and implementation. Implement and maintain database security (create and maintain users and roles, assign privileges). Work as part of a team and provide 24×7 support when required Patch Management and Version Control. Perform database tuning and performance monitoring. Perform application tuning and performance monitoring. Cloning DEV and TEST from PROD. Work on integration issues Role 4: Security and Authentication Services Lead Austin , TX(Onsite role) 12 Months C2C / Full Time Job Description : · BA/BS/BE in Information Technology or related field from an accredited university · Previous experience in a Security Operations Center (SOC) · Experience in Threat hunting · Experience in Penetration testing · Previous experience implementation of enterprise security software solutions · Strong problem-solving and analytical skills, initiative, eagerness to learn, improve, and ability to work independently within a team structure · Experience with programming and scripting languages such as/but not limited to C#, Python, Java or Power shell · Proven ability to work under stress in emergencies, with the flexibility to handle multiple high-pressure situations simultaneously · Strong customer focus, with the ability to manage expectations appropriately, provide a superior customer experience and build long-term relationships Desirable Certifications: · CISSP · CEH – Certified Ethical Hacker (CEH) · Security+, · Network+ Job Profile: · Security platform capacity planning and lifecycle management · Security platform integration and engineering · Security platform configuration and policy management · Validating the ingest of log sources and maintaining the flow of required logs to the SIEM · Contributing to the configuration and maintenance of security operations controls such as antivirus, application whitelisting, Host Intrusion Detection Systems (HIDS), Network Intrusion Detection Systems (NIDS), and Security Information and Event Management (SIEM) and Security Orchestration and Automation Platforms · Design security architecture elements to mitigate threats as they emerge · Identify security design gaps in existing and proposed architectures and recommend changes or enhancements · Monitor the external threat environment for emerging threats, and advise relevant stakeholders on the appropriate courses of action · Work with Computer Security Incident Response Team (CSIRT) to manage & contain information security incidents and events to protect company IT assets, Intellectual Property, and company's reputation · Promptly responding to all security incidents and providing thorough post-event analyses · Respond to advisory service requests to address and drive thru for closure as needed. · Conduct security assessment on internal applications/infrastructure and deliver reports detailing assessment observations and associated recommendations for information security program development to help the client meet security and compliance standards. · Perform technical research into advanced, targeted attacks, crimeware campaigns, malware and other emerging technologies and techniques to identify and report on cyber-attacks and attackers · Perform proactive research to identify, categorize and produce reports on new and existing threats · Supply actionable recommendations to other teams within Applied Materials, to bolster cyber security efforts · Display strong technical aptitude with: IT Security, Enterprise Firewalls, Intrusion Detection and Prevention, Antivirus, Web and Email Security, Server and application monitoring, Windows and Linux based Web Services · Information Security Technologies – Knowledge of technologies and technology-based solutions dealing with information security issues. · IT Systems Management – Knowledge of and ability to utilize a variety of technical tools and techniques to guarantee service availability and ensure IT system performance. Role 5: Information Security Operations Sr Consultant Austin, TX (Completely Onsite role) Duration:-12 Months Job Description: • Bachelor’s degree in Information Technology or related field • 6-8 years of relevant information security experience • Prior experience in partnering with cross-functional teams to deliver impactful security initiatives • Prior experience with threat modeling, security design reviews, and security architectural concepts • Expertise across common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT, NIST, including 800-53 and Cybersecurity Framework is preferred • Any recognized security certifications, e.g., CISSP, CISA, CISM etc. • Working experience in a global company is preferred • Strong interpersonal, writing, and communication skills; ability to clearly articulate and visually present complex advice to managers at all levels • Excellent analytical and critical thinking skills • Ability to manage multiple projects with team members from various business units/functions and countries • Ability to work both independently and work within a team to analyze complex business problems and recommend solutions • Ability to travel periodically Key Responsibilities • Strong application security background with a focus on providing security guidance to development and application teams. • Experience with threat modeling, security design reviews, security architecture, pen testing and proactive security assessments. • Experience in reviewing and developing Security Architectures and identifying security risks/gaps as well as mitigation strategies • Proven ability to provide Security Requirements for areas including but not limited to; Cloud Computing, Application Development, identity and access management, and Infrastructure design and standards • Knowledge of securing technologies such as, but not limited to; SaaS services (i.e., O365, Salesforce), Application Design, Container Platforms (ie. Docker, Kubernetes), APIs, Serverless, • Knowledge of SDLC (Waterfall/Agile), DevSecOps, and good understanding of the ITIL Framework • Provide guidance for security control validation for team members. • Drive continuous improvement of security control validation processes & procedures • Identify opportunities for automation where possible to enhance security and drive implementation of technology that creates value for the organization • Proven ability to understand large complex integrated solutions and provide the security needed between systems • Partner with various stake holder groups to promote and build a culture of security and implement/enhance controls accordingly • Monitor internal and external threat landscape to update strategy and intellectual property protection program roadmap • Work with a global team to help implement and monitor security controls to proactively identify risk issues and ensure adequate security solutions are in place throughout all systems • Establishes control-related process/procedures and while working towards building relevant security metrics and dashboards • Identifies potential threats and subsequent remediation of vulnerabilities in the environment • Review and update policies and provide training as needed to internal & external audience • Provide periodic reports to management team and key stakeholders • Proven ability to provide Security Requirements for areas Thanks & regards, Syed Abbas 678-889-8748 abb...@systelinc.com -- You received this message because you are subscribed to the Google Groups "Android Developers" group. To unsubscribe from this group and stop receiving emails from it, send an email to android-developers+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/android-developers/CADz_F0fwXDX--1ZnGTDwM%3D_5cZQPpX_sqPRVpDiLd_FBw2fGnQ%40mail.gmail.com.