Hello All,

Hope you are doing well.

Below are the jobs descriptions and the skills required. Let me know if you
would be interested to apply for this position.

Role 1:

QA-  C# Selenium
Cleveland, Ohio, USA
1 Year
FullTime

Job Description:
6+ Years of experience in Selenium automation with C#
Experience in working on Agile projects
Experience on CI/CD integration
Experience on Testing methodologies.


Role 2:
Unix System Administrator
Santa Clara, CA (Day 1 onsite)
Full-Time
(Mid-level 3 – 8 yrs exp)
Skills:- Unix and CentOS, SUSE, Ubuntu, Redhat Server exp

Job Details:
We are looking for a Unix System Administrator to Design, develop, modify,
Manage, adapt and implement short and long term solutions to information
technology (IT) needs through new and existing applications, systems
architecture and applications infrastructure for Next generation Applied
Materials tools using but not limited to Embedded HW Setup, CENTOS, UBUNTU,
RHAT, SUSE, clustering, Diskless clients, DHCP, PXE, Shell, Perl, Python,
IPMI SoL, x86 Hardware, virtualized environments, Ensuring security,
integrity and high-availability of enterprise systems and related
components is essential. This includes ensuring the availability of
client/server applications, configuring and installing updates, and
developing processes and procedures for ongoing monitoring and management
of mission critical services. Must be able to take ownership and
independently manage the small to medium LINUX environment as well as
analyze functional requirements and recommends technical solutions to
stakeholders. Must have excellent interpersonal and communication skills.

Required skills:
Bachelor's degree in Computer Science or equivalent experience (5 – 7 Years)
Semiconductor tools IT infrastructure experience (1- 2 years)
Enterprise Linux server management (CentOS, SUSE, Ubuntu, Redhat)
Networking protocols, including HTTPS, TCP/IP, UDP, SSL, SSH, SMTP
Proficiency in scripting and automation – bash, perl, python, etc
Experience in clustering solutions
Experience with physical and virtual server environments, such as x86 and
VMware
Experience with PXE and Diskless clients
Experience with storage solutions including, RAID, and SAN technology.
Networking experience with Cisco or comparable devices, Enterprise Load
Balancers, IPTABLES, Next Generation Enterprise Firewalls


Role 3:
Oracle RAC DBA
Cincinnati, OH - Initial Remote
Full-Time

ORACLE EBS R12 /11i DBA
Job Description:
1.Comprehensive expert level knowledge of Oracle EBS R12 application
administration, including installation, configuration, cloning, and
upgrades, using Oracle EBS R12 Applications DBA (AD) utilities and other
tools to apply patches and system updates
2.Expert level knowledge of Oracle 12C or 19C database administration,
maintenance, security implementation, upgrade and patching, database
performance tuning, sizing and capacity planning, database backup and
recovery in a Linux O/S using RMAN and Oracle export/import utilities,
administration, and maintenance to provide backup and disaster
3.Expereince in Oracle EBS Sysadmin activities - Concurrent manager
configs/maintainance , Conc Managers Load monitoring , EBS Code moves, well
versed with EBS Application file system, setting up SFTP SSH keys , EBS
Application performance issues debuging  and EBS user access management
4.Manage and support the current AWS DB and help in future AWS DB migration
strategies
5.Expereince in Disaster recovery Sites setup and DR tasks

Secondary Skill set:
Experience working with (a) Load Balancers for Oracle Applications; (b)
Lightweight
Directory Access Protocol (LDAP) integration; and (c) Secure Sockets
Layering (SSL).
Experience in Oracle9i/8i databases desired or nice to have

Responsibilities:
Installation, configuration and upgrading of Oracle EBS Database and
related products.
Monitoring the application related products like oacore,oafm apache etc.
Establish and maintain backup and recovery policies and procedures
Take care of the Database design and implementation.
Implement and maintain database security (create and maintain users and
roles, assign privileges).
Work as part of a team and provide 24×7 support when required
Patch Management and Version Control.
Perform database tuning and performance monitoring.
Perform application tuning and performance monitoring.
Cloning DEV and TEST from PROD.
Work on integration issues


Role 4:
Security and Authentication Services Lead
Austin , TX(Onsite role)
12 Months
C2C / Full Time

Job Description :
· BA/BS/BE in Information Technology or related field from an accredited
university
· Previous experience in a Security Operations Center (SOC)
· Experience in Threat hunting
· Experience in Penetration testing
· Previous experience implementation of enterprise security software
solutions
· Strong problem-solving and analytical skills, initiative, eagerness to
learn, improve, and
ability to work independently within a team structure
· Experience with programming and scripting languages such as/but not
limited to C#,
Python, Java or Power shell
· Proven ability to work under stress in emergencies, with the flexibility
to handle
multiple high-pressure situations simultaneously
· Strong customer focus, with the ability to manage expectations
appropriately, provide a
superior customer experience and build long-term relationships

Desirable Certifications:
· CISSP
· CEH – Certified Ethical Hacker (CEH)
· Security+,
· Network+


Job Profile:

· Security platform capacity planning and lifecycle management
· Security platform integration and engineering
· Security platform configuration and policy management
· Validating the ingest of log sources and maintaining the flow of required
logs to the
SIEM
· Contributing to the configuration and maintenance of security operations
controls such
as antivirus, application whitelisting, Host Intrusion Detection Systems
(HIDS), Network
Intrusion Detection Systems (NIDS), and Security Information and Event
Management
(SIEM) and Security Orchestration and Automation Platforms
· Design security architecture elements to mitigate threats as they emerge
· Identify security design gaps in existing and proposed architectures and
recommend
changes or enhancements
· Monitor the external threat environment for emerging threats, and advise
relevant
stakeholders on the appropriate courses of action
· Work with Computer Security Incident Response Team (CSIRT) to manage &
contain
information security incidents and events to protect company IT assets,
Intellectual
Property, and company's reputation
· Promptly responding to all security incidents and providing thorough
post-event
analyses
· Respond to advisory service requests to address and drive thru for
closure as needed.
· Conduct security assessment on internal applications/infrastructure and
deliver reports
detailing assessment observations and associated recommendations for
information
security program development to help the client meet security and compliance
standards.
· Perform technical research into advanced, targeted attacks, crimeware
campaigns,
malware and other emerging technologies and techniques to identify and
report on
cyber-attacks and attackers
· Perform proactive research to identify, categorize and produce reports on
new and
existing threats
· Supply actionable recommendations to other teams within Applied
Materials, to bolster
cyber security efforts
· Display strong technical aptitude with: IT Security, Enterprise
Firewalls, Intrusion
Detection and Prevention, Antivirus, Web and Email Security, Server and
application
monitoring, Windows and Linux based Web Services
· Information Security Technologies – Knowledge of technologies and
technology-based
solutions dealing with information security issues.
· IT Systems Management – Knowledge of and ability to utilize a variety of
technical tools
and techniques to guarantee service availability and ensure IT system
performance.



Role 5:
Information Security Operations Sr Consultant
Austin, TX (Completely Onsite role)
Duration:-12 Months

Job Description:
• Bachelor’s degree in Information Technology or related field
• 6-8 years of relevant information security experience
• Prior experience in partnering with cross-functional teams to deliver
impactful security initiatives
• Prior experience with threat modeling, security design reviews, and
security architectural concepts
• Expertise across common information security management frameworks, such
as ISO/IEC 27001, ITIL, COBIT, NIST, including 800-53 and Cybersecurity
Framework is preferred
• Any recognized security certifications, e.g., CISSP, CISA, CISM etc.
• Working experience in a global company is preferred
• Strong interpersonal, writing, and communication skills; ability to
clearly articulate and visually present complex advice to managers at all
levels
• Excellent analytical and critical thinking skills
• Ability to manage multiple projects with team members from various
business units/functions and countries
• Ability to work both independently and work within a team to analyze
complex business problems and recommend solutions
• Ability to travel periodically

Key Responsibilities
• Strong application security background with a focus on providing security
guidance to development and application teams.
• Experience with threat modeling, security design reviews, security
architecture, pen testing and proactive security assessments.
• Experience in reviewing and developing Security Architectures and
identifying security risks/gaps as well as mitigation strategies
• Proven ability to provide Security Requirements for areas including but
not limited to; Cloud Computing, Application Development, identity and
access management, and Infrastructure design and standards
• Knowledge of securing technologies such as, but not limited to; SaaS
services (i.e., O365, Salesforce), Application Design, Container Platforms
(ie. Docker, Kubernetes), APIs, Serverless,
• Knowledge of SDLC (Waterfall/Agile), DevSecOps, and good understanding of
the ITIL Framework
• Provide guidance for security control validation for team members.
• Drive continuous improvement of security control validation processes &
procedures
• Identify opportunities for automation where possible to enhance security
and drive implementation of technology that creates value for the
organization
• Proven ability to understand large complex integrated solutions and
provide the security needed between systems
• Partner with various stake holder groups to promote and build a culture
of security and implement/enhance controls accordingly
• Monitor internal and external threat landscape to update strategy and
intellectual property protection program roadmap
• Work with a global team to help implement and monitor security controls
to proactively identify risk issues and ensure adequate security solutions
are in place throughout all systems
• Establishes control-related process/procedures and while working towards
building relevant security metrics and dashboards
• Identifies potential threats and subsequent remediation of
vulnerabilities in the environment
• Review and update policies and provide training as needed to internal &
external audience
• Provide periodic reports to management team and key stakeholders
• Proven ability to provide Security Requirements for areas

Thanks & regards,

Syed Abbas
678-889-8748
abb...@systelinc.com

-- 
You received this message because you are subscribed to the Google Groups 
"Android Developers" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to android-developers+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/android-developers/CADz_F0fwXDX--1ZnGTDwM%3D_5cZQPpX_sqPRVpDiLd_FBw2fGnQ%40mail.gmail.com.

Reply via email to