Hi Partner,
Kindly share some matching resume to *[email protected]
<[email protected]>*
*Job Title: Security Administrator III Assign. Period:
12 Months+ Location: Torrance, CA*
Must go to client for a F2F interview.
**SIEM, IPS/IDP, MSS (Managed Security Services)
*Responsibilities:*
Perform user and access administration on designated systems and
applications, in accordance with the defined policies, standards and
procedures.
Perform system security administration on designated technology
platforms including operating systems, applications and network security
devices in accordance with the defined policies, standards and
procedures, as well as with industry best practices and vendor
guidelines.
Perform installation and configuration management of security systems
and applications, including policy assessment and compliance tools,
network security appliances and host-based security systems.
Perform threat and vulnerability assessments, in some cases followed by
appropriate remedial action, to ensure that systems are protected from
known and potential threats and are free from known vulnerabilities.
Locate and repair security problems and failures.
Collate security incident and event data to produce monthly exception
and management reports.
Perform normal and exceptional processing of user access and change
requests, escalating such requests when appropriate.
Report unresolved network security exposures misuse or resource or
non-compliance.
*Daily Tasks Performed*:
Identify, investigate, contain and remediate security incidents
utilizing existing tools including but not limited to: SEIM, Endpoint
Protections, IDS/IPS, DLP, Web Gateway and Proxy Appliances and
Vulnerability scanners.
Create, test, and deploy new access control rules, signatures, and then
validate results via post-deployment report.
Ability to evaluate risk to the company and apply this methodology to
active incidents/vulnerabilities
Conduct security assessments to proactively and/or reactively identify
new vulnerabilities within the network
Creates and implements engineering methodologies to monitor operation of
IT systems to detect suspicious activity that could include an attempted
or actual intrusion involving Windows, Unix, Linux, Email or mobile
platforms.
*Musts*:
BA/BS in Information Technology, Computer Science, or related field or
equivalent work experience.
Understanding of in security subjects.
Knowledge of security policies and interprets policies
Understanding of a specific security application or tool and how it
works
Ability to assess security safeguards
Ability to deal with threats and intermediate level incidents
Ability to deal with intrusions at a moderate threat level
Knowledge of information security principles, including risk assessment
and management, threat and vulnerability management, incident response,
and identity and access management.
Technical proficiency with security-related systems and applications
specifically in: developing, documenting, and maintaining security
procedures.
Business Experience
5 to 7 years of combined IT and security work experience with a broad range
of exposure to systems analysis, applications development, database design
and administration.
Wants
• Must be able to perform hands-on support for a wide range of security
technologies including, but not limited to: Security Information and Event
Management (SIEM), IDS/IPS, Managed Security Services (Client), Behavior
Detection, Vulnerability Scanning and Data Loss Prevention Program (DLP).
• Primary responsibilities will be to monitor, investigate, analyze both
raw and normalized network traffic, correlate connected sequences of
events, detect incidents, reconstructed into timelines for analysis,
identify malicious network activity, and generally against in conducting
defensive cyber space operations network infrastructure and intellectual
property.
• Leads technical direction in designing and implementing security
solutions for security technical infrastructure • Must be able to clearly
articulate ideas and solutions during incidents.
• Ability to work independently and manage time effectively utilizing work
and project plans to meet deadlines.
• Member of the Security Incident Response Team.
• Participates in all phases of project planning in security service
support, including functional requirements, design specifications, testing,
implementation into Security Operations.
• Knowledge and administrative experience with one or multiples of the
following: McAfee Security Suite of Products (McAfee Endpoint Encryption,
McAfee DLP – Device Control, McAfee EPO Management, McAfee Antivirus and
Anti-Malware, McAfee Site Advisor, Intrusion Detection and Prevention
Systems, Internet Gateways and Reverse/Forward Proxies.
• Thorough knowledge of software such as SIEMs tools.
• Should have experience conducting penetration testing and exploitation of
vulnerabilities.
• Must have at least one of the following certifications: CISSP or CISA or
GIAC.
• Preferred security Certifications: CCNA or CCNP, CCSA, CCSE, RHCA, RHCE,
CCSP, SANS Specialized certification: CISSP, CISM, Ethical Hacking.
*Regards,*
AMIT KUMAR *Sr. Recruiter*
*IDC Technologies Inc.*| *1851 McCarthy Boulevard, Suite 116, Milpitas, CA
, USA, 95035*
*408 668 8348 **I **[email protected] <[email protected]>**
I Gtalk: Recruiter.amitk | Skype: Amitiilm*
*Web: www.idctechnologies.com <http://www.idctechnologies.com/>*
"Under Bill s. 1618 Title III passed by the 105th U.S. Congress this mail
can not be considered spam as long as we include a way to be removed from
our mailing list. Simply send us an e-mail with REMOVE in the subject and
we will gladly REMOVE you from our mailing list."
--
You received this message because you are subscribed to the Google Groups "IT
RECURITER" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To post to this group, send email to [email protected].
Visit this group at https://groups.google.com/group/it-recuriter.
For more options, visit https://groups.google.com/d/optout.