*Dear Business Partner,* * * *I wish you are doing great today.  My name is
**Raju**; I am a Technical Recruiter from **Saphire Solutions Inc.** I have
multiple requirements and would appreciate if you can forward to me any
suitable profiles.* * *

*Please Send resumes to [email protected]*

* *

*Title: **Systems Security Engineer*
*Location: *MD

*Duration: End of the year*
* * *Job Description:*

Experience: 3+ years IT Information, Systems, or Network Security and/or IT
Governance experience.

Certifications: CISSP, CCSP, GIAC, & CISM are desirable.



*Skills:*

   - Knowledge and experience with data security and access control systems.
   **
   - Solid understanding of standards in strong encryption and cryptography
   as well as secure communication protocols.
   - Knowledge of Intrusion Detection including Network and Host.
   - Experience with vulnerability assessment and SIEM methodology and tools
   - Novell Sentinel SIEM experience is desirable.
   - Retina Vulnerability Framework experience is a plus.
   - Familiarity with Windows, UNIX, & Linux environments.
   - Familiarity with network architectures and protocols including:
   - TCP/IP
   - DNS
   - DHCP
   - VPN
   - Token Authentication



Conforming to compliance and governance requirements will be an integral
part of security practices. Personnel will support:

Development and maintenance of IT Information Security policies, standards,
and procedures.

Active network, applications, & other scanning & verification functions.

Log management, review, tracking, and distribution.



*Security support personnel will participate in the following tasks: *

   - Develop & enforce compliance/governance policies & procedures.
   Develop, enhance, and maintain an information security policy that is
   reviewed & updated annually to reflect changes to business objectives or the
   risk environment.
   - Examine operational security procedures & verify consistency with
   compliance & governance requirements.
   - Refine the implementation of access control mechanisms, and deploy /
   monitor configuration and security standards baselines.
   - Remain current on evolving standards within the industry (new rules &
   vulnerabilities identified regularly). This will require constant research &
   proactive remediation where necessary.
   - Design, develop, and perform scanning & verification functions
   associated with securing corporate infrastructure.
   - In coordination with internal organizations and external auditors
   execute a Network Vulnerability Framework and Assessment Plan to
   continuously review the internet facing and internal facing network
   structure to maintain firm control of sensitive data.



* *

* *

* *

*Thanks and Regards*

*Raju*
*Resource Specialist* *Saphire Solutions Inc.
Off: 732-791-4994* *FAX: 732 653 0277* *[email protected]* *
http://www.saphiresolutions.com* *
--------------------------------------------------------------------------------------------------------------------------------
* *DISCLAIMER: **This is not an unsolicited mail. Under Bill 1618 Title III
passed by the 105th US Congress this mail cannot be considered Spam as long
as we include contact information and a method to be removed from our
mailing list. If you have received this message in error or are not
interested in receiving our e-mails, please reply with a "REMOVE" in the
subject line and we will remove your e-mail address from our future mailings
***

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"KNOW.IT" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/KNOW_IT_AZ?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to