Dear Consultant,
I recently came across your resume posting on the internet and was
wondering if you are still available or interested in
hearing about other career opportunities? Below is a job description I
would like to discuss with you. If you or someone you
know might be interested in hearing more about this or other career
opportunities please email me a word version of you
resume along with the best time and number to reach you at.

*REPLY ME AT:[email protected] <[email protected]>*

Title: Web & Mobile Security Analyst
Location: Plano, TX
Duration: 6+ Months

NOTE: !!Must Need EAD-GC,GC & USC!!

Responsibilities:
.Secure web application and environment design
.Secure coding standards and practices
.Web application security assessments & web exploit methodologies
.Web vulnerability scans & penetration testing
.Identification of misconfigured software
.Analysis of potential threats
.Data encryption and PKI implementation
.Mobile device and user security (authentication, authorization, etc.)

Requirements (Education, Skills & Abilities)
.BS degree in computer science, related discipline or equivalent experience
.Minimum of 5+ years of relevant experience
.Extensive knowledge of secure web application architecture, design, and
coding techniques
.Hands-on experience using enterprise web scanning tools (Nexpose
experience preferred)
.Familiar with vulnerability assessment, confirmation, and validation
tools, processes, methodologies, and strategies, including static and
dynamic analysis tools/techniques
.Familiar with the Open Web Application Security Project (OWASP) and
CEW/SANS web security
.Familiar with vulnerability reporting, tracking, management, and
remediation processes, methodologies, and strategies
.Familiar with host and vulnerability discovery strategies, processes, and
best practices
.Windows, Linux, OSX, and mobile platforms
.Familiar with common network topologies and implementations (e.g.,
Infrastructure, DMZs, Zones, Wireless, etc.)
.Extensive, hands-on experience with securing mobile applications and
devices required.
.Familiar with common security implementations and their associated gaps
(e.g., Active Directory, centralized DNS, etc.)
.Excellent verbal and written communication skills
.Experience with project management standards and Agile development
methodologies

Desired Skills
.Experience with Code reviews of Perl, Python, Ruby, Java, Java Swing,
HTML, XML, CSS, ASP, ASP.NET, Cold Fusion, Oracle, T-SQL, SQL and other
languages
.Knowledge of threat modeling or other risk identification techniques
.Familiar with network penetration testing tools, processes, methodologies,
and strategies
.Familiar with security exercise tools, processes, methodologies, and
strategies
.Certified Ethical Hacker (CEH), Licensed Penetration Tester (LPT), CISSP,
or related certifications a plus

Regards
Dayle Wilson - IT Technical Recruiter
ITBrainiac Inc.
Direct : 201-448-4949
[email protected]

-- 
You received this message because you are subscribed to the Google Groups 
"oraapps" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at https://groups.google.com/group/oraapps.
For more options, visit https://groups.google.com/d/optout.

Reply via email to