Dear Consultant, I recently came across your resume posting on the internet and was wondering if you are still available or interested in hearing about other career opportunities? Below is a job description I would like to discuss with you. If you or someone you know might be interested in hearing more about this or other career opportunities please email me a word version of you resume along with the best time and number to reach you at.
*REPLY ME AT:[email protected] <[email protected]>* Title: Web & Mobile Security Analyst Location: Plano, TX Duration: 6+ Months NOTE: !!Must Need EAD-GC,GC & USC!! Responsibilities: .Secure web application and environment design .Secure coding standards and practices .Web application security assessments & web exploit methodologies .Web vulnerability scans & penetration testing .Identification of misconfigured software .Analysis of potential threats .Data encryption and PKI implementation .Mobile device and user security (authentication, authorization, etc.) Requirements (Education, Skills & Abilities) .BS degree in computer science, related discipline or equivalent experience .Minimum of 5+ years of relevant experience .Extensive knowledge of secure web application architecture, design, and coding techniques .Hands-on experience using enterprise web scanning tools (Nexpose experience preferred) .Familiar with vulnerability assessment, confirmation, and validation tools, processes, methodologies, and strategies, including static and dynamic analysis tools/techniques .Familiar with the Open Web Application Security Project (OWASP) and CEW/SANS web security .Familiar with vulnerability reporting, tracking, management, and remediation processes, methodologies, and strategies .Familiar with host and vulnerability discovery strategies, processes, and best practices .Windows, Linux, OSX, and mobile platforms .Familiar with common network topologies and implementations (e.g., Infrastructure, DMZs, Zones, Wireless, etc.) .Extensive, hands-on experience with securing mobile applications and devices required. .Familiar with common security implementations and their associated gaps (e.g., Active Directory, centralized DNS, etc.) .Excellent verbal and written communication skills .Experience with project management standards and Agile development methodologies Desired Skills .Experience with Code reviews of Perl, Python, Ruby, Java, Java Swing, HTML, XML, CSS, ASP, ASP.NET, Cold Fusion, Oracle, T-SQL, SQL and other languages .Knowledge of threat modeling or other risk identification techniques .Familiar with network penetration testing tools, processes, methodologies, and strategies .Familiar with security exercise tools, processes, methodologies, and strategies .Certified Ethical Hacker (CEH), Licensed Penetration Tester (LPT), CISSP, or related certifications a plus Regards Dayle Wilson - IT Technical Recruiter ITBrainiac Inc. Direct : 201-448-4949 [email protected] -- You received this message because you are subscribed to the Google Groups "oraapps" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at https://groups.google.com/group/oraapps. For more options, visit https://groups.google.com/d/optout.
