Dear Associates,
    Please Respond Perfect matching profile to*  **
[email protected]* <[email protected]> for the
following requirement.


Information System Security

Location: *Sunnyvale,CA*

Duration *3-6 Months*

Rate:*$60/Hr - All Incl*

*
*

*PREFERRED LOCALS TO CA ONLY...*

*
*

Routers and Switches are Cisco

Firewalls are Juniper

Operating Systems are: Windows/Solaris/Linux

Databases are Oracle and SQL Server

Major applications: SAP/PeopleSoft/Data warehousing/Informatica

VMware for virtualization

Do not know the names of their intrusion detection tools.



*Information Security  *

Ensures the clients *Information System Security* is in compliance with
federal and state laws, regulations, and clients System’s standard industry
practice, policies, and procedures.


*Responsibilities include the following: *

*1*.Enforces, maintains and enhances the cost-effective Information
Technology Security Policy for the client including policies, procedures,
guidelines, awareness and training plan, overall security infrastructure,
and monitoring.

*2*.Check and reviews logs of all security appliance that are deployed in
the infrastructure at defined regular intervals to ensure that corporate
assets are protected and no breach of security has occurred

*3*.Investigate all suspected breaches, create reports and report the
breaches to federal and/or local authorities if required

*4*.Works with Information Technology infrastructure owners and under the
authority of the Chief Information Officer, implements the Information
Technology security program.

*5*.Works as a liaison with state and federal authorities requiring
information and reports on security incidents to include campus polices,
FBI, or other law enforcement agencies.

*6*.Cultivates, reviews, and interprets new sources of information on
current and emerging laws, rules, regulations, and industry practice
relating to Information Technology security.

*7*.Review new projects and deployments and ensure that they are complaint
with the security standards as laid out in the Information Security Policy
and industry standards

*8*.Develops, implements, and provides training policies, standards,
guidelines, and security monitoring processes in relation to general
control, security programs, privacy regulations, and development and
operation of the client’s infrastructure.

*9*.Provides guidance and direction for the physical and logical protection
of Information Technology assets especially the corporate data

*10*.Conduct audits, oversee intrusion detection simulations, mock drills,
review firewall rule changes, router acl rule changes etc.

*11*.Establishes a reporting process to ensure that management is kept
appraised of the effectiveness of Information Technology security and
problem resolution.

*12*.Ability to read, analyze, and interpret general business periodicals,
professional journals, technical procedures, or governmental regulations.
Ability to write reports, business correspondence, and procedure manuals.
Ability to effectively present information and respond to questions from
groups of managers, clients, customers.


Kindly share your consultant updated profile at *
[email protected] * with details listed below

Candidate Full Name:

Candidate Experience: Total: US:

Candidate Contact No:

Candidate Alternate Contact No:

Candidate Email ID:

Candidate Visa Status:

Current location of the candidate(City, State):

Candidate willing to Relocate (Yes or No):

Billing rate ($/hr ? specify w2, c2c, 1099 and any other benefits)

Availability (no of days, weeks, etc):

I really appreciate your time.

*
*

*After reviewing the resume I will contact you if I need more information.*
*Best Regards,*

Srinivas Reddy
*Magnus International Group*
Exton , PA
[email protected]
www.magnusinfo.com

Under Bill s.1618 Title III passed by the 105th U.S. Congress this mail
cannot be considered as "spam" as long as we include contact information and
a remove link for removal from our mailing list. In order to not be in the
recipients-list for this mail, please reply to us with *"REMOVE"* either in
the subject or in the mail body. Please include all pertinent email
addresses. Our apologies for any inconveniences caused by this mail.

-- 
You received this message because you are subscribed to the Google Groups 
"Oracle-Projects" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/oracle-projects?hl=en.

Reply via email to