*The following requirement is open with our client.*
*Title :** Enterprise Information Security Analyst* *Location : **New York, NY* *Duration : 5 Months * *Rate : $Negotiable * *Visa Status : Any Work Status* *In-Person Interview : No* * Experience (Years) 6-8 Years * *Role Description * • Reducing risk through threat mitigation which in-volves supporting the following: • Performing vulnerability scanning which includes analysis and coordinating remediation • Performing anomaly detection analysis and coordi-nating remediation • Performing intrusion detection analysis and coordi-nating remediation • Performing litigation support associated with Elec-tronic Stored Information which includes but is not limited to the following: o Use approved applications to preserve cus-todial data required by preservation notices o When required perform keyword searches against collected data o Use approved ticketing systems to properly resolve all litigation requests o Interact with divisional peers in order to sat-isfy inter-division preservation notices o Maintain ongoing inventories of custodians and associated legal matters o Participate in the vetting of new applications used to support the collection of ESI o Ensure all systems or applications, used or managed by information security are availa-ble and functioning as required in order to comply with any legal requests o Interact with various support teams in order to comply with any preservation notices or other internal investigations · Participates as appropriate in the planning and im-plementation of any Viacom Information Security projects. · Participates as appropriate in any MTS or Business unit project with information security implications · Assist in performing security risk evaluations and penetration assessments with Senior Information Security staff members *Essential Skills * · 6-8 years’ experience in Information Security Support role · Good understanding of the following: a. TCP/IP and other related protocols. b. Vulnerability scanning, intrusion detection, anomaly detection and associated technologies c. Tools, techniques and standards used to conduct network penetration testing of assets in a Windows, Unix and Linux platform d. Tools, techniques and standards used to conduct ap-plication penetration testing for applications that sup-port but not limited to Java, JBoss, PHP, WebDev e. Layer 2, 3 and 4 infrastructure designs and function-ality f. UNIX, Linux and FreeBSD and associate hardening best practices g. The latest hacking techniques and appropriate countermeasures. h. Firewalls, rule base analysis, stateful inspection, en-cryption and associated algorithms i. Common threat methodologies such as Sans and OWASP j. SQL, MySQL, Oracle and associated hardening best practices · Able to read, understand and interpret at least two of the following: a. Packet captures b. Regex expressions c. Firewall Rules d. Access Control lists · Applying forward strategic thinking to effect smooth day-to-day and long term project planning. Interpreting communi-cations requirements and executing effective documentation for the many projects being deployed with Information Se-curity. · Technical certifications - CISSP ENCE, GCIH, GCIA, CISM, ITIL preferred *Desirable Skills * · Acts responsibly with sensitive and confidential in-formation · Is creative and resourceful as a problem solver · Consistently demonstrates the drive to be deliver successfully even under difficult timelines · Has strong analytical, methodical, investigative and auditing skills · Knows when to make practical rational decisions that reduce risk to Viacom information and Information systems · Is a critical logical thinker who is efficient and orderly · Comfortable with being a project lead or a project resource · Travel domestically and internationally if required and with short notice · Must be reliable and available 24/7 *Please respond with below following details: Please give us particular time for interview slots.* RESOURCE DETAILS Full Name of the Candidate (First, Middle, Last) Contact Number (123-456-7890) Email ID Skype ID US based Photo ID copy is (MUST) Best time to reach for a Tech-screen today (1) (NO 'Advance notices', NO 'Anytime'. Please specify a specific time slot and answer the calls.) Best time to reach for a Tech-screen Next business day (2) Best time to reach for a Tech-screen Next business day (3) Availability (Immediate/x weeks/Specific date) Undergrad Education (Bachelors Degree) Major In University: Attended from: (mm/yy) To: (mm/yy) Work Experience (specify a number) Relevant: years Total: years Current Location (City, State) e.g.: Jersey City, NJ Willing to Relocate (yes/no) Visa Status (USC, GC, H1B, L2, GC-EAD) Hourly Rate (Terms: 1099 or CTC) $ *Employer’s Particulars (if applicable):* Company Name Contact person’s name (Recruiter) Email ID Contact Number(s) Thanks & regards, Kumar ======================================= ASCII Group, LLC 38345 W 10 Mile Rd, Suite 365, Farmington, MI 48335 Direct: (248) 247-8738 Email: [email protected] Website: www.asciigroup.com ==================================== -- You received this message because you are subscribed to the Google Groups "SAP BASIS" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at https://groups.google.com/group/sap-basis. For more options, visit https://groups.google.com/d/optout.
