Dear Consultant, I recently came across your resume posting on the internet and was wondering if you are still available or interested in hearing about other career opportunities? Below is a job description I would like to discuss with you. If you or someone you know might be interested in hearing more about this or other career opportunities please email me a word version of you resume along with the best time and number to reach you at.
*REPLY ME AT:dayle.wil...@itbtalent.com <dayle.wil...@itbtalent.com>* TitleL: Cyber Security Analyst Location: Columbus OH Duration: 6 Months NOTE: !!Must Need GC & USC!! Job Family Description: Designs, analyzes, develops, codes, tests, debugs and documents programming to satisfy business requirements. Proficient in application development skills for more than one technology as well as proficient in multiple design techniques. This position should typically be used for an advanced or lead level resource. Core Qualifications •Extensive knowledge of all common business-related IT functions • Able to identify potential online security risks • Adept at preparing detailed training procedures • Solid understanding of various security software applications • Strong work ethic that includes solid attendance record and frequent overtime • Excellent internal and external communications skills Certifications CISSP® - Certified Information Systems Security Professional Responsibilities: • Responsibility for information cyber security analysis & response with the mission of protecting the firm from internet attacks / threat actors. • Lead initiatives and the implementation of capabilities in order to advance the Cyber Threat program • Enhance and distribute security incident response and escalation procedures to ensure timely and effective handling of security events and alerts • Apply knowledge of technical, analytical skills to ensure the confidentiality, integrity, and availability of all information systems assets and ensure compliance with company policies, procedures, contractual, and regulatory requirements. • A solid understanding of Penetration Testing, Vulnerability Management, Threat Vector Analysis, Intrusion Detection and Prevention, Incident Management and Response, Web Application Security, Risk Assessment and Mitigation methodologies, and Counter Threat Operations. Work Habits / Soft Skills • Ability to work methodically and is very detail oriented • Eagerness to dig into technical questions and examine them from all sides • Enthusiastic and highly adaptable • Strong analytical and diagnostic skills • Demonstrated skills in innovation and collaboration • Keep a current understanding of vulnerabilities from the Internet • Maintaining awareness and knowledge of contemporary standards, practices, procedures and methods • Excellent presentation and communications skills to effectively communicate with management and customers • Ability to clearly articulate complex concepts both written and verbally • Ability, understanding, and usage of active listening skills especially with customers Regards: Dayle Wilson - IT Technical Recruiter ITBrainiac Inc. Direct : 201-448-4949 dayle.wil...@itbtalent.com -- You received this message because you are subscribed to the Google Groups "SAP or Oracle Financials" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-or-oracle-financials+unsubscr...@googlegroups.com. To post to this group, send email to email@example.com. Visit this group at http://groups.google.com/group/sap-or-oracle-financials. For more options, visit https://groups.google.com/d/optout.