Urgent Need :: Security Admin @ Torrance, CA :: 12+ Months

2016-06-16 Thread Amit Kumar
Hi Partner,

Kindly share some matching resume to *ami...@idctechnologies.com
*



*Job Title:   Security Administrator III Assign. Period:
  12  Months+ Location:   Torrance, CA*

Must go to client for a F2F interview.

**SIEM, IPS/IDP, MSS (Managed Security Services)


*Responsibilities:*
   Perform user and access administration on designated systems and
   applications, in accordance with the defined policies, standards and
   procedures.
   Perform system security administration on designated technology
   platforms including operating systems, applications and network security
   devices in accordance with the defined policies, standards and
   procedures, as well as with industry best practices and vendor
   guidelines.
   Perform installation and configuration management of security systems
   and applications, including policy assessment and compliance tools,
   network security appliances and host-based security systems.
   Perform threat and vulnerability assessments, in some cases followed by
   appropriate remedial action, to ensure that systems are protected from
   known and potential threats and are free from known vulnerabilities.
   Locate and repair security problems and failures.
   Collate security incident and event data to produce monthly exception
   and management reports.
   Perform normal and exceptional processing of user access and change
   requests, escalating such requests when appropriate.
   Report unresolved network security exposures misuse or resource or
   non-compliance.

 *Daily Tasks Performed*:
   Identify, investigate, contain and remediate security incidents
   utilizing existing tools including but not limited to: SEIM, Endpoint
   Protections, IDS/IPS, DLP, Web Gateway and Proxy Appliances and
   Vulnerability scanners.
   Create, test, and deploy new access control rules, signatures, and then
   validate results via post-deployment report.
   Ability to evaluate risk to the company and apply this methodology to
   active incidents/vulnerabilities
   Conduct security assessments to proactively and/or reactively identify
   new vulnerabilities within the network
   Creates and implements engineering methodologies to monitor operation of
   IT systems to detect suspicious activity that could include an attempted
   or actual intrusion involving Windows, Unix, Linux, Email or mobile
   platforms.

*Musts*:
   BA/BS in Information Technology, Computer Science, or related field or
   equivalent work experience.
   Understanding of in security subjects.
   Knowledge of security policies and interprets policies
   Understanding of a specific security application or tool and how it
   works
   Ability to assess security safeguards
   Ability to deal with threats and intermediate level incidents
   Ability to deal with intrusions at a moderate threat level
   Knowledge of information security principles, including risk assessment
   and management, threat and vulnerability management, incident response,
   and identity and access management.
   Technical proficiency with security-related systems and applications
   specifically in: developing, documenting, and maintaining security
   procedures.

* Business Experience*

5 to 7 years of combined IT and security work experience with a broad range
of exposure to systems analysis, applications development, database design
and administration.

Wants

• Must be able to perform hands-on support for a wide range of security
technologies including, but not limited to: Security Information and Event
Management (SIEM), IDS/IPS, Managed Security Services (Client), Behavior
Detection, Vulnerability Scanning and Data Loss Prevention Program (DLP).
• Primary responsibilities will be to monitor, investigate, analyze both
raw and normalized network traffic, correlate connected sequences of
events, detect incidents, reconstructed into timelines for analysis,
identify malicious network activity, and generally against in conducting
defensive cyber space operations network infrastructure and intellectual
property.
• Leads technical direction in designing and implementing security
solutions for security technical infrastructure • Must be able to clearly
articulate ideas and solutions during incidents.
• Ability to work independently and manage time effectively utilizing work
and project plans to meet deadlines.
• Member of the Security Incident Response Team.
• Participates in all phases of project planning in security service
support, including functional requirements, design specifications, testing,
implementation into Security Operations.
• Knowledge and administrative experience with one or multiples of the
following:  McAfee Security Suite of Products (McAfee Endpoint Encryption,
McAfee DLP – Device Control, McAfee EPO Management, McAfee Antivirus and
Anti-Malware, McAfee Site Advisor, Intrusion Detection and Prevention
Systems, Internet Gateways and Reverse/Forward 

Urgent Need :: Security Admin @ Torrance, CA :: 12+ Months

2016-06-02 Thread Amit Kumar
Hi Partner,

Kindly share some matching resume to *ami...@idctechnologies.com
*



*Job Title:   Security Administrator III Assign. Period:
12  Months+ Location:   Torrance, CA*

Must go to client for a F2F interview.



**SIEM, IPS/IDP, MSS (Managed Security Services)


*Responsibilities:*
   Perform user and access administration on designated systems and
   applications, in accordance with the defined policies, standards and
   procedures.
   Perform system security administration on designated technology
   platforms including operating systems, applications and network security
   devices in accordance with the defined policies, standards and
   procedures, as well as with industry best practices and vendor
   guidelines.
   Perform installation and configuration management of security systems
   and applications, including policy assessment and compliance tools,
   network security appliances and host-based security systems.
   Perform threat and vulnerability assessments, in some cases followed by
   appropriate remedial action, to ensure that systems are protected from
   known and potential threats and are free from known vulnerabilities.
   Locate and repair security problems and failures.
   Collate security incident and event data to produce monthly exception
   and management reports.
   Perform normal and exceptional processing of user access and change
   requests, escalating such requests when appropriate.
   Report unresolved network security exposures misuse or resource or
   non-compliance.

 *Daily Tasks Performed*:
   Identify, investigate, contain and remediate security incidents
   utilizing existing tools including but not limited to: SEIM, Endpoint
   Protections, IDS/IPS, DLP, Web Gateway and Proxy Appliances and
   Vulnerability scanners.
   Create, test, and deploy new access control rules, signatures, and then
   validate results via post-deployment report.
   Ability to evaluate risk to the company and apply this methodology to
   active incidents/vulnerabilities
   Conduct security assessments to proactively and/or reactively identify
   new vulnerabilities within the network
   Creates and implements engineering methodologies to monitor operation of
   IT systems to detect suspicious activity that could include an attempted
   or actual intrusion involving Windows, Unix, Linux, Email or mobile
   platforms.

*Musts*:
   BA/BS in Information Technology, Computer Science, or related field or
   equivalent work experience.
   Understanding of in security subjects.
   Knowledge of security policies and interprets policies
   Understanding of a specific security application or tool and how it
   works
   Ability to assess security safeguards
   Ability to deal with threats and intermediate level incidents
   Ability to deal with intrusions at a moderate threat level
   Knowledge of information security principles, including risk assessment
   and management, threat and vulnerability management, incident response,
   and identity and access management.
   Technical proficiency with security-related systems and applications
   specifically in: developing, documenting, and maintaining security
   procedures.

Business Experience

5 to 7 years of combined IT and security work experience with a broad range
of exposure to systems analysis, applications development, database design
and administration.

Wants

• Must be able to perform hands-on support for a wide range of security
technologies including, but not limited to: Security Information and Event
Management (SIEM), IDS/IPS, Managed Security Services (Client), Behavior
Detection, Vulnerability Scanning and Data Loss Prevention Program (DLP).
• Primary responsibilities will be to monitor, investigate, analyze both
raw and normalized network traffic, correlate connected sequences of
events, detect incidents, reconstructed into timelines for analysis,
identify malicious network activity, and generally against in conducting
defensive cyber space operations network infrastructure and intellectual
property.
• Leads technical direction in designing and implementing security
solutions for security technical infrastructure • Must be able to clearly
articulate ideas and solutions during incidents.
• Ability to work independently and manage time effectively utilizing work
and project plans to meet deadlines.
• Member of the Security Incident Response Team.
• Participates in all phases of project planning in security service
support, including functional requirements, design specifications, testing,
implementation into Security Operations.
• Knowledge and administrative experience with one or multiples of the
following:  McAfee Security Suite of Products (McAfee Endpoint Encryption,
McAfee DLP – Device Control, McAfee EPO Management, McAfee Antivirus and
Anti-Malware, McAfee Site Advisor, Intrusion Detection and Prevention
Systems, Internet Gateways and Reverse/Forward Proxies.