Urgent Need :: Security Admin @ Torrance, CA :: 12+ Months
Hi Partner, Kindly share some matching resume to *ami...@idctechnologies.com* *Job Title: Security Administrator III Assign. Period: 12 Months+ Location: Torrance, CA* Must go to client for a F2F interview. **SIEM, IPS/IDP, MSS (Managed Security Services) *Responsibilities:* Perform user and access administration on designated systems and applications, in accordance with the defined policies, standards and procedures. Perform system security administration on designated technology platforms including operating systems, applications and network security devices in accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines. Perform installation and configuration management of security systems and applications, including policy assessment and compliance tools, network security appliances and host-based security systems. Perform threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities. Locate and repair security problems and failures. Collate security incident and event data to produce monthly exception and management reports. Perform normal and exceptional processing of user access and change requests, escalating such requests when appropriate. Report unresolved network security exposures misuse or resource or non-compliance. *Daily Tasks Performed*: Identify, investigate, contain and remediate security incidents utilizing existing tools including but not limited to: SEIM, Endpoint Protections, IDS/IPS, DLP, Web Gateway and Proxy Appliances and Vulnerability scanners. Create, test, and deploy new access control rules, signatures, and then validate results via post-deployment report. Ability to evaluate risk to the company and apply this methodology to active incidents/vulnerabilities Conduct security assessments to proactively and/or reactively identify new vulnerabilities within the network Creates and implements engineering methodologies to monitor operation of IT systems to detect suspicious activity that could include an attempted or actual intrusion involving Windows, Unix, Linux, Email or mobile platforms. *Musts*: BA/BS in Information Technology, Computer Science, or related field or equivalent work experience. Understanding of in security subjects. Knowledge of security policies and interprets policies Understanding of a specific security application or tool and how it works Ability to assess security safeguards Ability to deal with threats and intermediate level incidents Ability to deal with intrusions at a moderate threat level Knowledge of information security principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management. Technical proficiency with security-related systems and applications specifically in: developing, documenting, and maintaining security procedures. * Business Experience* 5 to 7 years of combined IT and security work experience with a broad range of exposure to systems analysis, applications development, database design and administration. Wants • Must be able to perform hands-on support for a wide range of security technologies including, but not limited to: Security Information and Event Management (SIEM), IDS/IPS, Managed Security Services (Client), Behavior Detection, Vulnerability Scanning and Data Loss Prevention Program (DLP). • Primary responsibilities will be to monitor, investigate, analyze both raw and normalized network traffic, correlate connected sequences of events, detect incidents, reconstructed into timelines for analysis, identify malicious network activity, and generally against in conducting defensive cyber space operations network infrastructure and intellectual property. • Leads technical direction in designing and implementing security solutions for security technical infrastructure • Must be able to clearly articulate ideas and solutions during incidents. • Ability to work independently and manage time effectively utilizing work and project plans to meet deadlines. • Member of the Security Incident Response Team. • Participates in all phases of project planning in security service support, including functional requirements, design specifications, testing, implementation into Security Operations. • Knowledge and administrative experience with one or multiples of the following: McAfee Security Suite of Products (McAfee Endpoint Encryption, McAfee DLP – Device Control, McAfee EPO Management, McAfee Antivirus and Anti-Malware, McAfee Site Advisor, Intrusion Detection and Prevention Systems, Internet Gateways and Reverse/Forward
Urgent Need :: Security Admin @ Torrance, CA :: 12+ Months
Hi Partner, Kindly share some matching resume to *ami...@idctechnologies.com* *Job Title: Security Administrator III Assign. Period: 12 Months+ Location: Torrance, CA* Must go to client for a F2F interview. **SIEM, IPS/IDP, MSS (Managed Security Services) *Responsibilities:* Perform user and access administration on designated systems and applications, in accordance with the defined policies, standards and procedures. Perform system security administration on designated technology platforms including operating systems, applications and network security devices in accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines. Perform installation and configuration management of security systems and applications, including policy assessment and compliance tools, network security appliances and host-based security systems. Perform threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities. Locate and repair security problems and failures. Collate security incident and event data to produce monthly exception and management reports. Perform normal and exceptional processing of user access and change requests, escalating such requests when appropriate. Report unresolved network security exposures misuse or resource or non-compliance. *Daily Tasks Performed*: Identify, investigate, contain and remediate security incidents utilizing existing tools including but not limited to: SEIM, Endpoint Protections, IDS/IPS, DLP, Web Gateway and Proxy Appliances and Vulnerability scanners. Create, test, and deploy new access control rules, signatures, and then validate results via post-deployment report. Ability to evaluate risk to the company and apply this methodology to active incidents/vulnerabilities Conduct security assessments to proactively and/or reactively identify new vulnerabilities within the network Creates and implements engineering methodologies to monitor operation of IT systems to detect suspicious activity that could include an attempted or actual intrusion involving Windows, Unix, Linux, Email or mobile platforms. *Musts*: BA/BS in Information Technology, Computer Science, or related field or equivalent work experience. Understanding of in security subjects. Knowledge of security policies and interprets policies Understanding of a specific security application or tool and how it works Ability to assess security safeguards Ability to deal with threats and intermediate level incidents Ability to deal with intrusions at a moderate threat level Knowledge of information security principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management. Technical proficiency with security-related systems and applications specifically in: developing, documenting, and maintaining security procedures. Business Experience 5 to 7 years of combined IT and security work experience with a broad range of exposure to systems analysis, applications development, database design and administration. Wants • Must be able to perform hands-on support for a wide range of security technologies including, but not limited to: Security Information and Event Management (SIEM), IDS/IPS, Managed Security Services (Client), Behavior Detection, Vulnerability Scanning and Data Loss Prevention Program (DLP). • Primary responsibilities will be to monitor, investigate, analyze both raw and normalized network traffic, correlate connected sequences of events, detect incidents, reconstructed into timelines for analysis, identify malicious network activity, and generally against in conducting defensive cyber space operations network infrastructure and intellectual property. • Leads technical direction in designing and implementing security solutions for security technical infrastructure • Must be able to clearly articulate ideas and solutions during incidents. • Ability to work independently and manage time effectively utilizing work and project plans to meet deadlines. • Member of the Security Incident Response Team. • Participates in all phases of project planning in security service support, including functional requirements, design specifications, testing, implementation into Security Operations. • Knowledge and administrative experience with one or multiples of the following: McAfee Security Suite of Products (McAfee Endpoint Encryption, McAfee DLP – Device Control, McAfee EPO Management, McAfee Antivirus and Anti-Malware, McAfee Site Advisor, Intrusion Detection and Prevention Systems, Internet Gateways and Reverse/Forward Proxies.