Information Security Consultant at Jersey City, NJ---- 12+ months

2017-02-14 Thread Abhay Rockzz
*Passport number with Visa and DL copy is mandatory for H1B/opts at the
time of submission. *



Greetings,



Hope you are doing great Today..



I'm Abhay from IDC Technologies Inc

I have an opportunities with me you might be interested, Please review the
Job specifications below and let me know if you are interested.

For Immediate consideration please share your updated resume at
abha...@idctechnologies.com.



*POSITION:*



*Position Role   : Information Security  Consultant *

*Assignment Location   : Jersey City, NJ*

*Project Duration   : 12+ months*





*REQUIREMENT:*



Review change requests for the firewall rules for accuracy, authenticity
and completeness based on network topology, policies and standards. Assess
risk with change requests based on the policies and standards. Review and
approve/reject change requests.Work with various teams involved in the
process for problem resolution, enhancement and supportCreate Firewall Risk
analyses on a monthly basis, as well as for KCIs, audits and ad-hoc reports
utilizing Excel formulas and macros, Visual Basic scripts and SQL Query



Thanks & Regards

Abhay Tiwari

Sr. Technical Recruiter*| *IDC Technologies Inc.

1851 McCarthy Boulevard, Suite 116, Milpitas, CA, USA, 95035
Phone: 408-418-5778 Ext 3061*|* Email: abha...@idctechnologies.com

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Information Security Analyst//Indianapolis, IN// Phone then F2F

2017-01-31 Thread Priyanka Katiyar
I am looking for an *Information Security Analyst III.  *

The position is 6-12 months

Candidates must have Unix/Linux, Active Directory, Windows and experience
with Kerberos protocols.

Candidates do NOT have to be local BUT they MUST be willing to do ONSITE
interviews.



*Sr. Analyst Security III - Single-identity project *

*background with Unix/Linux Administration ** Candidates need
to have an understanding of Kerberos.

Will be working onsite Indianapolis, IN

*Location: Indianapolis, IN*

*Rates: $40/hr (MAX)*

*End client name: Anthem*

*Interview mode: Phone then F2F*



H1b's are fine for this one.

Centrify is the product.  The technology is Kerberos across Linux/Unix.

Familiarity with Windows Domain and Unix/Linux as well as knowledge of
Kerberos.

Active directory engineer with knowledge Unix/Linux, RedHat. Will provide
the training needed for Centrify.

Senior AD Administrator would be a good fit for this.  It's a Microsoft
tool.

Will be doing the day-after support, change log-in preferences.

2nd or 3rd level support with customers, good communication, should be able
to work through questions on an individual level.

Will demonstrate skills and knowledge of this role, don't need a ton of
years of experience.

Doing a single-identity migration






Priyanka Katiyar

Technical Recruiter

Nityo Infotech Corp.

Direct: 609-378-1139

Email: priyanka.kati...@nityo.com

Gtalk: puja123h...@gmail.com

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


URGENT:Direct Client Need: Information Security Analyst at TX

2016-11-16 Thread Divya D Williams
*Please send the resumes to: di...@innocoresolutions.com
*

*Information Security Analyst*

*6+ Months*

*Dallas/ Fort worth, TX*

*PS+ F2F*

*Scanned copy of work authorization is a must *



*Job Description *

The Senior Analyst Information Security will be part of a team responsible
for Information Security Assurance. This team is primarily responsible for
conducting Information security risk assessments, assist with risk
mitigation guidance, and also play the role of a security
consultant/liaison with other IT groups and Business units.



*Specific Skills/Qualifications required with # of years of experience:  *



•   Bachelor’s degree in computer science, electrical engineering,
computer engineering, information technology, or related field



•   5 years of experience in the field of Information Security,
including 3 years of experience performing security assessments



•   Experience performing security assessments on cloud based
services and on premises applications and infrastructure.



•   Ability to think critically when assessing a
system/process/technology without requirement of a checklist



•   Good knowledge of IT security controls and applying appropriate
controls to manage security risk



•   Experience in developing security policies/standards and
performing security risk assessments



*Regards*



*Divya D Williams*

*972-215-0460*

*di...@innocoresolutions.com *

What you do today can improve all your tomorrows.

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Urgent requirement on Information Security Consultant

2016-11-15 Thread recruiter HR
Hi,



Pleasure mailing you. I came across your profile in job portal and wanted
to touch base with your regarding one of our Global Implementation
partner/Client opportunity.

Please go through the below requirement and let me know if you are
comfortable for the position.

Please send me your updated resume along with the best hourly rate, visa
status and availability.

An early response is really appreciated.



*Position:  Information Security Consultant*

*Location: Atlanta*

*Education:   4-year College degree and CISSP preferred*

*Client:Norfolk Southern*

*Duration:  6-12 months*



*Skills: *

· Performs as a team member in the Information Security Operations
team in a day-to-day operations support role of critical security
infrastructure.

· Must have the demonstrated ability to work with a diverse team
and lead/assist in developing and improving the company’s Information
Security program.

· Ability to recognize and identify potential threats to corporate
information systems and data.

· Ability to lead security investigations and mitigate security
incidents.

· Strong knowledge and hands on experience with designing and
maintaining a large enterprise deployment of workstation and server
anti-virus and host intrusion prevention software.  Knowledge of McAfee ePO
and Virus Scan products a plus.

· Strong knowledge and hands on experience with security best
practice approaches to application coding.  Foundational knowledge of HP
Fortify and Web Inspect is a plus.

· Experience with data loss prevention tools, web browsing filters,
email filters, vulnerability scans, SIEMs, and IPSs are a plus.

· Working knowledge of scripting languages.

· Splunk experience is a plus.

· Experience with Windows and Unix operating systems and performing
deep packet network analysis.

· Travel will be less than 5% and after hours on call is required.



*Initial Project Assignment / Responsibilities *

The resource will work in Information Security maintaining static and
dynamic code scanning environments.  This includes daily troubleshooting,
recommending changes to the environment and implementing changes as
needed.  Assist in supporting other products within Security Operations
such as the ePO, PKI environment, DLP products, email filter, web browsing
filter, and IPS units.  The resource will identify potential threats to
corporate systems and data and make recommendations to mitigate associated
risks.  The resource will also assist in security incident triaging as
needed.







Thanks & Regards,

Bharadwaj,

Inent Inc.,

Work: 909-610-3103 Ext: 116.

kaniti.chowd...@inentinc.com

www.inentinc.com

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Information Security Analyst Location: Miami, FL/Juno Beach, FL Duration : 6+ Months

2016-11-04 Thread tabish abdin
Hello

Greetings From,

IDC Technologies Inc.



Any interest in following position.


Title: Information Security Analyst



Location:  Miami, FL/Juno Beach, FL



Duration : 6+ Months





*Job description :*





*Description: *Our Client, a wholesale electricity supplier and a provider
of clean energy is looking for an Information Security Analyst in Miami,
FL/Juno Beach, FL.



*Responsibilities *include but are not limited to the following:



•   Monitor and respond to network hardware and software problems
utilizing software testing tools

•   Monitor, evaluate and respond to security events (alerts,
tickets, and reports);

•   Perform first and/or second level (Tier 1 and/or Tier 2)
analysis and resolution;

•   Support the Information Security on-call analyst (other Tier 2
analysts), the Cyber Threat Intelligence team (Tier3);

•   Review Database Activity Monitoring reports and specific side
projects as required;

•   Support corporate-wide IT systems and services;

•   Resolve problems and implement processes and systems that will
enhance the operational effectiveness of the organization;

•   Provide support for client/server, voice and data networks, or
wireless services.

•   Willingness to travel at least 2 times per month;

•   Participate in a 24/7 on-call rotation



Requirements:

•   Experience working with Cyber Security Operations Center;

•   Experience with cyber security technologies (Firewalls, web
proxy’s, Intrusion Prevention Systems (IPS), host antivirus software etc.);

•   Experience with basic network technologies (Network flow,
protocols, function of networkdevices etc.);

•   Experience with SQL for creating/modifying queries.



 Thanks and Regards

 Tabish Abdin

Technical Recruiter

 IDC Technologies Inc.

1851 McCarthy Boulevard, Suite 116|Milpitas, CA – 95035

Ph: 408-668-9301
Email: tabish.ab...@idctechnologies.com Website: www.idctechnologies.com;

-- 
*Please send me the resume-*
*tabish.ab...@idctechnologies.com *

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Need Local::Information Security Analyst::Midtown, NYC::1 year + extensions

2016-10-19 Thread Deepak Kumar
*Title: Information Security Analyst*

Location: Midtown, NYC

Duration: 1 year + extensions

Interview: Face-To-Face

Number of position: 2 consulting assignments



*Must have CISSP Certification*



*Required Details: *

· Candidates should be experienced with Information Security Audit,
Access Permissions, Red Flags, provisioning new accounts.  The candidate
should be able to hit the ground running very quickly CISSP is a must. This
position reports into the Director of Information Security.

· Develop strategy and approaches and implement the full life cycle
of the Identity and Access Management (IAM) program as part of the
Information Security services of the 1199SEIU Funds; access, plan, test,
report and recommend appropriate remediation measures to ensure Information
Security access management processes and standards are maintained

· Assist in the development of the IAM security architecture,
policies, principles and standards; ensure architecture meets best
practices based on industry and organizational needs

· Conduct IAM and Role Based Access Controls (RBAC) review for new
applications and scheduled access validation of critical Fund applications;
partner with Information Technology (IT) and various business units to
discuss access issues, explain access rights and manage process

· Develop and maintain a privileged account management process

· Maintain existing and manage the addition of applications to the
Funds electronic identity management suite including Active Directory, MS
Exchange and business applications.

· Follow up on access management deficiencies identified in risk
reviews, self-assessments, risk assessments, internal and external audits;
ensure appropriate remediation measures are implemented

· Perform additional duties and projects as assigned by management

* Qualifications: *

· Bachelor’s degree in Information Security or equivalent years of
experience required

· Minimum three (3) years identity and access management experience
in Information Security or related discipline (i.e. Information Technology,
Privacy, or Compliance) required

· Certified Information Systems Security Professional (CISSP)
certification required

· Knowledge of identity access technologies and practices

· Knowledge of Public Key Infrastructure (PKI) and certificate
based authentication a plus

· Demonstrated experience with risk management, access rights
and/or identity management required

· Knowledge of common information security management frameworks
such as: International Standards Organization (ISO) 17799/27001,
Information Technology Infrastructure Library (ITIL), Control Objectives
for Information and Related Technology (CobiT) and National Institute of
Standards and Technology (NIST) frameworks

· Experience troubleshooting information security related problems
and incidents; knowledge of security architecture including encryption,
firewalls, VPN’s, anti-virus systems and vulnerability management preferred

· Excellent troubleshooting and analytical thinking skills

· Superb communication, interpersonal skills and collaborative
skills a must

· Self-directed, self-starter, and motivated with the ability to
work with minimal supervision



*Regards,*

*Deepak Kumar*

*Lead Recruiter*

*Direct: 310-448-1044*

*Email ID: deep...@rjtcompuquest.com *

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Urgent requirement on Information Security Architect at Freddie Mac

2016-08-25 Thread recruiter HR
Hi,



Pleasure mailing you. I came across your profile in job portal and wanted
to touch base with your regarding one of our Global Implementation
partner/Client opportunity.

Please go through the below requirement and let me know if you are
comfortable for the position.

Please send me your updated resume along with the best hourly rate, visa
status and availability.

An early response is really appreciated.



Title:* Information Security Architect*

 Client:* Freddie Mac*

Location:* Reston, VA*

*Phone / In person (Skype) / Start *



*US Citizen, Greencard, EAD, H1B (No OPT EAD)*



*Control Minder and eTrust experience. Any resume without that experience
is not a fit.*



Position Overview

· This Information Security Senior position is part of the
Technology Services Group in the Information Technology division at Freddie
Mac.

· The role will maintain a continuous process improvement work
environment, recommending and implementing new/improved processes in
accordance with industry standards and best practices.

· The role will lead efforts to identify the critical resources,
collect the security requirements from the customers, prepare the policies,
implement the policies and maintain it.

· The role will perform all procedures necessary to protect the
safety of the application resources internal and external threats and will
lead efforts in the identification and resolution of critical security
issues.

· This role will also support actions or recommend alternate
solutions to resolve problems or situations related to the protection of
the information/resources within the enterprise( Freddie Mac )



Responsibilities include:

• Tool Management – Manage/Operate the existing tools like CA Control
Minder / (eTrust ) Access Control and Vormetric Data Encryption etc.. in
order to manage the security policy in Freddie Mac.



Basic Requirements

• 5-7 years of professional IT experience, at least 3 years of information
security experience

• Bachelor’s degree in Information Security, Information Technology,
Management Information Systems or equivalent work experience

• Solid knowledge of CA Control Minder / (eTrust ) Access Control and/or
Vormetric Data Encryption including Installation, Configuration,
Administration, Policy Development and Troubleshooting etc.

• UNIX shell scripting skill is a plus.

• Strong technical writing skills required.









Thanks & Regards,

Bharadwaj,

Inent Inc.,

Work: 909-610-3103 Ext: 116.

kaniti.chowd...@inentinc.com

www.inentinc.com

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Need: Information Security Project Manager/Engineer

2016-08-08 Thread Gopal M
*Please submit resumes to go...@lancoglobal.com *


*Information Security Project Manager/Engineer*

Location : Boca Raton, FL

Position type : 6 Month Contract

Client: Computer Aid


· *BD-31- Information Security Project Manager/Engineer in Boca
Raton, FL (contract to hire)*

o   *Face to face interview required- client will assist with travel
expenses to attend the interview*



*MUST HAVE:*

   - 3-5 years in IT Systems Security Auditing including:
  - At least 1 PCI/SOX audit compliance/remediation project
   - CISA certification
  - or other advanced industry recognized information security
  certification
   - Hands on experience with:
  - Office365 Implementations- knowledge of security tools built in and
  Office365 controls, tools, and options
  - Security Engineering
  - Computer and Network Security
  - Authentication and Security Protocols
  - Networking and Web Protocols
  - Database Security
  - Secure Data Handling Methodologies
  - Encryption
  - Data Leakage prevention
  - Auditing/Authentication/Vulnerability Checks
   - Strong familiarity with PCI as well as SOX and PII compliance &
   standards
   - Excellent understanding of/experience with:
  - *Protecting data as it moves/transfers around within Office365*
  - *Protecting Data at Rest (encryption)*
  - *Writing documentation on systems, processes, procedures, etc.*
   - Understanding of network and web related protocols (e.g., TCP/IP,
   HTTP, SSL, IPSEC, etc.)
   - Solid understanding of web application and systems/network
   vulnerabilities and the tools used to identify these
   - Expert knowledge of security engineering tasks, techniques and tools
   - Knowledge of software/application security including:
  - Auditing
  - Authorization
  - Vulnerability Checking
   - Exceptional understanding of infrastructure, server and network
   security
   - In-depth technical knowledge of multi-level security networks and
   cross-domain solutions.



*NICE TO HAVE:*

   - CISSP certification
   - PMP certification


*Thanks & Regards,*

*Gopal*
*972-848-3529*
*go...@lancoglobal.com *

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Information Security Professional_Plano, TX_12+ Months

2016-03-08 Thread Ankur Gulati
PLEASE SEND ME THE RESUME AT ankur.gul...@diverselynx.com

Hello,



Greetings form *Diverse Lynx, LLC*.



We have an urgent need for a *Information Security Professional *for one of
our clients *Plano, TX*. Please go through the below requirement if you or
your consultants are open for projects and interested in the below
requirement ,Please respond back with latest resume along with details ASAP.



*Title: *Information Security Professional

*Location: *Plano, TX

*Duration: *12+ Months



*Req Details:*

*Information Security Professional (Policy, Procedures Guideline and
Standards)*

· 8 + years relevant work experience in Information Security

· Work Experience in Information Security Policy Procedures,
Guideline and standards writing.

· Advanced knowledge of NIST, ISO27001, PCI-DSS, standards and
relevant regulatory compliance, industry regulations.

· Ability to facilitate and lead meetings/projects and execute the
writing process to research, draft, and gather feedback/approvals based a
formalized process

· Create detailed and accurate documentation for an on-line audience

· Collaborate with peers, leadership, technology, compliance,
product development, legal, and other key stakeholders to write procedures
and other technical documents

· Collaborate with team members to design and development internal
operating procedures and style guide to ensure a consistent product from
the team

· Focus on delivering procedures on time and to customer
expectations

· Contribute ideas to improve on existing standards or create new
processes

· Advanced knowledge of data analysis tools and techniques and
Microsoft Office tools (Word, Excel, and PowerPoint) required

· Strong analytical ability

· Excellent written and verbal communication skills and the ability
to communication with all levels of leadership internally and externally

· Detail oriented self-starter with effective time management and
organizational skills

· Demonstrates a high degree of business professionalism and
understands the importance of building relationships with internal partners



*Thanks & Regards*



*Ankur Gulati*

Diverse Lynx* | *www.diverselynx.com* |*

300 Alexander Park, Suite 200 Princeton, NJ 08540
P: 732-452-1006 Ext 238 | *ankur.gul...@diverselynx.com
*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Information Security Analyst_ with McAfee IPS & QRadar Exp @ Lincolnshire, IL

2016-01-26 Thread Alok Chaudhary
Hi



Greetings for the day..!!!



*Role : Information Security Analyst*

*Location : Lincolnshire, IL*

*Duration : 8 months*

*Client: TCS*

*Responsibilities: *

Good Knowledge in Managed Security Services.
Good understanding of security technologies and its concepts.
Installation of McAfee IPS and QRadar SIEM product releases and patches.
Well experienced in upgrade activities of McAfee NSM and QRadar SIEM.
Addition/modification of Configuration items McAfee IDS/IPS, QRadar SIEM.
Upgrades security systems by monitoring security environment; identifying
security gaps; evaluating and implementing enhancements.





*Thanks & Regards*

*Alok Chaudhary*

*Sr. Executive*



Nityo Infotech Corp.

www.nityo.com

*alok.chaudh...@nityo.com *

*Desk* : 412-200-1541

*Fax* : 609 799 5746



USA | Canada | India | Singapore | Malaysia | Indonesia | Philippines |
Thailand  | UK | Australia / New Zealand



Nityo Infotech has been rated as One of the top 500 Fastest growing
companies by INC 500



Disclaimer: http://www.nityo.com/Email_Disclaimer.html

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


URGENT NEED - Information Security Analyst at NJ

2016-01-20 Thread Sr. Executive
*Please send the resumes to divya_das...@aesinc.us.com
*



Information Security Analyst

Location: Jersey City, NJ

Rate : $26 to $32/hr C2C

PS+ Skype

*Locals/ Nearby candidates will be given first preference*



*Scanned copy of work authorization & passport are required during
submission*



•Perform Information Security access and provisioning requests
within established Service Level Agreements.

•Administer user systems and data entitlements, across multiple
platforms and applications.

•Ensure system access requests are processed with high quality and
accuracy.

•Coordinate with local security coordinators and application data
owners to ensure access to programs and applications are processed and
verified within the most current standards and requirements.

•Onboard new applications and apply internal Access Control
Security standards.

•Provide security analytic support to new system entitlement
standards, modifications and projects.

•Participate in special projects as assigned.

*Thanks & Regards*

*Divya Dasari*

*Lead IT Recruiter*


* Ph: 630-315-9569divya_das...@aesinc.us.com *

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


URGENT NEED - Information Security Analyst at NJ

2016-01-20 Thread Sr. Executive
*Please send the resumes to divya_das...@aesinc.us.com
*



Information Security Analyst

Location: Jersey City, NJ

Rate : $26 to $32/hr C2C

PS+ Skype

*Locals/ Nearby candidates will be given first preference*



*Scanned copy of work authorization & passport are required during
submission*



•Perform Information Security access and provisioning requests
within established Service Level Agreements.

•Administer user systems and data entitlements, across multiple
platforms and applications.

•Ensure system access requests are processed with high quality and
accuracy.

•Coordinate with local security coordinators and application data
owners to ensure access to programs and applications are processed and
verified within the most current standards and requirements.

•Onboard new applications and apply internal Access Control
Security standards.

•Provide security analytic support to new system entitlement
standards, modifications and projects.

•Participate in special projects as assigned.

*Thanks & Regards*

*Divya Dasari*

*Lead IT Recruiter*


* Ph: 630-315-9569divya_das...@aesinc.us.com *

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


URGENT Need Information Security Analyst at NJ

2016-01-20 Thread Sr. Executive
*Please send the resumes to divya_das...@aesinc.us.com
*



*Information Security Analyst*

*Location: Jersey City, NJ *

*Rate : $26 to $32/hr C2C*

*PS+ Skype*

*Locals/ Nearby candidates will be given first preference*



*Scanned copy of work authorization & passport are required during
submission*



•Perform Information Security access and provisioning requests
within established Service Level Agreements.

•Administer user systems and data entitlements, across multiple
platforms and applications.

•Ensure system access requests are processed with high quality and
accuracy.

•Coordinate with local security coordinators and application data
owners to ensure access to programs and applications are processed and
verified within the most current standards and requirements.

•Onboard new applications and apply internal Access Control
Security standards.

•Provide security analytic support to new system entitlement
standards, modifications and projects.

•Participate in special projects as assigned.



*Thanks & Regards*

*Divya Dasari*

*Lead IT Recruiter*


* Ph: 630-315-9569divya_das...@aesinc.us.com *

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


URGENT Need Information Security Analyst at NJ

2016-01-20 Thread Sr. Executive
*Please send the resumes to divya_das...@aesinc.us.com
*



*Information Security Analyst*

*Location: Jersey City, NJ *

*Rate : $26 to $32/hr C2C*

*PS+ Skype*

*Locals/ Nearby candidates will be given first preference*



*Scanned copy of work authorization & passport are required during
submission*



•Perform Information Security access and provisioning requests
within established Service Level Agreements.

•Administer user systems and data entitlements, across multiple
platforms and applications.

•Ensure system access requests are processed with high quality and
accuracy.

•Coordinate with local security coordinators and application data
owners to ensure access to programs and applications are processed and
verified within the most current standards and requirements.

•Onboard new applications and apply internal Access Control
Security standards.

•Provide security analytic support to new system entitlement
standards, modifications and projects.

•Participate in special projects as assigned.



*Thanks & Regards*

*Divya Dasari*

*Lead IT Recruiter*


* Ph: 630-315-9569divya_das...@aesinc.us.com *

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


URGENT NEED - Security Analyst / Information Security Analyst at IL

2016-01-19 Thread Sr. Executive
*Please send the resumes to divya_das...@aesinc.us.com
*



*JOB DESCRIPTION*



*Security Analyst / Information Security Analyst*

*Location: Chicago, IL*

*Duration: 6+ Months*

*Rate – Open on W2/ C2C *



*Scanned copies of work authorization & passport are required during
submission*



JD:

The Security Environment Protection Technician leads efforts related to
current and emerging technology risks, including developing processes and
controls as well as managing multiple projects that are design to
remediate, detect and or/eliminate IT security risks. The technician
utilizes advanced security skills to execute on highly complex projects,
configuration and mitigation, and problem resolution related to any
Investments technological environment for example: Oracle and SQL
databases, Windows and Linux OS, and various application security areas.



Specific responsibility:



• Participate in multiple projects and activities associated with
technologies and processes designed to protect from current and/or emerging
threats: research, investigation, testing, evaluation, design,
implementation, configuration, documentation, and/or operations.

• Help drive the planning and delivery of technologies/controls
implemented to detect, avert, investigate, and/or eliminate threats to the
security of the Investments environment.

• Develops implementation and verification procedures to ensure
successful installation of security controls and systems designed to help
detect or mitigate risk within the environment (including functionality,
integrity, and stress testing; test matrices; and definition of test
methodologies and strategy).

• Help drive efforts to ensure plans integrate effectively with
other technologies deployed to detect and manage security events within the
Investments environment.



Education:



College Degree or equivalent work experience; 5+ years’ work experience in
security and/or risk management, application and database security or
related technology based role.

Certifications in area of specialty a plus.  Examples include: CISSP,
CSSLP, CISA, CISM, GIAC certs, CFE, CNP, CEH,








*Thanks & Regards*

*Divya Dasari*

*Lead IT Recruiter*


* Ph: 630-315-9569divya_das...@aesinc.us.com *

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


URGENT NEED - Security Analyst / Information Security Analyst at IL

2016-01-19 Thread Sr. Executive
*Thanks & Regards*

*Divya Dasari*

*Lead IT Recruiter*

*Please send the resumes to divya_das...@aesinc.us.com
*



*JOB DESCRIPTION*



*Security Analyst / Information Security Analyst*

*Location: Chicago, IL*

*Duration: 6+ Months*

*Rate – Open on W2/ C2C *



*Scanned copies of work authorization & passport are required during
submission*



JD:

The Security Environment Protection Technician leads efforts related to
current and emerging technology risks, including developing processes and
controls as well as managing multiple projects that are design to
remediate, detect and or/eliminate IT security risks. The technician
utilizes advanced security skills to execute on highly complex projects,
configuration and mitigation, and problem resolution related to any
Investments technological environment for example: Oracle and SQL
databases, Windows and Linux OS, and various application security areas.



Specific responsibility:



• Participate in multiple projects and activities associated with
technologies and processes designed to protect from current and/or emerging
threats: research, investigation, testing, evaluation, design,
implementation, configuration, documentation, and/or operations.

• Help drive the planning and delivery of technologies/controls
implemented to detect, avert, investigate, and/or eliminate threats to the
security of the Investments environment.

• Develops implementation and verification procedures to ensure
successful installation of security controls and systems designed to help
detect or mitigate risk within the environment (including functionality,
integrity, and stress testing; test matrices; and definition of test
methodologies and strategy).

• Help drive efforts to ensure plans integrate effectively with
other technologies deployed to detect and manage security events within the
Investments environment.



Education:



College Degree or equivalent work experience; 5+ years’ work experience in
security and/or risk management, application and database security or
related technology based role.

Certifications in area of specialty a plus.  Examples include: CISSP,
CSSLP, CISA, CISM, GIAC certs, CFE, CNP, CEH,








*Thanks & Regards*

*Divya Dasari*

*Lead IT Recruiter*


* Ph: 630-315-9569divya_das...@aesinc.us.com *

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


URGENT- Security Analyst / Information Security Analyst at IL

2016-01-08 Thread Sr. Executive
*Please send the resumes to divya_das...@aesinc.us.com
*



*Scanned Copy of work authorization & Photo ID is must during submission*


*URGENT NEED:*



*Security Analyst / Information Security Analyst*

*Location: Chicago, IL*

*Duration: 6+ Months*

*Rate - $50 on c2c *



JD:

The Security Environment Protection Technician leads efforts related to
current and emerging technology risks, including developing processes and
controls as well as managing multiple projects that are design to
remediate, detect and or/eliminate IT security risks. The technician
utilizes advanced security skills to execute on highly complex projects,
configuration and mitigation, and problem resolution related to any
Investments technological environment for example: Oracle and SQL
databases, Windows and Linux OS, and various application security areas.



*Specific responsibility: *



· Participate in multiple projects and activities associated with
technologies and processes designed to protect from current and/or emerging
threats: research, investigation, testing, evaluation, design,
implementation, configuration, documentation, and/or operations.



· Help drive the planning and delivery of technologies/controls
implemented to detect, avert, investigate, and/or eliminate threats to the
security of the Investments environment.



· Develops implementation and verification procedures to ensure
successful installation of security controls and systems designed to help
detect or mitigate risk within the environment (including functionality,
integrity, and stress testing; test matrices; and definition of test
methodologies and strategy).



· Help drive efforts to ensure plans integrate effectively with
other technologies deployed to detect and manage security events within the
Investments environment.



*Education:*



College Degree or equivalent work experience; 5+ years’ work experience in
security and/or risk management, application and database security or
related technology based role.



Certifications in area of specialty a plus.  Examples include: CISSP,
CSSLP, CISA, CISM, GIAC certs, CFE, CNP, CEH,





*Regards*


*Marie D Dasari630-315-9569*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


URGENT- Security Analyst / Information Security Analyst at IL

2016-01-08 Thread Sr. Executive
*Please send the resumes to divya_das...@aesinc.us.com
*



*Scanned Copy of work authorization & Photo ID is must during submission*


*URGENT NEED:*



*Security Analyst / Information Security Analyst*

*Location: Chicago, IL*

*Duration: 6+ Months*

*Rate - $50 on c2c *



JD:

The Security Environment Protection Technician leads efforts related to
current and emerging technology risks, including developing processes and
controls as well as managing multiple projects that are design to
remediate, detect and or/eliminate IT security risks. The technician
utilizes advanced security skills to execute on highly complex projects,
configuration and mitigation, and problem resolution related to any
Investments technological environment for example: Oracle and SQL
databases, Windows and Linux OS, and various application security areas.



*Specific responsibility: *



· Participate in multiple projects and activities associated with
technologies and processes designed to protect from current and/or emerging
threats: research, investigation, testing, evaluation, design,
implementation, configuration, documentation, and/or operations.



· Help drive the planning and delivery of technologies/controls
implemented to detect, avert, investigate, and/or eliminate threats to the
security of the Investments environment.



· Develops implementation and verification procedures to ensure
successful installation of security controls and systems designed to help
detect or mitigate risk within the environment (including functionality,
integrity, and stress testing; test matrices; and definition of test
methodologies and strategy).



· Help drive efforts to ensure plans integrate effectively with
other technologies deployed to detect and manage security events within the
Investments environment.



*Education:*



College Degree or equivalent work experience; 5+ years’ work experience in
security and/or risk management, application and database security or
related technology based role.



Certifications in area of specialty a plus.  Examples include: CISSP,
CSSLP, CISA, CISM, GIAC certs, CFE, CNP, CEH,





*Regards*


*Marie D Dasari630-315-9569*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at https://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Information security analyst at NYC, NY

2015-11-12 Thread Abhay Tiwari
Hi,

Hope you are doing great !!!

*Information security analyst*

*Client: Warner Music Group*

*Location: NYC, NY*





Notes about Security position:



We are looking for an Information security analyst responsible for
supporting security application and projects at a high level.

The information security analyst will be responsible for coordinating with
global teams to assess, design implement and recommend various aspects of
the company’s information security and compliance program.



Description / Responsibilities:

· Perform security reviews, assessments and analysis

· Liase with global business / technical teams to provide security
solutions

· Perform daily operations and maintenance of global security
infrastructure & tools

· Develop awareness of emerging threats

· Provide research for security related assignments

· Assist in account management oversight functions



Technical Qualifications/Required Skills

· Proficient in Microsoft Office Suite (Word, Excel, PowerPoint)

· Understanding of Windows and Unix operating system fundamentals

· Solid understanding of networking systems and firewalls

· Knowledge of Active Directory

· Knowledge of CyberArk Software a plus



Non-Technical Qualifications/Required Skills

· Good organization and prioritization skills.

· Proven project management background.

· Excellent communications skills

· Good interpersonal skills.

· Self motivated and managed with minimal supervision



Education/Experience

· Bachelor’s degree in information security, Information
Technology, or related discipline. Advanced degree a plus

· 3-5 years experience in Information Security/IT Audit

· Experience with programing languages a plus (Powershell, Python,
etc…)

· Industry certifications (CISSP, CISA) a plus

· Working experience with CyberArk Software a plus



*Thanks & Regards *

*Abhay Tiwari*

Sr. Technical Recruiter

abha...@idctechnologies.com  | 408-457-9399
Ex. 2033

Gtalk : abhaytiwari9009

Skype: akt.idc

IDC Technologies, Inc. |1851 McCarthy Boulevard, Suite 116, Milpitas, CA,
USA, 95035
Web: www.idctechnologies.com

ISO 9001-2008 Certified



"Under Bill s. 1618 Title III passed by the 105th U.S. Congress this mail
cannot be considered spam as long as we include a way to be removed from
our mailing list. Simply send us an e-mail with REMOVE in the subject and
we will gladly REMOVE you from our mailing list.”

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


CLOSURE POSITION :- Information Security (Symantec CSP), Moorestown, NJ

2015-10-13 Thread shubham singh
*Hi Associate,*
*Please go through the Job Description and let me know your Interest .*
*" Reply me at shubha...@itscient.com "*

*TITLE:- Information Security (Symantec CSP)*
*LOCATION: Moorestown, NJ*
*Duration: 6+ Months*
*Mode of Interview :- SKYPE + Telephonic*

*Job Description:*

*6-8 years’ experience in Information security spanning management of
end-point protection and application whitelisting technologies. *
*Good platform administration/management experience on Windows, Unix .*
*Hard skills –*


   - *6 – 8 years in Information security*
   - *Sound Administration and management experience of Symantec critical
   system protection or similar products such as Bit9, IBM RealSecure, HP-UX,
   SourceFire, Trippingpoint, McAfee Network Security or any relevant
   HIDS/HIPS tool. *

*including:*
*1.   Good understanding of the various use-cases involved in using these
technologies such as application whitelisting, HIPS, virtual system
security etc.*
*2.   Whitelisting Policy implementation based on business cases*
*3.   Distribution best practices for CSP agents*
*4.   Availability and performance parameter monitoring for CSP server and
agents*
*5.   Understanding of the key parameters to measure health of the CSP
service*


   - *Sound Experience in SQL Database, building various SQL queries and
   report preparation from SQL.*


*Soft skills –*
*a)   Excellent written and communication skills*
*b)   Ability to work between multiple teams*
*c) Good documentation and presentation skills*

-- 

*Thanks and Regards,*

*Shubham Singh*

*ll IT-SCIENT - Talent Management Group l*

*ll Phone: 510 -972-5255 <510%20-972-5235> ll Fax: 877.701.4872
<877.701.4872>*

*ll Email: shubha...@itscient.com  ll
Web: www.itscient.com <http://www.itscient.com/> ll*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


URGENT NEED :- Information Security (Symantec CSP), Moorestown, NJ

2015-10-13 Thread vicky menon
*Hi Associate,*
*Please go through the Job Description and let me know your Interest .*
*" Reply me at vi...@itscient.com
 // vicky.kumaritsci...@gmail.com
 "*

*TITLE:- Information Security (Symantec CSP)*
*LOCATION: Moorestown, NJ*
*Duration: 6+ Months*
*Mode of Interview :- SKYPE + Telephonic*

*Job Description:*

*6-8 years’ experience in Information security spanning management of
end-point protection and application whitelisting technologies. *
*Good platform administration/management experience on Windows, Unix .*
*Hard skills –*


   - *6 – 8 years in Information security*
   - *Sound Administration and management experience of Symantec critical
   system protection or similar products such as Bit9, IBM RealSecure, HP-UX,
   SourceFire, Trippingpoint, McAfee Network Security or any relevant
   HIDS/HIPS tool. *

*including:*
*1.   Good understanding of the various use-cases involved in using these
technologies such as application whitelisting, HIPS, virtual system
security etc.*
*2.   Whitelisting Policy implementation based on business cases*
*3.   Distribution best practices for CSP agents*
*4.   Availability and performance parameter monitoring for CSP server and
agents*
*5.   Understanding of the key parameters to measure health of the CSP
service*


   - *Sound Experience in SQL Database, building various SQL queries and
   report preparation from SQL.*


*Soft skills –*
*a)   Excellent written and communication skills*
*b)   Ability to work between multiple teams*
*c) Good documentation and presentation skills*
*​*

*Vicky Menon*
*|| IT–SCIENT | Fremont, CA | **| Phone: 510.972.5241 ||
Fax: 877.701.4872 || Email: vi...@itscient.com
 ||Web: www.itscient.com <http://www.itscient.com/> ||*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


CLOSURE POSITION :- Information Security (Symantec CSP), Moorestown, NJ

2015-10-12 Thread shubham singh
*Hi Associate,*
*Please go through the Job Description and let me know your Interest .*
*" Reply me at shubha...@itscient.com "*

*TITLE:- Information Security (Symantec CSP)*
*LOCATION: Moorestown, NJ*
*Duration: 6+ Months*
*Mode of Interview :- SKYPE + Telephonic*

*Job Description:*

*6-8 years’ experience in Information security spanning management of
end-point protection and application whitelisting technologies. *
*Good platform administration/management experience on Windows, Unix .*
*Hard skills –*


   - *6 – 8 years in Information security*
   - *Sound Administration and management experience of Symantec critical
   system protection or similar products such as Bit9, IBM RealSecure, HP-UX,
   SourceFire, Trippingpoint, McAfee Network Security or any relevant
   HIDS/HIPS tool. *

*including:*
*1.   Good understanding of the various use-cases involved in using these
technologies such as application whitelisting, HIPS, virtual system
security etc.*
*2.   Whitelisting Policy implementation based on business cases*
*3.   Distribution best practices for CSP agents*
*4.   Availability and performance parameter monitoring for CSP server and
agents*
*5.   Understanding of the key parameters to measure health of the CSP
service*


   - *Sound Experience in SQL Database, building various SQL queries and
   report preparation from SQL.*


*Soft skills –*
*a)   Excellent written and communication skills*
*b)   Ability to work between multiple teams*
*c) Good documentation and presentation skills*

-- 

*Thanks and Regards,*

*Shubham Singh*

*ll IT-SCIENT - Talent Management Group l*

*ll Phone: 510 -972-5255 <510%20-972-5235> ll Fax: 877.701.4872
<877.701.4872>*

*ll Email: shubha...@itscient.com  ll
Web: www.itscient.com <http://www.itscient.com/> ll*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


CLOSURE POSITION :- Information Security (Symantec CSP), Moorestown, NJ

2015-10-12 Thread shubham singh
*Hi Associate,*
*Please go through the Job Description and let me know your Interest .*
*" Reply me at shubha...@itscient.com "*

*TITLE:- Information Security (Symantec CSP)*
*LOCATION: Moorestown, NJ*
*Duration: 6+ Months*
*Mode of Interview :- SKYPE + Telephonic*

*Job Description:*

*6-8 years’ experience in Information security spanning management of
end-point protection and application whitelisting technologies. *
*Good platform administration/management experience on Windows, Unix .*
*Hard skills –*


   - *6 – 8 years in Information security*
   - *Sound Administration and management experience of Symantec critical
   system protection or similar products such as Bit9, IBM RealSecure, HP-UX,
   SourceFire, Trippingpoint, McAfee Network Security or any relevant
   HIDS/HIPS tool. *

*including:*
*1.   Good understanding of the various use-cases involved in using these
technologies such as application whitelisting, HIPS, virtual system
security etc.*
*2.   Whitelisting Policy implementation based on business cases*
*3.   Distribution best practices for CSP agents*
*4.   Availability and performance parameter monitoring for CSP server and
agents*
*5.   Understanding of the key parameters to measure health of the CSP
service*


   - *Sound Experience in SQL Database, building various SQL queries and
   report preparation from SQL.*


*Soft skills –*
*a)   Excellent written and communication skills*
*b)   Ability to work between multiple teams*
*c) Good documentation and presentation skills*

-- 

*Thanks and Regards,*

*Shubham Singh*

*ll IT-SCIENT - Talent Management Group l*

*ll Phone: 510 -972-5255 <510%20-972-5235> ll Fax: 877.701.4872
<877.701.4872>*

*ll Email: shubha...@itscient.com  ll
Web: www.itscient.com <http://www.itscient.com/> ll*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


FAST MOVING :- Information Security (Symantec CSP), Moorestown, NJ

2015-10-12 Thread vicky menon
*Hi Associate,*
*Please go through the Job Description and let me know your Interest .*
*" Reply me at vi...@itscient.com
 // vicky.kumaritsci...@gmail.com
 "*

*TITLE:- Information Security (Symantec CSP)*
*LOCATION: Moorestown, NJ*
*Duration: 6+ Months*
*Mode of Interview :- SKYPE + Telephonic*

*Job Description:*

*6-8 years’ experience in Information security spanning management of
end-point protection and application whitelisting technologies. *
*Good platform administration/management experience on Windows, Unix .*
*Hard skills –*


   - *6 – 8 years in Information security*
   - *Sound Administration and management experience of Symantec critical
   system protection or similar products such as Bit9, IBM RealSecure, HP-UX,
   SourceFire, Trippingpoint, McAfee Network Security or any relevant
   HIDS/HIPS tool. *

*including:*
*1.   Good understanding of the various use-cases involved in using these
technologies such as application whitelisting, HIPS, virtual system
security etc.*
*2.   Whitelisting Policy implementation based on business cases*
*3.   Distribution best practices for CSP agents*
*4.   Availability and performance parameter monitoring for CSP server and
agents*
*5.   Understanding of the key parameters to measure health of the CSP
service*


   - *Sound Experience in SQL Database, building various SQL queries and
   report preparation from SQL.*


*Soft skills –*
*a)   Excellent written and communication skills*
*b)   Ability to work between multiple teams*
*c) Good documentation and presentation skills*

*​*

*Vicky Menon*
*|| IT–SCIENT | Fremont, CA | **| Phone: 510.972.5241 ||
Fax: 877.701.4872 || Email: vi...@itscient.com
 ||Web: www.itscient.com <http://www.itscient.com/> ||*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


CLOSURE POSITION :- Information Security (Symantec CSP), Moorestown, NJ

2015-10-09 Thread shubham singh
*Hi Associate,*
*Please go through the Job Description and let me know your Interest .*
*" Reply me at shubha...@itscient.com "*

*TITLE:- Information Security (Symantec CSP)*
*LOCATION: Moorestown, NJ*
*Duration: 6+ Months*
*Mode of Interview :- SKYPE + Telephonic*

*Job Description:*

*6-8 years’ experience in Information security spanning management of
end-point protection and application whitelisting technologies. *
*Good platform administration/management experience on Windows, Unix .*
*Hard skills –*


   - *6 – 8 years in Information security*
   - *Sound Administration and management experience of Symantec critical
   system protection or similar products such as Bit9, IBM RealSecure, HP-UX,
   SourceFire, Trippingpoint, McAfee Network Security or any relevant
   HIDS/HIPS tool. *

*including:*
*1.   Good understanding of the various use-cases involved in using these
technologies such as application whitelisting, HIPS, virtual system
security etc.*
*2.   Whitelisting Policy implementation based on business cases*
*3.   Distribution best practices for CSP agents*
*4.   Availability and performance parameter monitoring for CSP server and
agents*
*5.   Understanding of the key parameters to measure health of the CSP
service*


   - *Sound Experience in SQL Database, building various SQL queries and
   report preparation from SQL.*


*Soft skills –*
*a)   Excellent written and communication skills*
*b)   Ability to work between multiple teams*
*c) Good documentation and presentation skills*


-- 

*Thanks and Regards,*

*Shubham Singh*

*ll IT-SCIENT - Talent Management Group l*

*ll Phone: 510 -972-5255 <510%20-972-5235> ll Fax: 877.701.4872
<877.701.4872>*

*ll Email: shubha...@itscient.com  ll
Web: www.itscient.com <http://www.itscient.com/> ll*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


CLOSURE POSITION :- Information Security (Symantec CSP), Moorestown, NJ

2015-10-09 Thread vicky menon
*Hi Associate,*
*Please go through the Job Description and let me know your Interest .*
*" Reply me at vi...@itscient.com  //
vicky.kumaritsci...@gmail.com  "*

*TITLE:- Information Security (Symantec CSP)*
*LOCATION: Moorestown, NJ*
*Duration: 6+ Months*
*Mode of Interview :- SKYPE + Telephonic*

*Job Description:*

*6-8 years’ experience in Information security spanning management of
end-point protection and application whitelisting technologies. *
*Good platform administration/management experience on Windows, Unix .*
*Hard skills –*


   - *6 – 8 years in Information security*
   - *Sound Administration and management experience of Symantec critical
   system protection or similar products such as Bit9, IBM RealSecure, HP-UX,
   SourceFire, Trippingpoint, McAfee Network Security or any relevant
   HIDS/HIPS tool. *

*including:*
*1.   Good understanding of the various use-cases involved in using these
technologies such as application whitelisting, HIPS, virtual system
security etc.*
*2.   Whitelisting Policy implementation based on business cases*
*3.   Distribution best practices for CSP agents*
*4.   Availability and performance parameter monitoring for CSP server and
agents*
*5.   Understanding of the key parameters to measure health of the CSP
service*


   - *Sound Experience in SQL Database, building various SQL queries and
   report preparation from SQL.*


*Soft skills –*
*a)   Excellent written and communication skills*
*b)   Ability to work between multiple teams*
*c) Good documentation and presentation skills*

*​*

*Vicky Menon*
*|| IT–SCIENT | Fremont, CA | **| Phone: 510.972.5241 <510.972.5241> ||
Fax: 877.701.4872 <877.701.4872> || Email: vi...@itscient.com
 ||Web: www.itscient.com <http://www.itscient.com/> ||*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


IMMEDIATE START :- Information Security (Symantec CSP), Moorestown, NJ

2015-10-08 Thread vicky menon
*Hi Associate,*
*Please go through the Job Description and let me know your Interest .*
*" Reply me at vi...@itscient.com  //
vicky.kumaritsci...@gmail.com  "*

*TITLE:- MongoDB Consultant*
*LOCATION: Santa Clara,CA*
*Duration: 6+ Months*
*Mode of Interview :- SKYPE + F2f*

*Job Description:*


* Demonstrated expertise in MongoDB.
. Design, review, and implement enhancements to MongoDB architecture
to improve performance and scalability.
. Knowledge of DB performance/scaling concepts and tuning best practices.
. Expertise in JSON document modeling.
. Expertise in Shell Scripting, preferably Python.
. Great problem solving skills are a must.
. Has managed the full operational lifecycle of NoSQL databases
including sizing, technology selection, deployment, monitoring &
decommissioning.*


*Vicky Menon*
*|| IT–SCIENT | Fremont, CA | **| Phone: 510.972.5241 <510.972.5241> ||
Fax: 877.701.4872 <877.701.4872> || Email: vi...@itscient.com
 ||Web: www.itscient.com  ||*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


CLOSURE POSITION :- Information Security Consultant(McAfee Network Security),Moorestown, NJ

2015-09-01 Thread vicky menon
*Hi Associate,*
*Please go through the Job Description and let me know your Interest .*
*" Reply me at vi...@itscient.com  "*

*Role: Information Security Consultant(**McAfee Network Security)*
*Location: Moorestown, NJ*
*Duration: 9+ Months*

*Key Skills :-*


   -
*6-8 years’ experience in Information security spanning management of
   end-point protection and application whitelisting technologies.  *
   - *Good platform administration/management experience on Windows, Unix*


Hard skills

   -
*6- 8 years in Information security *
   -
*Sound Administration and management experience of Symantec critical system
   protection or similar products such as Bit9, IBM RealSecure, HP-UX,
   SourceFire, Trippingpoint, McAfee Network Security or any relevant
   HIDS/HIPS tool. *
   - *Sound Experience in SQL Database, building various SQL queries and
   report preparation from SQL*

*​*

*Vicky Menon*
*|| IT–SCIENT | Fremont, CA | **| Phone: 510.972.5241 <510.972.5241> ||
Fax: 877.701.4872 <877.701.4872> || Email: vi...@itscient.com
 ||Web: www.itscient.com <http://www.itscient.com/> ||*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


FAST MOVING :- Information Security Consultant(McAfee Network Security),Moorestown, NJ

2015-08-31 Thread vicky menon
*Hi Associate,*
*Please go through the Job Description and let me know your Interest .*
*" Reply me at vi...@itscient.com  "*

*Role: Information Security Consultant(**McAfee Network Security)*
*Location: Moorestown, NJ*
*Duration: 9+ Months*

*Key Skills :-*


   -
*6-8 years’ experience in Information security spanning management of
   end-point protection and application whitelisting technologies.  *
   - *Good platform administration/management experience on Windows, Unix*


Hard skills

   -
*6- 8 years in Information security *
   -
*Sound Administration and management experience of Symantec critical system
   protection or similar products such as Bit9, IBM RealSecure, HP-UX,
   SourceFire, Trippingpoint, McAfee Network Security or any relevant
   HIDS/HIPS tool. *
   - *Sound Experience in SQL Database, building various SQL queries and
   report preparation from SQL*

*​*

*Vicky Menon*
*|| IT–SCIENT | Fremont, CA | **| Phone: 510.972.5241 ||
Fax: 877.701.4872 || Email: vi...@itscient.com
 ||Web: www.itscient.com <http://www.itscient.com/> ||*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


FAST MOVING:- Information Security Consultant, Moorestown, NJ

2015-08-28 Thread vicky menon
*Hi Associate,*
*Please go through the Job Description and let me know your Interest .*
*" Reply me at vi...@itscient.com  "*

*Role: Information Security Consultant*
*Location: Moorestown, NJ*
*Duration: 9+ Months*

*Key Skills :-*


   -
*6-8 years’ experience in Information security spanning management of
   end-point protection and application whitelisting technologies.  *
   - *Good platform administration/management experience on Windows, Unix*


Hard skills

   -
*6- 8 years in Information security *
   -
*Sound Administration and management experience of Symantec critical system
   protection or similar products such as Bit9, IBM RealSecure, HP-UX,
   SourceFire, Trippingpoint, McAfee Network Security or any relevant
   HIDS/HIPS tool. *
   - *Sound Experience in SQL Database, building various SQL queries and
   report preparation from SQL.*


*​*

*Vicky Menon*
*|| IT–SCIENT | Fremont, CA | **| Phone: 510.972.5241 ||
Fax: 877.701.4872 || Email: vi...@itscient.com
 ||Web: www.itscient.com <http://www.itscient.com/> ||*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


CLOSURE POSITION :- Information Security Management Consultant, Franklin Lakes NJ

2015-07-27 Thread vicky menon
*Hi Associate,*
*Please go through the Job Description and let me know your Interest .*
*" Reply me at vi...@itscient.com  "*

*Position: Information Security Management Consultant*
*Location: Franklin Lakes NJ*
*Duration: 6+ Months*

*Job Description*:

Extensive expertise in the following areas:


   - *Good knowledge of risk management concepts including risk assessment
   and risk treatment techniques and methodologies.*
   - *Information Security Management System*
   - *Compliance (ISO27001, SOX, HIPAA, GLBA, PCI DSS, SSAE16 etc.)*
   - *Technical Risk Assessment (Application Assessment, Control Testing,
   etc.)*


Thanks and regards,

Vicky Kumar Menon
|| IT-SCIENT || Phone: 510.972.5241 || Fax: 877.701.4872 ||
Email:*vi...@itscient.com
* ||Web: www.itscient.com ||

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


URGENT NEED :- Information Security Management Consultant, Franklin Lakes NJ

2015-07-24 Thread vicky menon
*Hi Associate,*
*Please go through the Job Description and let me know your Interest .*
*" Reply me at vi...@itscient.com  "*

*Position: Information Security Management Consultant*
*Location: Franklin Lakes NJ*
*Duration: 6+ Months*

*Job Description*:

Extensive expertise in the following areas:


   - *Good knowledge of risk management concepts including risk assessment
   and risk treatment techniques and methodologies.*
   - *Information Security Management System*
   - *Compliance (ISO27001, SOX, HIPAA, GLBA, PCI DSS, SSAE16 etc.)*
   - *Technical Risk Assessment (Application Assessment, Control Testing,
   etc.)*


Thanks and regards,

Vicky Kumar Menon
|| IT-SCIENT || Phone: 510.972.5241 || Fax: 877.701.4872 ||
Email:*vi...@itscient.com
* ||Web: www.itscient.com ||

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Requirement on Production Application Support Analyst (Information Security) at Stamford CT, USA

2015-05-07 Thread recruiter HR
Hi,



Pleasure mailing you. I came across your profile in job portal and wanted
to touch base with your regarding one of our client opportunity. Please go
through the below requirement and let me know if you are comfortable for
the position.

Please send me your updated resume along with the best rate cap, visa
status and availability. An early response is really appreciated



Job Role   : *Production Application Support Analyst (**Information
Security**)*

Location   : Stamford CT, USA

Duration: 6 months

*Job purpose:* The purpose of this Role to provide operation security
services to C&IB within Information Security Team. This includes
applications, Databases and Network security as well.

*Role & responsibilities:*

· To provide expert information security advice that enables
technology to be implemented in line with *security policy and risk
appetite.*

· To review & approve security-related change requests

· To review approve or query requests and to ensure Group Policy is
adhered to.

· Maintenance & support of security technology solutions such as
CyberArk and Check Point Media Encryption and Guardium

· Investigating security exceptions  as highlighted  to the team

· Management and participation in Information Security Incidents

· To manage and participate  in Security Incidents and
Investigations

· Management of the C&IB Data Loss Prevention service and
investigation of alerts

· Provision of advice and guidance to Technology and the Business
with respect to security queries, issues or incidents

· Develop close working relationships with ‘line teams’ to ensure
early visibility of technology change and high visibility of security
responsibilities.

· Create and document guidelines on appropriate ways of
implementing technology within C&IB to comply with Group security policy.
Manage the review process with the relevant support teams through to
agreement, publication and implementation.  Provide expert assistance on
how to meet security policy and guidelines.

· Manage and / or participate in the implementation of security
service improvement activities as required.

· Support and engagement  with  the wider CIB and Group Information
Security  teams

*Skills required:*

§  5+ years’ experience in security operations or a comparable technical
support function.

§  Strong general awareness of Information Security policies and Technology
Risk Management from an enterprise / banking systems context

§  Exposure to multiple, diverse technical configurations, technologies and
processing environments.

§  Experience of working in a dynamic environment often with shifting
priorities

§  Experience of working within complex global organizations

§  Experience of building relationships with key business leaders and
senior customers within Technology

§  Experience of IS policy implementation and interpretation such as ISO
27001/2

§  Good general awareness of Information Security policies and Technology
Risk Management from an enterprise / banking systems context

§  Information security expertise generally and specialist expertise
relating to specific infrastructure and/or application technologies.

§  Established experience across two or more of the following information
security disciplines and/or application technologies: -

· Security Incident Management

· Security Change Management

· Investigations or Special Handling

· Data Loss Prevention

· Cyber-Ark

· Check Point Media Encryption

§  Experience of implementation of security controls, ideally supported by
CISSP or equivalent certification.

§  Experience of creating quality policy, guidelines and business case
documentation for new initiatives.

§  Experience of security incident management

§  Excellent communicator - verbal and written

§  Stamina and determination – a strong sense of initiative, a ‘can do’
attitude and a deep drive to improve service quality

§  Intellectually strong – able to balance business and technical drivers
with excellent problem management skills

*Prior experience:*

2 years in security operations or comparable technical support function

Technical skills required:

Require to have good technical knowledge in the below mentioned domains:

§  UNIX/Linux

§  Windows

§  Databases

§  IIS/Apache/Web server security

§  Active Directory

§  Application Security/Security coding

§  Networks

§  Privileged Access Management



*Thanks & Regards,*

*  Bharadwaj*

Prosercorp d.b.a Tekskills Inc

ISO 9001: 2008 Certified Company

Phone: 732-640-2152 |Fax: 888-543-5125

bharad...@tekskillsinc.com

200, MetroplexDrive, Suite414, Edison, NJ – 08817

www.tekskillsinc.com

Gmail: recrui...@gmail.com  / Gtalk: recrui1er

-- 
You received this message because you are subscribed to the Google Groups 
"R

Sr. Information Security Engineer -- Phoenix, AZ

2015-02-09 Thread chris brown
Dear Professionals,
Please have the below requirement and send me your consultant resumes That
fits the below job description.

Please reply at chris.br...@panzersolutions.com

*Note :* This is Not our direct client requirement.

Position   : Sr. Information Security Engineer
Location   : Phoenix, AZ
Duration   : 6+ Months Contract

*Minimum Qualifications:*
Bachelor of Science in CIS/MIS/CS/CE, Engineering/Technology or related
field or equivalent experience/training
8 years working within Information Technology and 6 years specifically in
Information Security
Must be knowledgable with security platforms and software products.
Knowledge of Microsoft Windows Active Directory, Internet security, network
security technologies, and third party security or audit tools is required.
In addition; understanding how to implement application level security
controls and mechanisms
Must be well organized, thrive in a sense-of-urgency environment, leverage
best practices, and most importantly, innovate through any problem with a
can-do attitude
Must have solid understanding of various logging methods and security event
terminology
Proficient in MS Office applications including Visio
Excellent written and verbal communication skills

*Preferred Qualifications:*
CISSP, CISM, CISA, GIAC or other security certifications highly desired

Thank you for your time and look forward to work with you.

Thanks
Chris Brown | Technical Recruiter
Panzer Solutions LLC
chris.br...@panzersolutions.com
203-652-1444*123

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Information Security Architect -- Irving, TX

2015-02-02 Thread chris brown
Dear Professionals,
Please have the below requirement and send me your consultant resumes That
fits the below job description.

Please reply at chris.br...@panzersolutions.com

*Note :* This is Not our direct client requirement.

Position : Information Security Architect
Location : Irving, TX
Duration : 12+ months Contract

*Primary responsibilities:*
Perform detailed risk evaluation and develop mitigation plan for various IT
projects, including but not limited to reviewing architecture designs and
providing detailed guidance on risk mitigation.
Provide consulting services to IT organization and confirm adherence to
Company's security policy and regulatory requirements such as *PCI, PII,
HIPAA, and SOX*. Act as a security liaison with AA.com team, and play a
lead role in developing and maintaining DevOps security strategy for the
organization
Serve as the subject matter expert on all matters of Enterprise Information
Security.

Research and recommend enhancements to the enterprise information security
services. Review firewall change escalations and provide technical guidance
to security engineering team Understand security policies
and procedures and assist in enforcing them Research and analyze attempted
breaches of data security and rectifying security weaknesses Assist in
creating a catalog of Security standards and commonly used
patterns in the organization

Education/Experience 5-7 years experience in Information Technology with a
focus on Information Security Bachelor's degree in Computer Science or
related field CISSP Certification preferred
Responsibility level Exercises independent judgment with direction from
supervisor
Skills General knowledge surrounding Information Security as applied at
multiple layers (Platform, Networking, Mobility, Application, Web, etc.)

Good knowledge of security controls such as firewalls, IDS/IPS, SIEM, WEb
Application Firewalls, Internet Proxy, etc. Good understanding of Identity
& Access Good understanding of DevOps Capable of addressing crowds as a
Security Consultant Proficiency in key aspects of Information Security
(Confidentiality, Integrity, Accessibility, Authenticity, Non-Repudiation)
Proficiency in Information Security controls (Administrative, Logical,
Physical) Excellent documentation and verbal skills The ability to handle
multiple projects simultaneously.

Thank you for your time and look forward to work with you.

Thanks
Chris Brown | Technical Recruiter
Panzer Solutions LLC
chris.br...@panzersolutions.com
203-652-1444*123

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Need Information Security Expert (Integration and Transformation Initiatives)

2014-12-10 Thread manmohan thakur
*Hi,*

*hope You are doing good.*

*Please send resumes to **manmo...@genuineitllc.com
*



*Information Security Expert (Integration and Transformation Initiatives)*

*6+ Months Contract*

*Wilton, CT*

*Rate: $70.00/hr on C2C*



*In-Person Interview in is REQUIRED*



*The Position:*

· To handle most of the actualization pipeline converting
conceptually what a company should do for information risk, policies,
standards, procedures, templates and completed assessments
To work independently and lead workshops to decompose the information
security risk management project objectives into manageable tasks with
resource estimates

· To lead an executive level discussion to decide the risk rating
scale

· To lead meetings with information security stakeholders to decide
policy and procedure

· To draft policies, procedures and templates

· To lead workshops to train people on the procedures and templates

· To design Information Security Management Process including
requirements collection, operational design and training of personnel;
operational metrics definition and documentation (such as audit gap
remediation management process, etc.)\



*Requirements:*

· Must have INTEGRATION EXPERIENCE - driven transformation from
Program and Project levels

· InfoSec (Information Security) expertise particularly with NIST,
HIPAA and COSO/COBIT

· Strong conceptualization capabilities

· Strong Project Management experience

· Excellent Process Design and Documentation skills

· Strong NIST experience



*The Initiatives:*

· Security & Compliance

· Information Security

· Integration Initiatives

· Transformation Initiatives



*The Ideal Background*

· Heavy Integration experience to drive Transformation Initiatives
at a program/ project level

· Information Security expertise primarily with NIST framework

· HIPAA or COSO or COBIT or Information Security Management (CISM)
– strategically planned and managed business-aligned IS program driven by
business priorities, emerging risk, budget, best practices, COBIT, NIST and
ISO standards

· NIST Framework or ISO or PMI/ PMBOK or COBIT or SOX or CISM or
PRINCE2 or COSO or HIPAA or GLBA or FFIEC or FRB or FINRA or SEC or State
Regulators

· Process Design & Documentation

· Reducing risk and addressing SOX, GLBA and FFIEC regulatory
requirements

· Supporting business management and engaging with auditors and
regulators (ex: FRB, SEC, FINRA, State)

· Managing projects for business system implementations, control/
process improvements, risk remediation and application development

· Forecasting and managing annual investment budgets; On-boarding
staff and procuring hardware and software resources

· Application Development Management – designing and developing
business systems following SDLC methodology

· Meeting business requirements, performing object-oriented design,
managing diverse teams, solving technical issues and learning and applying
new technologies quickly and effectively

· Experience with Six Sigma or PMI/PMP or any related models

· IS Management / Operations; Project Management; Staff Management/
Mentoring; Risk Management/ Assessment; Architecture; Process Design;
Strategy Training / Business Support; Audit/ Regulatory Engagement; Risk
Remediation / Controls; SDLC / Agile / Waterfall; Policy / Regulatory
Compliance; Vendor Management/Negotiation; Object-Oriented Design

· Excellent process design and documentation skills



*The Personality:*

· Very personable with excellent communication skills (articulate/
eloquent)

· Proactive and matured with his/her approach and communication

· Has the ability to collaborate with all the members of the
organization at all levels

· Highly knowledgeable and experience with the ins & outs of
managing security & compliance initiatives



*The Hiring Process:*

· Initial Phone Interview

· Technical Screening (Phone or In-Person)

· Final Interview (In-Person)

*Manmohan Thakur**[image: image001]*

Genuineit LLC *Certified Women Owned Business*

Making IT Happen…

[image: cid:image001.png@01CD0B34.DFB7EBF0]


Ph: 713-234-5905ext :101

Fax:(512)949-5092

*manmo...@genuineitllc.com *

*mohan.genuineit...@gmail.com *

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Need Information Security Analyst

2014-12-01 Thread manmohan thakur
*Hi,*

*hope You are doing good.*

*Please send resumes to manmo...@genuineitllc.com
*



*Duration: One year contract*

*Target rate(s): $45-48/hr*

*Location: Forth worth, TX*



*Brief Job details:*  Manage and fulfill access control requests, assist
end users with *Archer* usage issues, and complete *break*-*fix*
*requests*. Development
within Archer will include creating and editing, applications and modules
within Archer. Understanding of security fundamentals, as Archer projects
will range across all of security: Findings, Policy Exceptions, Devices,
Enterprise Application Inventory, Business Continuity Planning, etc.
Communication with business units in order to gather requirements for new
projects and work using agile methodology to deliver new functionality.



*Skills:* Problem-solving, *prior* *application*/*software* *administration*
*experience*, *communication* *skills* – speaking directly with *business*
*units* and other *IT* *teams*, prior security experience and *RSA* *Archer*,
must have 3 years of Information Security experience and experience with
*RSA* *Archer* as an *Archer* *Administrator*.

*Manmohan Thakur**[image: image001]*

Genuineit LLC *Certified Women Owned Business*

Making IT Happen…

[image: cid:image001.png@01CD0B34.DFB7EBF0]


Ph: 713-234-5905ext :101

Fax:(512)949-5092

*manmo...@genuineitllc.com *

*mohan.genuineit...@gmail.com *

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Need Information Security Analyst

2014-11-28 Thread manmohan thakur
*Hi,*

*hope You are doing good.*

*Please send resumes to manmo...@genuineitllc.com
*



*Duration: One year contract*

* rate(s): $45-48/hr*

*Location: Forth worth, TX*



*Brief Job details:*  Manage and fulfill access control requests, assist
end users with *Archer* usage issues, and complete *break*-*fix*
*requests*. Development
within Archer will include creating and editing, applications and modules
within Archer. Understanding of security fundamentals, as Archer projects
will range across all of security: Findings, Policy Exceptions, Devices,
Enterprise Application Inventory, Business Continuity Planning, etc.
Communication with business units in order to gather requirements for new
projects and work using agile methodology to deliver new functionality.



*Skills:* Problem-solving, *prior* *application*/*software* *administration*
*experience*, *communication* *skills* – speaking directly with *business*
*units* and other *IT* *teams*, prior security experience and *RSA* *Archer*,
must have 3 years of Information Security experience and experience with
*RSA* *Archer* as an *Archer* *Administrator*.



*Manmohan Thakur**[image: image001]*

Genuineit LLC *Certified Women Owned Business*

Making IT Happen…

[image: cid:image001.png@01CD0B34.DFB7EBF0]


Ph: 713-234-5905ext :101

Fax:(512)949-5092

*manmo...@genuineitllc.com *

*mohan.genuineit...@gmail.com *

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Information Security Architect position at Cincinnati, OH

2014-09-18 Thread purushotham k
Hello,



Greetings from Oberon IT Inc!!!



We have a Direct Client Requirement for you and the details are as follows



*ROLE TITLE: **Information Security Architect*

*LOCATION:  Cincinnati, OH*

*DURATION: Open (Contract or fulltime)*



*REQUIRED SKILLS:*



· Bachelor's Degree

· Minimum of 3 years of experience in Engineering involving *product
design, development, or test *

· Desired Characteristics Familiarity with *Identity Federation
technologies including; experience integrating large scale identity
solutions *

· Experience with *Siteminder and LDAP *

· Scripting experience (*Python and Shell)*

· Experience with *Java / XML / XPATH*



*** Please send us the following details along with the updated resume for
immediate Consideration*



Full Name:

Contact number:

Email Id:

Current Location:

Relocation:

Visa Status & validity:

Interview Availability:

Earliest Availability:

F2F Interview:

Total Experience:

Rate:

Skype ID:

Education (Bachelors):

Last 4 Digits of SSN:

DOB (MM/DD/):

Skills: (year’s experiences with the key skills):

Is the Candidate on a project currently?

Communication skills (out of 10):

Provide any 2 Local references of previous projects:

Employer details:





Best Regards,



Purushotham

Sr. Technical Recruiter | Oberon IT Inc

1404 W. Walnut Hill Lane | Suite: 102, Irving, TX 75038.

Email: purushot...@oberonit.com

Direct: 972-330-5903 | Fax: 1-800-218-2820

www.oberonit.com

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Information Security Architect position at Cincinnati, OH

2014-09-17 Thread purushotham k
Hello,



Greetings from Oberon IT Inc!!!



We have a Direct Client Requirement for you and the details are as follows



*ROLE TITLE: **Information Security Architect*

*LOCATION: Cincinnati, OH*

*DURATION: Open (Contract or fulltime)*



*REQUIRED SKILLS:*



· Bachelor's Degree

· Minimum of 3 years of experience in Engineering involving *product
design, development, or test *

· Desired Characteristics Familiarity with *Identity Federation
technologies including; experience integrating large scale identity
solutions *

· Experience with *Siteminder and LDAP *

· Scripting experience (*Python and Shell)*

· Experience with *Java / XML / XPATH *





Best Regards,



Purushotham

Sr. Technical Recruiter | Oberon IT Inc

1404 W. Walnut Hill Lane | Suite: 102, Irving, TX 75038.

Email: purushot...@oberonit.com

Direct: 972-330-5903 | Fax: 1-800-218-2820

www.oberonit.com

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Information Security Architect position at Cincinnati, OH

2014-08-22 Thread purushotham k
Hello,



Greetings from Oberon IT Inc!!!



We have a Direct Client Requirement for you and the details are as follows



*ROLE TITLE: **Information Security Architect*

*LOCATION:  Cincinnati, OH*

*DURATION: Long term*



*REQUIRED SKILLS:*



· *Bachelor's Degree*

· Minimum of 3 years of experience in Engineering involving *product
design, development, or test *

· Desired Characteristics Familiarity with Identity Federation technologies
including; experience integrating large scale identity solutions

· Experience with *Siteminder and LDAP *

· Scripting experience (*Python and Shell)*

· Experience with *Java / XML / XPATH *





Best Regards,



Purushotham

Sr. Technical Recruiter | Oberon IT Inc

1404 W. Walnut Hill Lane | Suite: 102, Irving, TX 75038.

Email: purushot...@oberonit.com

Direct: 972-330-5903 | Fax: 1-800-218-2820

www.oberonit.com

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/d/optout.


Information Security - Verification and Validation Specialist-Illinois-Chicago

2014-02-03 Thread MANEESH KUMAR
Hello,

Please send me the best-fit profiles for the below position.

I can be reached via email: *mane...@sriveninfosys.net
* or phone: *732-835-0098*




*Information Security - Verification and Validation Specialist*

*8 months *

*Chicago--Illinois*

*Phone interview *

*Rate: $**70 CTC*



*Over 8 years exp. System Security Assessment*

*Desired Start Date:* ASAP

*Position Description:*

The position is responsible for assisting with the design and operation of
a process to validate technical security requirements on various
technologies throughout the enterprise;
Assisting in the verification of remediation efforts related to technical
security issues on various technologies throughout the enterprise;
Assisting in the development of requirements for a tool to manage workflow
of remediation verification efforts and track technical security issues; and
Assisting with the selection and implementation of tools to validate and
report the status of technical security control requirements on various
technologies throughout the enterprise



*Skills Required:*

Experience in system / server / network / software security
Comprehensive understanding of role based access and data access models
Experience using audit and access modeling tools to ensure access is
appropriate and approved
Requires technical expertise in systems administration and security tools,
combined with the knowledge of security practices and procedures.

Assists in the development and implementation of security policies and
procedures (e.g., user log-on and authentication rules, security breach
escalation
procedures, security auditing procedures and use of firewalls and
encryption routines). Prepares status reports on security matters to
develop security risk analysis scenarios and response procedures.

Require a person to analyze and compare system access to access recorded
within our AccessNow system to ensure minimum necessary access levels and
permissions have been granted.  All access discrepancies are identified and
remediated during each review.  This is for verifying new user access is
approved and validated for the retail applications for the additional
people requesting this access.







*The best way to reach me is through Email..*

*Thank & Regards*

*Maneesh*

*IT Recruiter*

*email: **mane...@sriveninfosys.net   *

*Direct:**732-835-0098  **GTalk:**maneesh01.sriveninfosys*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes.
For more options, visit https://groups.google.com/groups/opt_out.


Need: SENIOR INFORMATION SECURITY ANALYST @ NH

2013-02-07 Thread Steave Nickson
Hi Associates,
Greetings!!

Please find the specs of the requirement below; kindly send suitable
profiles to *srika...@logisofttechinc.com

*
*POSITION:*  SENIOR INFORMATION SECURITY ANALYST (CONTRACT)

*WORK LOCATION:*  Dover, NH.
Rate : Open**
Duration: 6-12 Months
**
* *
JOB DESCRIPTION:-

• Should have knowledge of Juniper firewall (all firewalls are from
Juniper) installations, placement, architecture / design
• Should be able to monitor and administer Juniper firewalls
• Should be able to take care of firewall rule changes (and
understand implications of the changes) and consolidate them as well
• Should be able to make changes to firewall to optimize  flow
• Day to day maintenance, support, and operation of  network and
application firewalls, load balancers, VPN's, Proxy's and logging systems
• Protect Client’s information and technology to keep its business
processes viable while minimizing disruptions through best practices and
proper rigor of security operations
• Implement security best practices into operations
• Implement security solutions for internal business applications
• End to end Implementation of new initiatives
• Integration of security systems, tools, controls, processes and
practices in an operational environment
• Participate in multiple concurrent security operations
• Work hand in hand with engineering to create a seamless workflow
for adoption of innovative solutions for the Client and its customers
• Contribute to ensuring the confidentiality, integrity, and
availability of the Client’s information assets
• Assist with yearly Enterprise-wide Assessment Process and
bi-annual firewall rule and network device configuration reviews, prepare
reports and provide findings for IT department and senior executives
 assist in the documentation and tracking of corrective actions or
remediation strategy
• Assist in oversight and monitoring of IT security risk mitigation
strategies; coordinate with other departments to help ensure Central IT, Market
IT and business units are taking effective remediation steps
• Review and conduct application-centric network and firewall risk
assessments
• On-going, informal, knowledge transfer

DOMAIN SPECIALIZATION:**
* *
• Bachelor's degree in Information Security or equivalent years
of experience required; plus
• Minimum three (3) years Risk Management experience required
in an Information Technology environment or related discipline (Information
Security, Business Continuity Management or Compliance).
• Minimum three (3) years perimeter security experience with
technologies such as firewalls, remote access management solutions,
intrusion detection/prevention solutions, and network device management.
• Experience with Juniper firewalls is a must
• Experience with Juniper NSM, Juniper Space is preferable
• Experience with Juniper SSL VPN appliances is preferable
• One or more of the following certifications: JNCIA- FWV,
JNCIS-FWV is preferable
• CCNA certification is preferable
• Certified Information Systems Security Professional (CISSP)
certification preferred; SANS and other InfoSec related certification a plus
• Demonstrated experience with Risk Management and Security
Architecture Reviews required; FAIR methodology experience preferable.
• Knowledge and experience with common information security
management frameworks and industry standards, such as International
Standards Organization (ISO) 17799/27001 and the IT Infrastructure Library
(ITIL), Control Objectives for Information and Related Technology (CobiT),
Payment Card Industry Data Security Standard (PCI-DSS), and National
Institute of Standards and Technology (NIST) frameworks is desirable
• Excellent troubleshooting and analytical thinking skills
• Superb communication, interpersonal skills and collaborative
skills a must
• Self-directed, self-starter, and motivated with the ability
to work with minimal supervision

Key Skills: Juniper Firewalls,NSM,SSL,VPN


---
Thanks & Regards
Srikanth Asuri

Kindly submit your consultant profile to above Email ID. Email is the best
way to reach me out.

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to reqsresumes+unsubscr...@googlegroups.com.
To post to this group, send email to reqsresumes@googlegroups.com.
Visit this group at http://groups.google.com/group/reqsresumes?hl=en.
For more options, visit https://groups.google.com/groups/opt_out.




Information Security Engineer Level III_Washington, DC_4 months

2012-02-17 Thread Umendar Goud
Hi,

We have an urgent requirement for our Client please check it once and reply
me your comfortable ASAP.

*Subject   : Information Security Engineer Level III
Location : Washington, DC
Duration : 4 months
**
Description: *
*
Duties and Accountabilities:*
The Information Security Engineer Level III will work at IFC HQ within the
CBI Information Security unit. He/She will be responsible
for operation and maintenance of several information security systems,
daily review of security logs, security project support,
compliance monitoring, vendor management, incident response and management.

*Skills Requirements:*
*Unix
*Microsoft XP, Vista , Windows 2000/2003/2008
*Firewalls
*Networks
*Working knowledge of office technology hardware; PCs, Servers , Switches ,
Routers , Firewalls , Blackberry , printers, etc.
*TCP/IP Decoding
*Excellent communications skills; the ability to listen and then clearly
describe the problem and proposed remedy
*Excellent interpersonal skills
*Excellent oral and written skills
*Ability to work independently and/or in a team.

*
Thanks & Regards

Umendar
IT Recruiter
Sriven Technologies LLC ..,
Ph: (703)-842-4305X303
umen...@sriventech.com
www.sriventech.com
G-Mail:umendarg...@gmail.com*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To post to this group, send email to reqsresumes@googlegroups.com.
To unsubscribe from this group, send email to 
reqsresumes+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/reqsresumes?hl=en.



Information Security

2010-08-27 Thread Gopal M
*Please submit resumes to go...@cy-tec.com*


*Just a reminder, the hiring manager is looking for a very technical
professional with demonstrated knowledge of running web application testing
tools (e.g., Cenzic Hailstorm /HP Web Inspect), identifying vulnerabilities
as per SANS 25 or OWASP Top 10 specifications and helping develop platform
specific remediation plans. Additional job requirement details below.

*
*Job Title: Information Security Engineer – Level II (5+Years)


Department/Division: OIS
Language Preferences: English [Essential]
Appointment Term: 6 (six) months – subject to renewal
Location: Washington, DC


Duties and Accountability
The contractor will have responsibilities for specific individual tasks and
for working as an integral part of the team in executing OIS’s work program.
Specific responsibilities include:
· Review scanner reports and work with the line of business development
teams to remediate issues following a risk based approach.
· Work with Threat and Vulnerability team and network operations team to
mitigate vulnerabilities through recommending and monitoring of remediation
activities.
· Perform automated system vulnerability assessment scans using various web
and application vulnerability scanners, analyze reports and assist IT staff
with remediation efforts.
· Perform manual vulnerability assessment and penetration testing of
applications, produce report and assist with remediation.
· Analyze existing and proposed processes and products and produce technical
accreditation reports.
· Interface with scanning vendors and the development teams to prepare C&A
requests, oversee vendor scanning, interpreting results and discussing
remediation recommendations with development teams.
· Perform risk assessments of new C&A requests to determine the level of
testing and verification required.
· Coordinate web application testing activities with external managed
service provider.
· Assist with the security vulnerability evaluation of proposed
implementation of COTS solutions.
Selection Criteria
1. Academic/professional training to at least a Bachelor’s Degree or its
international equivalent, preferably in Computer Science, or Computer
Engineering;
2. At least 3 years of practice as an Information Security Engineer;
3. Extensive knowledge of IT, enterprise architecture, software development
life cycle, and information security platforms and applications;
4. Ability to work well under pressure and to meet tight deadlines.
Demonstrates a high level of motivation, confidence, integrity and
responsibility;
5. Ability to be organized, responsive and to be able to effectively
multi-task with a focus on driving results;
6. Demonstrated knowledge of running web application testing tools (e.g.,
Cenzic Hailstorm /HP Web Inspect), identifying vulnerabilities as per SANS
25 or OWASP Top 10 specifications and helping develop platform specific
remediation plan;
7. Proven level of understanding of web application technologies and
database management systems and related security concepts;
8. In-depth knowledge of common website vulnerabilities such as SQL
injection, cross-site scripting, remote/local file inclusion, etc.; in-depth
knowledge of common website exploit techniques such as character encoding,
privilege escalation, directory traversal, etc.
9. Demonstrable skills in identifying and mitigating security weaknesses,
and incorporating security into enterprise software development lifecycles
10. Possession of industry certifications highly preferred including, but
not limited to, Certified Information Systems Security Professional (CISSP),
Certified Information Security Manager (CISM), Global Information Assurance
Certification (GIAC), and Information Systems Security Management
Professional (ISSMP).
11. Demonstrate excellent interpersonal skills; including the ability to
work independently, effectively in a team/task force as a team member or
leader, and with senior staff and managers in the unit and elsewhere in the
WBG.
12. Ability to collaborate with senior management stakeholders to identify
requirements and drive compliance with approved standards.*


Thanks & Regards



*Gopal Yash*

* *

*CyberTec, Inc.,*

11710 Plaza America Drive, Suite 2000, Reston, Virginia – 20190

Fax: 866-515-7595

Email:  go...@cy-tec.com 

www.cy-tec.com

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To post to this group, send email to reqsresu...@googlegroups.com.
To unsubscribe from this group, send email to 
reqsresumes+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/reqsresumes?hl=en.



Information Security Risk Analyst

2010-08-05 Thread Gopal M
*Please submit resumes to go...@cy-tec.com*


Information Security Risk Analyst position, the manager is looking for
someone with experience in risk management methods (identification,
assessment, reporting) and processes. The individual should also be able to
look at risks from a business perspective and relate these back to specific
frameworks like ISO, COBIT, etc.

Location: Washington, DC
Duration: 12+ months

*Information Security Risk Management Risk Analyst (5+Years)

Background/General Description:
The Office of Information Security (OIS) provides information security
services to the WBG. OIS’s mission is to protect the WBG’s information
assets in a manner that supports the WBG's mission to free the world of
poverty. The office develops strategy, standards and processes to protect
the confidentiality, integrity and availability of WBG information assets in
a manner that is commensurate with their value and risk. OIS maintains an
information security program in way that respects the rights and dignities
of those it serves and addresses the needs of the WBG’s business units. OIS
is responsible for managing security strategy, operations and compliance
activities for the WBG’s five member institutions and protecting assets that
total more than $628 billion of annual investments in poor and developing
countries. In addition, OIS manages security across remote sites in over 180
countries across the globe.
OIS is in need of a contractor to work in the area of risk management
program design, implementation, planning, and coordination.
Duties and Accountability
The contractor will have responsibilities for specific individual tasks and
for working as an integral part of the team in executing OIS’s work program.
The primary responsibilities will include, but are not limited to, a
combination of the following:
· Develop, document, maintain and support the WBG’s information security
risk management program in line with WBG information security policy,
practices and leading industry standards;
· Understand WBG information security risks pertinent to its business goals
and technology infrastructure and design an enterprise information security
risk program to identify, assess and respond to risks;
· Maintain an up-to-date understanding of emerging trends in information
security risks; apply new techniques and trends, in-line with overall
information security objectives and risk tolerance of the WBG, to the WBG’s
information security enterprise architecture;
· Document risk management policies, practices and procedures;
· Work with technology and business teams to facilitate risk assessments,
risk evaluation and reporting;
· Provide business units with recommendations to reduce information security
risk within their areas;
· Prepare and present risk assessment reports to system owners, business
units and other;
· Work with technology and business teams to develop and document risk
mitigation action plans;
· Monitor and track the status of risk mitigation plans;
· Assist in developing and implement risk reporting requirements for OIS, IT
and the business stakeholders;
· Identify efficiencies to improve the performance and responsiveness of the
OIS information security risk function; and
· Assist with vendor assessments and risk and control evaluations of new
technologies.
Selection Criteria
1. Bachelor’s degree in Computer Science, Information Systems or a related
technical field.
2. Minimum five (5) years of experience working in an information security,
information technology, and information risk management related field.
3. Demonstrated experience leading risk management programs and
implementation for a financial services organization or other organizations
with similar information security needs and requirements.
4. Extensive knowledge of IT, enterprise architecture, software development
life cycle, and information security platforms and applications;
5. Ability to work well under pressure and to meet tight deadlines.
Demonstrates a high level of motivation, confidence, integrity and
responsibility.
6. Ability to be organized, responsive and to be able to effectively
multi-task with a focus on driving results.
7. Knowledge of best practices and standards for risk management practices
specifically with the ISO, COSO, COBIT, OCTAVE, ISO and NIST frameworks.
8. Possession of industry certifications highly preferred including, but not
limited to, Certified Information Systems Security Professional (CISSP),
Certified Information Security Manager (CISM), Global Information Assurance
Certification (GIAC), and Information Systems Security Management
Professional (ISSMP).
9. Demonstrate excellent interpersonal skills; including the ability to work
independently, effectively in a team/task force as a team member or leader,
and with senior staff and managers in the unit and elsewhere in the WBG.
Ability to collaborate with senior management stakeholders to identify
requirements and drive compliance with app

Need for Information Security Engineer, Charlotte NC

2010-04-14 Thread Shailaja B
Hello

Please send me your resume across shail...@aim-cc.com ASAP.


 *Role: Information Security Engineer*

*Rate: $45 hr C2C*

*Location (remote work, on-site,): Charlotte*

*Duration: 8months...but could get extended *

* *

*Position Description:  *

* *

Strong advanced Windows skill set and a fundamental security background

* *

*Position Description:*

Info. Security Technical Support/Deployment Engineer position for the
Server/File Encryption

* *

*Required Skill Set/Experience:*

- exceptional customer service, communication and organizational skills

- professionalism, sense of urgency and ability to effectively deal with
critical situations is a must

- proven advanced "Systems Administrator" Level experience with Windows
Server Operating Systems - e.g. Windows O/S installs, software installs and
support/troubleshooting

- strong conceptual understanding of Active Directory and Windows Server
Security

- experience with or at least strong conceptual understanding of file/disk
encryption software - e.g. encryption software installs, deployments and
configuration/troubleshooting/problem solving on Windows

- proven ability to work well in a Team environment but also capable of
working independently

- willingness, desire and proven ability to work on varied technical support
tasks – scripting, technical troubleshooting, problem resolution, server O/S
builds/installs, QA/Engineering Testing, technical documentation and
software/application deployments to servers.

- willingness to work off-hours (approx. 16+ hours per week) and participate
in 24X7 on-call rotation one week per month

* *

*Skills that would be a Plus:*

- experience with Vormetric

- CISSP and/or MCSE certifications

- experience with PKI, SSL and digital certificates







Shailaja

Aim Computer Consulting

N. Laurel Park Drive,

Suite #513,

Livonia, MI-48152

Phone:  734-591-3562 Extn.1+161

Fax: 734-418-2598

*shail...@aim-cc.com* * *

*shailaja_ai...@yahoo.com* 

*www.aim-cc.com* <http://www.aim-cc.com/>



*Note: This is not an unsolicited mail. If you are not interested in
receiving our e-mails then please click** **“**Remove"*

-- 
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To post to this group, send email to reqsresu...@googlegroups.com.
To unsubscribe from this group, send email to 
reqsresumes+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/reqsresumes?hl=en.



ITL Req: Information security Consultant

2009-03-24 Thread Gopal M
*Please submit resumes to go...@itlogix.com.*

*Position: Information security Consultant*

*Location:Minneapolis,MN.  *

*Duration: 8+ Months *

*Non-locals are fine.***

*Imp Notes: *

*Position requires 50-75% travel and may include international travel as
necessary.*

***Location in Minneapolis or Phoenix preferred, although position can be
located anywhere within the lower 48 states, this excludes Hawaii and
Alaska***

*Description:*

This position is for an *Information Security Analyst* on the Site Review
Team . *This Site Review Team (SRT) is responsible for assessing the
Information Security risks associated with the use of a 3**rd** party
vendors/suppliers. Analysts perform information security assessments
spanning physical security, environmental, policy, procedure to more
technical network and application testing.*

*Primary responsibilities are to*:

Review and understand *Information Security Policy and Procedure*; to
examine and understand the *I.T. Infrastructure* of business partners of
varying sizes; and to assess existing and *potential risk and determine if
it is consistent with the polices and directives of corporate information
security policies, industry best practices, and regulatory requirements*.

Effectively *lead and conduct information security reviews and assessments
of technical*, managerial, and operational functions, at various vendor
locations within the United States and other countries as needed. Conduct
multiple interviews with different levels of employees within an
organization. *Provide leadership to projects assigned. Exercises sound
judgment and influence senior business managers and peers*. Identify and
evaluate information security risks within a business partnership and
communicate findings to senior management.

*Develops and implements security standards, procedures, and guidelines for
multiple platforms and diverse systems environments*. Reviews the
development, testing, and implementation of security plans, products, and
control techniques. Investigates and recommends appropriate corrective
actions for data security incidents. Provides security consulting and
project management services on highly complex information security projects
and issues.

*Identifies security risks to the organization and ensures that appropriate
data security procedures and products are implemented*. Maintains an
awareness of bank security policies and *government regulations pertaining
to information security*. Identifies regulatory changes that will affect
information security policy, standards, and procedures and recommends
appropriate changes. *Leads and directs less experienced staff.*

*Minimum Qualifications: *

   - Excellent verbal and written communication skills and can effectively
   communicate with peers, customers, and various levels of management.
   - General business know-how; an understanding the financial industry and
   associated regulatory agencies.
   - Comprehensive understanding of *Information Security Standards and Best
   Practices; ISO 17799, BS 7799. Familiar with NIST or FFIEC Handbook. *
   - Understands how Information Security risks relates to business risks.
   - 5+ years of experience in *Information Security and/or the equivalent
   Audit experience related to information systems and operational functions.
   *
   - Extensive experience with multi-tier web-based applications, network
   architecture, and DMZ designs.
   - Analytical skills; must demonstrate an ability to decipher technical
   documentation (network diagrams and application flow charts), assess
   potential risks, and communicate relevant information to senior management.
   - *Technical skills; knowledge of Windows, Unix, Linux, mid-range or
   Mainframe system admin skills; understand DMZ architecture and network
   protocols and routing. *
   - Working knowledge of information security tools: NMAP, ethereal, snort,
   Nessus, dig, etc
   - Knowledge of information security architecture principles and firewall
   design & architecture

*Preferred Skills: *

   - Bachelors degree in technology or business
   - *Information Security Certification (e.g. CISSP) or other related
   certificates *
   - *Audit experience and/or certifications *
   - *System vulnerability assessment and penetration testing experience is
   a plus *
   - *Understanding of Business Continuity or Disaster Recovery *
   - *Experience as a member of Computer Incident Response Team (CIRT) or
   Computer Response Team (CERT) *

Thanks & Regards,

Gopal
IT Logix
go...@itlogix.com

--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To post to this group, send email to reqsresumes@googlegroups.com
To unsubscribe from this group, send email to 
reqsresumes+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/reqsresumes?hl=en
-~--~~~~--~~--~--~---



Urgent—Information Security Engineer at DE for Direct Client

2009-03-04 Thread Syed Muzaffer Ali
Urgent—*Information Security Engineer* at DE for Direct Client

Please send the resumes only on *s...@cy-tec.com*

*Information Security Engineer-Network*

Newark, DE
6+ Months

*$50/hr max*

   - *Candidate must be able to evaluate and recommend an automated NAC
   (Network Access Controls) solution and deploy solution into client’s
   environment** ***
   - *Must have strong Cisco and Checkpoint skills.  CCNA and/or Checkpoint
   certifications are preferred.** ***
   - *CISSP certification required.* **
   - *Experience with HIDS (Host Intrusion Detection Systems) products
   including Tripwire, Symantec, etc. *
   - *Experience with SSL hardware encryption tools, such as F5 load
   balancers or HSMs, preferred** ***
   - *Must have strong UNIX and Windows skills (be able knowledgeable in
   hardening and working in these environments).  UNIX scripting skills are
   preferred.** ***
   - *Candidate must be able to evaluate and recommend a new HIDS product or
   be able to fully utilize the current HIDS product in client environment.
   *
   - *Must have strong UNIX and Windows skills (be able knowledgeable in
   hardening and working in these environments).  UNIX scripting skills are
   preferred.** ***
   - *Candidate must have experience with DLP (Data Loss Prevention) tools
   such as Vontu (Symantec), centralized email encryption such as PGP
   Universal, and Secure file transfer solutions such as Tumbleweed Secure
   Transport** ***
   - *Candidate must be able to work directly on the team for evaluation and
   recommend deployment for PGP Universal tool to be fully utilized in client
   environment. *
   - *Candidate must be able to evaluate and recommend an automated NAC
   (Network Access Controls) solution and deploy solution into client’s
   environment** ***
   - *Experience with encryption tools such as Tumbleweed, PGP Universal,
   etc. is a must. *

Thanks and Regards

Syed Muzaffer Ali

CyberTec Inc

703 544 3910

--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To post to this group, send email to reqsresumes@googlegroups.com
To unsubscribe from this group, send email to 
reqsresumes+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/reqsresumes?hl=en
-~--~~~~--~~--~--~---



ITL Req: Information Security Analyst

2009-03-04 Thread Gopal M
*Please submit resumes to* *go...@itlogix.com*.

*Title: Information Security Analyst
<http://www4.jobdiva.com/employers/open_rfq.jsp?rfqid=2165092>*

* *

*Location: McLean, VA*

* *

*Duration: 3 Months +*



*Required Skills:  *

   - Desired Skills: Relevant security / risk experience in a financial
   services firm.
   - Need candidates who have experience with info security / risk audits,
   working with access and ID management, windows and UNIX administration.
   - Ideal candidates would have CISSP experience with Sarbanes-Oxley as
   well as Cobit.
   - Experience with recertification and making sure they can pass an info
   sec audit.
   - Looking for a person with hands on info security / ID management
   experience rather than a manager overseeing info security.
   - Someone who has worked as a Senior System Admin and is just starting to
   move into Info Sec would be ideal for this position or Junior Internal
   Auditor that wants to work on the technology side.
   - Candidate must have experience with privilege access for multiple data
   sources and also have experience helping client transition from a manual to
   an automated environment.
   - Experience with eTrust a plus.


Thanks & Regards,

Gopal
IT Logix
go...@itlogix.com

--~--~-~--~~~---~--~~
You received this message because you are subscribed to the Google Groups 
"REQSRESUMES" group.
To post to this group, send email to reqsresumes@googlegroups.com
To unsubscribe from this group, send email to 
reqsresumes+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/reqsresumes?hl=en
-~--~~~~--~~--~--~---