In-Reply-To: <[EMAIL PROTECTED]>

The job is located in San Jose, CA



>Received: (qmail 28397 invoked from network); 23 Jun 2003 20:51:24 -0000
>Received: from outgoing2.securityfocus.com (205.206.231.26)
>  by mail.securityfocus.com with SMTP; 23 Jun 2003 20:51:24 -0000
>Received: from lists.securityfocus.com (lists.securityfocus.com 
[205.206.231.19])
>       by outgoing2.securityfocus.com (Postfix) with QMQP
>       id 708BA8F392; Mon, 23 Jun 2003 14:50:48 -0600 (MDT)
>Mailing-List: contact [EMAIL PROTECTED]; run by ezmlm
>Precedence: bulk
>List-Id: <securityjobs.list-id.securityfocus.com>
>List-Post: <mailto:[EMAIL PROTECTED]>
>List-Help: <mailto:[EMAIL PROTECTED]>
>List-Unsubscribe: <mailto:[EMAIL PROTECTED]>
>List-Subscribe: <mailto:[EMAIL PROTECTED]>
>Delivered-To: mailing list [EMAIL PROTECTED]
>Delivered-To: moderator for [EMAIL PROTECTED]
>Received: (qmail 13133 invoked from network); 23 Jun 2003 20:03:33 -0000
>Date: 23 Jun 2003 19:32:15 -0000
>Message-ID: <[EMAIL PROTECTED]>
>Content-Type: text/plain
>Content-Disposition: inline
>Content-Transfer-Encoding: binary
>MIME-Version: 1.0
>X-Mailer: MIME-tools 5.411 (Entity 5.404)
>From: <[EMAIL PROTECTED]>
>To: [EMAIL PROTECTED]
>Subject: Looking for security analyst
>
>
>
>Protego Networks is a provider of security threat management solution. 
We 
>are currently trying to fill a security analyst position for the company.
>
>The candidate must keep abreast of the latest security 
>information in order to build the best possible 
>security capabilities into the Protego Security Threat Management 
>product.  Keep abreast of security device vendors? products (FW, IDS, 
>router, switch, etc.) upgrade and patches. Keep abreast of the 
>vulnerability of servers, OS, application, etc.
>Compile comprehensive, in-depth technical 
>analysis on current and future attacks. Write 
>papers/news letters on technology that is relevant to the 
>security community. Participate in product 
>design, development, maintenance, and testing of 
>the Protego product. 
> 
> 
>Requirements: 
>
>To perform this job successfully, an individual must be able to 
>perform each essential duty satisfactorily. The 
>requirements listed below are representative of 
>the knowledge, skill, and/or ability required.
>
>Knowledge of system architectures. 
>Knowledge of Operating Systems Internals.
>Security Architecture and Design
>Incident Response and Network Forensics
>Vulnerability Assessment
>Experienced with security vendor products and technology (FW, IDS, 
>router, switch, etc.)
>Experienced with host security
>Experienced with networking protocols and operations
>
>
>EDUCATION and/or EXPERIENCE:
>Bachelor's degree (B. S.) from four-year College or university; or 
>two years related experience and/or training; or 
>equivalent combination of education and 
>experience. Large network and network security management experience. 
>Preferably someone worked as network and network security admin in the 
>past. Security certificates such as CISSP, CCIE, etc.
>

Reply via email to