Please share resume at *a...@rgtalent.com <a...@rgtalent.com>* Hi ,
Currently, I am recruiting candidates for one of my requirement as mentioned below. If you have a matching profile, please send me the updated resume along with contact details at the earliest. *Job Title* Checkpoint Security Engineer *Project Location* Boca Raton FL *Duration* 12 months /Contract * Skills Required and Job Description:* *MOI :: Telephonic followed by skype* *Description * This position reports to the Manager Security, Risk and Compliance Office, Information Technology Office. The *Information Security Analyst* position is a core member of the *Security, Risk and Compliance Office (SRCO).* The primary responsibility of the Information Security Analyst is to provide support on our SOC Team within the Firewall environment of our security architecture. This includes problem analysis, current systems maintenance, solutions development and implementation, and troubleshooting. An Information Security Analyst will be expected to demonstrate innovative approaches to solving the unique challenges encountered. The ideal candidate should have hands-on experience in the following areas: Firewalls (preferably Check Point), network protocols, security administration, intrusion detection systems, vulnerability assessment tools, and network/security analysis tools. *Skills and Experience Weighting* A = Candidate must have these attributes B = Management strongly desires that the candidate have these attributes C = Management desires the candidate to have these attributes *Skills Needed * A Administer, and document firewall infrastructure, working with Checkpoint. A Experience with firewall deployment, rules creation, and firewall administration. A Support routine administration of Checkpoint firewalls and VPN tunnels. B Working level knowledge using Security Information and Event Management Tools like IBM QRadar B Working level knowledge using Network Vulnerability Assessment tools like Rapid7 Nexpose C Working level knowledge using Application Vulnerability Assessment tools like BurpSuite or similar tool set. B Working level knowledge of Windows and UNIX/Linux server operating systems C Experience with penetration testing tools like Metasploit B Experience with process lifecycle of the creation, management and compliance of security policies, procedures, standards and guidelines B Experience with the processes of identifying appropriate controls to comply with security policies and regulations A Experience producing threat and compliance reports for a wide variety of audiences (technical and non-technical) A Excellent communication and analytical skills A Must work well with others as part of larger team and be able to collaborate on cross functional teams A Must be available and willing to work extended and/or alternative hours as needed for issue resolutions, roll-outs, system upgrades, etc. A Able to work independently toward goals set at a higher level *Knowledge and Experience Needed * A 3 years of Information Security experience or related field B 2 years of experience in the areas of compliance, auditing, risk assessment, and vulnerability mitigation and remediation. B - Knowledge of security best practices (e.g., NIST series); Industry security standards (e.g., PCI-DSS or HIPPA) *Responsibilities * 1. Support the Security Operations Center 2. Support of Incident Response Process, Risk Assessments 3. Support of Payment Card Industry (PCI) compliance and other enterprise security initiatives *Required Skills Table:* *Required/Desired Skills * *Yes/No* *# of Years * *Additional Information (if necessary)* Administer, and document firewall infrastructure, working with Checkpoint. Experience with firewall deployment, rules creation, and firewall administration. Support routine administration of Checkpoint firewalls and VPN tunnels. Working level knowledge using Security Information and Event Management Tools like IBM QRadar Working level knowledge using Network Vulnerability Assessment tools like Rapid7 Nexpose CWorking level knowledge using Application Vulnerability Assessment tools like BurpSuite or similar tool set. Working level knowledge of Windows and UNIX/Linux server operating systems Experience with penetration testing tools like Metasploit Experience with process lifecycle of the creation, management and compliance of security policies, procedures, standards and guidelines Experience with the processes of identifying appropriate controls to comply with security policies and regulations Experience producing threat and compliance reports for a wide variety of audiences (technical and non-technical) Experience in the areas of compliance, auditing, risk assessment, and vulnerability mitigation and remediation. Knowledge of security best practices (e.g., NIST series); Industry security standards (e.g., PCI-DSS or HIPPA) Experience supporting Payment Card Industry (PCI) compliance and other enterprise security initiatives Thanks & Regards, *Alok Kumar* *RG Talent Inc* *39120 Argonaut way* * Suite # 157, Fremont CA 94538* Email : a...@rgtalent.com Gtalk : alok.rgtale...@gmail.com URL : www.rgtalent.com *Note: We are working with prime vendor (One Layer between) for this position.* -- You received this message because you are subscribed to the Google Groups "US_IT.Groups" group. To unsubscribe from this group and stop receiving emails from it, send an email to us_itgroups+unsubscr...@googlegroups.com. To post to this group, send email to us_itgroups@googlegroups.com. Visit this group at https://groups.google.com/group/us_itgroups. For more options, visit https://groups.google.com/d/optout.