Please share resume at *a...@rgtalent.com <a...@rgtalent.com>*

Hi ,

Currently, I am recruiting candidates for one of my requirement as
mentioned below. If you have a matching profile, please send me the updated
resume along with contact details at the earliest.



*Job Title*

Checkpoint Security Engineer

*Project Location*

Boca Raton FL

*Duration*

12 months /Contract


* Skills Required and Job Description:*

*MOI :: Telephonic followed by skype*


*Description *


This position reports to the Manager Security, Risk and Compliance Office,
Information Technology Office. The *Information Security Analyst* position
is a core member of the *Security, Risk and Compliance Office (SRCO).*


The primary responsibility of the Information Security Analyst is to
provide support on our SOC Team within the Firewall environment of our
security architecture. This includes problem analysis, current systems
maintenance, solutions development and implementation, and troubleshooting.
An Information Security Analyst will be expected to demonstrate innovative
approaches to solving the unique challenges encountered. The ideal
candidate should have hands-on experience in the following areas: Firewalls
(preferably Check Point), network protocols, security administration,
intrusion detection systems, vulnerability assessment tools, and
network/security analysis tools.



*Skills and Experience Weighting*


A = Candidate must have these attributes

B = Management strongly desires that the candidate have these attributes

C = Management desires the candidate to have these attributes


*Skills Needed *


A Administer, and document firewall infrastructure, working with Checkpoint.

A Experience with firewall deployment, rules creation, and firewall
administration.

A Support routine administration of Checkpoint firewalls and VPN tunnels.

B Working level knowledge using Security Information and Event Management
Tools like IBM QRadar

B Working level knowledge using Network Vulnerability Assessment tools like
Rapid7 Nexpose

C Working level knowledge using Application Vulnerability Assessment tools
like BurpSuite or similar tool set.

B Working level knowledge of Windows and UNIX/Linux server operating systems

C Experience with penetration testing tools like Metasploit

B Experience with process lifecycle of the creation, management and
compliance of security policies, procedures, standards and guidelines

B Experience with the processes of identifying appropriate controls to
comply with security policies and regulations

A Experience producing threat and compliance reports for a wide variety of
audiences (technical and non-technical)

A Excellent communication and analytical skills

A Must work well with others as part of larger team and be able to
collaborate on cross functional teams

A Must be available and willing to work extended and/or alternative hours
as needed for issue resolutions, roll-outs, system upgrades, etc.

A Able to work independently toward goals set at a higher level


*Knowledge and Experience Needed *


A 3 years of Information Security experience or related field

B 2 years of experience in the areas of compliance, auditing, risk
assessment, and vulnerability mitigation and remediation.

B - Knowledge of security best practices (e.g., NIST series); Industry
security standards (e.g., PCI-DSS or HIPPA)




*Responsibilities *


1. Support the Security Operations Center

2. Support of Incident Response Process, Risk Assessments

3. Support of Payment Card Industry (PCI) compliance and other enterprise
security initiatives




*Required Skills Table:*

*Required/Desired Skills *

*Yes/No*

*# of Years *

*Additional Information (if necessary)*

Administer, and document firewall infrastructure, working with Checkpoint.

Experience with firewall deployment, rules creation, and firewall
administration.

Support routine administration of Checkpoint firewalls and VPN tunnels.

Working level knowledge using Security Information and Event Management
Tools like IBM QRadar

Working level knowledge using Network Vulnerability Assessment tools like
Rapid7 Nexpose

CWorking level knowledge using Application Vulnerability Assessment tools
like BurpSuite or similar tool set.

Working level knowledge of Windows and UNIX/Linux server operating systems

Experience with penetration testing tools like Metasploit

Experience with process lifecycle of the creation, management and
compliance of security policies, procedures, standards and guidelines

Experience with the processes of identifying appropriate controls to comply
with security policies and regulations

Experience producing threat and compliance reports for a wide variety of
audiences (technical and non-technical)

Experience in the areas of compliance, auditing, risk assessment, and
vulnerability mitigation and remediation.

Knowledge of security best practices (e.g., NIST series); Industry security
standards (e.g., PCI-DSS or HIPPA)

Experience supporting Payment Card Industry (PCI) compliance and other
enterprise security initiatives



Thanks & Regards,

*Alok Kumar*

*RG Talent Inc*

*39120 Argonaut way*
* Suite # 157, Fremont CA 94538*




Email : a...@rgtalent.com

Gtalk : alok.rgtale...@gmail.com

URL : www.rgtalent.com

*Note: We are working with prime vendor (One Layer between) for this
position.*

-- 
You received this message because you are subscribed to the Google Groups 
"US_IT.Groups" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to us_itgroups+unsubscr...@googlegroups.com.
To post to this group, send email to us_itgroups@googlegroups.com.
Visit this group at https://groups.google.com/group/us_itgroups.
For more options, visit https://groups.google.com/d/optout.

Reply via email to