*REPLY TO [email protected] ASAP!!*

Hi ,



Greetings of the day!!



We have a *Network Security - Intrusion Detection* position available
at *Kansas
City, MO* that I believe you would be qualified for. I have included the
job description below.

JMA Information Technology is an IT consulting firm, headquartered in
Overland Park, KS.   Our areas of expertise includes: Network Design and
Security, Voice, Video and Data Infrastructure, Performance Analysis and
Improvement, Maintenance Service, Software Development, Project Management,
and Staff Augmentation.



I look forward to speaking to you at your earliest convenience to discuss
your possible future with JMA. Please attach your word formatted resume and
give me a call at your earliest convenience.  My contact information is
below.



*Position: Network Security - Intrusion Detection*

*Location: Kansas City, MO  *

*Duration: **Long Term Contract (3+ Years)*



*Network Security - Intrusion Detection*

This position is located on the Network Security Staff of the National
Information Technology Center (NITC). Incumbent is an intermediate level
security analyst I engineer and functions as a subject matter expert
supporting the following NITC security systems:



• Responsibilities include installation, administration, monitoring,
operation, analysis, maintenance, and reporting of the Host Based Intrusion
Detection and

Intrusion Prevention Systems (HIDS I HIPS) (Cisco Security Agent). The
incumbent:

·         Must have a detailed understanding of Microsoft, Linux, and UNIX
operating systems and work with system administrators to strengthen the
security posture of server systems.

·         Documents all aspects of the system for daily operations and
disaster recovery, in addition to adherence of federal certification and
accreditation requirements.

·         Provides statistical reporting to illustrate server security
improvements.

·         Must stay current on security skills by attending training
annually at the cost of the contracted organization.

·         Participates in the creation, review and enforcement of security
policy, procedures and system documentation.

·         Evaluates, recommends for acquisition, implements, or
disseminates IT security tools, procedures, and practices to protect
organizational systems.

·         Updates system contingency or disaster recovery plans.

·         Conducts security system and documentation reviews for managed
systems.

·         Analyzes systems performance of new and existing equipment.

·         Provides knowledge transfer to government counterparts



• In a backup capacity, responsibilities include installation,
administration, operation, analysis, maintenance, and reporting of the
Network Intrusion Detection I Prevention Systems (NIDS I NIPS) (Enterasys
Dragon).

·         Must have a detailed understanding of networks and work with
government security & network administrators to strengthen the security
posture of the enterprise.

·         Documents all aspects of the system for daily operations and
disaster recovery in addition to adherence of federal certification and
accreditation requirements.

·         Provides statistical reporting to illustrate enterprise security
improvements.

·         Must stay current on security skills by attending training
annually at the cost of the contracted organization.

·         Participates in the creation, review and enforcement of security
policy, procedures and system documentation.

·         Evaluates, recommends for acquisition, implements, or
disseminates IT security tools, procedures, and practices to protect
organizational systems.

·         Updates system contingency or disaster recovery plans.

·         Conducts security system and documentation reviews for managed
systems.

·         Analyzes systems performance of new and existing equipment.

·         Provides knowledge transfer to government counterparts



• In a backup capacity, responsibilities include installation,
administration, operation, analysis, maintenance, and reporting of the
future Security Information Management System (SIMS).

·         Must have an understanding of system log management and retention
to strengthen the security posture of the enterprise.

·         Documents all aspects of the system for daily operations and
disaster recovery in addition to adherence of federal certification and
accreditation requirements.

·         Provides statistical reporting to illustrate enterprise security
improvements.

·         Must stay current on security skills by attending training
annually at the cost of the contracted organization.

·         Participates in the creation, review and enforcement of security
policy, procedures and system documentation.

·         Evaluates, recommends for acquisition, implements, or
disseminates IT security tools, procedures, and practices to protect
organizational systems.

·         Updates system contingency or disaster recovery plans.

·         Conducts security system and documentation reviews for managed
systems.

·         Analyzes systems performance of new and existing equipment.

·         Provides knowledge transfer to government counterparts



*Network Security - Vulnerability Assessment *

This position is located on the Network Security Staff of the National
Information Technology Center (NITC). Incumbent is an intermediate level
security analyst I engineer and functions as a subject matter expert
supporting the following NITC security systems:



• Responsibilities include installation, administration, monitoring,
operation, analysis, maintenance, and reporting of the enterprise
vulnerability assessment

system (ISS Site Protector & Internet Security Scanner).

·         Must have a detailed understanding of Microsoft, Linux, and UNIX
operating systems and work with system administrators to strengthen the
security posture of server systems.

·         Documents all aspects of the system for daily operations and
disaster recovery, in addition to adherence of federal certification and
accreditation requirements.



*Thanks & Regards,*

* *

*Harish Vummidi*

JMA Information Technology,

913-667-2848 [Direct] | 913-667-2828 X 206 | 866-639-4749 [F]

10551 Barkley St. Suite 400 | Overland Park, KS 66212

[email protected] | www.jma-it.com

View my jobs @ http://www.bullhornreach.com/user/42066/jobs

[image: btn_viewmy_160x33] <http://www.linkedin.com/in/harishvummidi>

-- 
You received this message because you are subscribed to the Google Groups 
"US_IT.Groups" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/us_itgroups?hl=en.

<<image001.gif>>

Reply via email to