*REPLY TO [email protected] ASAP!!*
Hi , Greetings of the day!! We have a *Network Security - Intrusion Detection* position available at *Kansas City, MO* that I believe you would be qualified for. I have included the job description below. JMA Information Technology is an IT consulting firm, headquartered in Overland Park, KS. Our areas of expertise includes: Network Design and Security, Voice, Video and Data Infrastructure, Performance Analysis and Improvement, Maintenance Service, Software Development, Project Management, and Staff Augmentation. I look forward to speaking to you at your earliest convenience to discuss your possible future with JMA. Please attach your word formatted resume and give me a call at your earliest convenience. My contact information is below. *Position: Network Security - Intrusion Detection* *Location: Kansas City, MO * *Duration: **Long Term Contract (3+ Years)* *Network Security - Intrusion Detection* This position is located on the Network Security Staff of the National Information Technology Center (NITC). Incumbent is an intermediate level security analyst I engineer and functions as a subject matter expert supporting the following NITC security systems: • Responsibilities include installation, administration, monitoring, operation, analysis, maintenance, and reporting of the Host Based Intrusion Detection and Intrusion Prevention Systems (HIDS I HIPS) (Cisco Security Agent). The incumbent: · Must have a detailed understanding of Microsoft, Linux, and UNIX operating systems and work with system administrators to strengthen the security posture of server systems. · Documents all aspects of the system for daily operations and disaster recovery, in addition to adherence of federal certification and accreditation requirements. · Provides statistical reporting to illustrate server security improvements. · Must stay current on security skills by attending training annually at the cost of the contracted organization. · Participates in the creation, review and enforcement of security policy, procedures and system documentation. · Evaluates, recommends for acquisition, implements, or disseminates IT security tools, procedures, and practices to protect organizational systems. · Updates system contingency or disaster recovery plans. · Conducts security system and documentation reviews for managed systems. · Analyzes systems performance of new and existing equipment. · Provides knowledge transfer to government counterparts • In a backup capacity, responsibilities include installation, administration, operation, analysis, maintenance, and reporting of the Network Intrusion Detection I Prevention Systems (NIDS I NIPS) (Enterasys Dragon). · Must have a detailed understanding of networks and work with government security & network administrators to strengthen the security posture of the enterprise. · Documents all aspects of the system for daily operations and disaster recovery in addition to adherence of federal certification and accreditation requirements. · Provides statistical reporting to illustrate enterprise security improvements. · Must stay current on security skills by attending training annually at the cost of the contracted organization. · Participates in the creation, review and enforcement of security policy, procedures and system documentation. · Evaluates, recommends for acquisition, implements, or disseminates IT security tools, procedures, and practices to protect organizational systems. · Updates system contingency or disaster recovery plans. · Conducts security system and documentation reviews for managed systems. · Analyzes systems performance of new and existing equipment. · Provides knowledge transfer to government counterparts • In a backup capacity, responsibilities include installation, administration, operation, analysis, maintenance, and reporting of the future Security Information Management System (SIMS). · Must have an understanding of system log management and retention to strengthen the security posture of the enterprise. · Documents all aspects of the system for daily operations and disaster recovery in addition to adherence of federal certification and accreditation requirements. · Provides statistical reporting to illustrate enterprise security improvements. · Must stay current on security skills by attending training annually at the cost of the contracted organization. · Participates in the creation, review and enforcement of security policy, procedures and system documentation. · Evaluates, recommends for acquisition, implements, or disseminates IT security tools, procedures, and practices to protect organizational systems. · Updates system contingency or disaster recovery plans. · Conducts security system and documentation reviews for managed systems. · Analyzes systems performance of new and existing equipment. · Provides knowledge transfer to government counterparts *Network Security - Vulnerability Assessment * This position is located on the Network Security Staff of the National Information Technology Center (NITC). Incumbent is an intermediate level security analyst I engineer and functions as a subject matter expert supporting the following NITC security systems: • Responsibilities include installation, administration, monitoring, operation, analysis, maintenance, and reporting of the enterprise vulnerability assessment system (ISS Site Protector & Internet Security Scanner). · Must have a detailed understanding of Microsoft, Linux, and UNIX operating systems and work with system administrators to strengthen the security posture of server systems. · Documents all aspects of the system for daily operations and disaster recovery, in addition to adherence of federal certification and accreditation requirements. *Thanks & Regards,* * * *Harish Vummidi* JMA Information Technology, 913-667-2848 [Direct] | 913-667-2828 X 206 | 866-639-4749 [F] 10551 Barkley St. Suite 400 | Overland Park, KS 66212 [email protected] | www.jma-it.com View my jobs @ http://www.bullhornreach.com/user/42066/jobs [image: btn_viewmy_160x33] <http://www.linkedin.com/in/harishvummidi> -- You received this message because you are subscribed to the Google Groups "Hotlist of Available Consultants" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/hotlistconsultants?hl=en. -- You received this message because you are subscribed to the Google Groups "anuj786 recruiter" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/anuj786-recruiter?hl=en. -- You received this message because you are subscribed to the Google Groups "US_IT.Groups" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/us_itgroups?hl=en.
<<image001.gif>>
