Hi I have an urgent requirement of ‘Security Analyst’ please send me your consultant resumes along with your contact details.
Title: Security Analyst Location: Roseland, NJ Duration: 6-12 month contract ****MUST BE LOCAL ENOUGH TO DO A FACE TO FACE**** Description – I know it is long. Just focus on the required skills please and get me some candidates!! This is an Incident Response position in our Critical Incident Response Team. The ADP-Critical Incident Response Team (CIRC) team within ADP’s Global Security Organization (GSO) is responsible for monitoring multiple sources of analytical computer The ADP-Critical Incident Response Team (CIRC) team within ADP’s Global Security Organization (GSO) is responsible for monitoring multiple sources of analytical computer and physical security related information. The CIRC’s main focus is to take this disparate information, and turn it into strategic and tactical intelligence that is relevant to protecting ADP’s lines of business. The output of this analysis will be used to ensure a consistent and coordinated response to ongoing security threats ensuring ADP can continue to operate safely and securely. This analyst must have a holistic understanding of the modern physical and cyber security landscape with a strong background in incident response and process documentation. They will handle high complexity security threats generated by ADP's automated detection systems, 3rd party and internal intelligence, and manual identification by ADP associates and clients. The analyst will review current processes, refine, document, and formalize incident response processes for all incidents types to include those originating in the BUs. The analyst will be required to develop and maintain a liaison relationship with BSOs, BUs, Risk Assessment, and other CIRC teams. This analyst will have moderate technical skills in some of the following areas: network forensics / deep packet inspection, host forensics, malware analysis, ability to effectively manage critical incidents. Analysts must have the requisite knowledge to lead an incident, provide high level communications, manage assigned analysts, develop and document procedures, and ensure appropriate reporting. Responsibilities: • Develop, document, and formalize a standardized global incident response processes across ADP organization. • Determine key stakeholders. • Define, build, test and implement correlation rules that support the monitoring and enforcement of the ADP security policies. • Produce metrics that support GSO’s strategic direction. • Gather current best practices from various key stakeholders. • Determine critical support requirements needed to ensure ADP stakeholders are fully supported. • Conduct technical analysis and assessments of security related incidents, including malware analysis, packet level analysis, and system level forensic analysis. • Liaise with other ADP organizations. • Assist in the development and maintenance of new procedural documentation including newly developed correlation rules. This also includes the training of appropriate security analysts. • Coordination of incident response activities (escalations, notifications, etc.). • Monitoring, managing, and coordinating the information collection and cataloging of activities from a variety of public and private security related information sources, as well as documenting the initial analysis of vulnerability reports and how they may relate to ADP. • Perform other duties as assigned. Required Skills: • Experienced in security incident activities. • Strong documentation and presentation skills. • Excellent analytical skills • The candidate should have experience in Networking, Windows and *nix environments • Conceptual knowledge of operating system internals (file handles, threads, semaphores, stack, heap, entry points) • Understanding of TCP/IP and network communications • General knowledge of web content scripting languages. • Knowledge of computer security forensics and security vulnerabilities • Strong knowledge of interpreting the log output of Windows and Unix logs • Experience producing architectural diagrams and overviews for both business and technical audiences. • Some exposure to collaborative workflow and documentation systems (Wiki documentation, project blogging) • Some experience providing training and mentoring, preferably to both onshore and offshore teams. Desired Skills: • Experienced in security incident management. • Hands on experience with reverse engineering tools • Program Management • Ability to reverse engineer undocumented binary software • Familiarity with interpreting the log output of a wide selection of device classes, spanning Networking and host Infrastructure service devices • Packet-level behavioral familiarity with most major TCP/IP application protocols • Knowledge of basic packing and obfuscation techniques • Strong shell or other programming skills • Knowledge of how to operate a debugger (IDA Pro, OllyDbg) • Enough SQL familiarity to generate nested queries and joins in a major SQL dialect • Experience in reverse-engineering script content in multiple formats • Broad knowledge of data and executable file types and extracting information from them • Functional knowledge of shellcode fundamentals • Some experience providing training and mentoring, preferably to an international audience Reverse-Engineering and Executable Analysis Skills • Well versed in multiple security technologies such as SIEM; Intrusion Detection Systems; End-point security; Web Proxy/Content Filtering; Active Directory, PKI, Radius, RSA SecureID, Log Analysis • Broad knowledge of business-impacting security scenarios and viable methods to detect these scenarios (Cross device log correlation). • Functional experience with text and data representation and manipulation (XML, HTML, Regular Expressions, Wiki Markup, SQL) • Implementation experience with some of the major centralized authentication systems (LDAP, KERBEROS, NIS, RADIUS) • Implementation experience with general enterprise core service types (web/mail/dns/file servers) and core infrastructure elements (general switch/router/proxy/firewall configurations) • General understanding of key components of international internet architecture, both technical and political. Infrastructure and Authentication Systems Education: • BA/BS or equivalent • CISSP, GSEC, or GCIA • Any of the following are a plus: GISP, GSLC, GCFE, GCFA, GREM, GCIH, PMP Experience: • 7 to 10 years experience Thanks and Regards *Andy* Talent Acquisition Team Glomark International LLC* *Direct: 908-333-5191 Fax: 908-688-8831 Email: a...@glomark-llc.com -- You received this message because you are subscribed to the Google Groups "US_IT.Groups" group. To unsubscribe from this group and stop receiving emails from it, send an email to us_itgroups+unsubscr...@googlegroups.com. To post to this group, send email to us_itgroups@googlegroups.com. Visit this group at http://groups.google.com/group/us_itgroups. For more options, visit https://groups.google.com/groups/opt_out.