Hi I have an urgent requirement of ‘Security Analyst’ please send me your
consultant resumes along with your contact details.



Title: Security Analyst

Location: Roseland, NJ

Duration: 6-12 month contract



****MUST BE LOCAL ENOUGH TO DO A FACE TO FACE****



Description – I know it is long. Just focus on the required skills please
and get me some candidates!!



This is an Incident Response position in our Critical Incident Response
Team. The ADP-Critical Incident Response Team (CIRC) team within ADP’s
Global Security Organization (GSO) is responsible for monitoring multiple
sources of analytical computer

The ADP-Critical Incident Response Team (CIRC) team within ADP’s Global
Security Organization (GSO) is responsible for monitoring multiple sources
of analytical computer and physical security related information. The
CIRC’s main focus is to take this disparate information, and turn it into
strategic and tactical intelligence that is relevant to protecting ADP’s
lines of business. The output of this analysis will be used to ensure a
consistent and coordinated response to ongoing security threats ensuring
ADP can continue to operate safely and securely.

This analyst must have a holistic understanding of the modern physical and
cyber security landscape with a strong background in incident response and
process documentation. They will handle high complexity security threats
generated by ADP's automated detection systems, 3rd party and internal
intelligence, and manual identification by ADP associates and clients. The
analyst will review current processes, refine, document, and formalize
incident response processes for all incidents types to include those
originating in the BUs. The analyst will be required to develop and
maintain a liaison relationship with BSOs, BUs, Risk Assessment, and other
CIRC teams. This analyst will have moderate technical skills in some of the
following areas: network forensics / deep packet inspection, host
forensics, malware analysis, ability to effectively manage critical
incidents.

Analysts must have the requisite knowledge to lead an incident, provide
high level communications, manage assigned analysts, develop and document
procedures, and ensure appropriate reporting.


Responsibilities:
• Develop, document, and formalize a standardized global incident response
processes across ADP organization.
• Determine key stakeholders.
• Define, build, test and implement correlation rules that support the
monitoring and enforcement of the ADP security policies.
• Produce metrics that support GSO’s strategic direction.
• Gather current best practices from various key stakeholders.
• Determine critical support requirements needed to ensure ADP stakeholders
are fully supported.
• Conduct technical analysis and assessments of security related incidents,
including malware analysis, packet level analysis, and system level
forensic analysis.
• Liaise with other ADP organizations.
• Assist in the development and maintenance of new procedural documentation
including newly developed correlation rules. This also includes the
training of appropriate security analysts.
• Coordination of incident response activities (escalations, notifications,
etc.).
• Monitoring, managing, and coordinating the information collection and
cataloging of activities from a variety of public and private security
related information sources, as well as documenting the initial analysis of
vulnerability reports and how they may relate to ADP.
• Perform other duties as assigned.
Required Skills:
• Experienced in security incident activities.
• Strong documentation and presentation skills.
• Excellent analytical skills
• The candidate should have experience in Networking, Windows and *nix
environments
• Conceptual knowledge of operating system internals (file handles,
threads, semaphores, stack, heap, entry points)
• Understanding of TCP/IP and network communications
• General knowledge of web content scripting languages.
• Knowledge of computer security forensics and security vulnerabilities
• Strong knowledge of interpreting the log output of Windows and Unix logs
• Experience producing architectural diagrams and overviews for both
business and technical audiences.
• Some exposure to collaborative workflow and documentation systems (Wiki
documentation, project blogging)
• Some experience providing training and mentoring, preferably to both
onshore and offshore teams.


Desired Skills:

• Experienced in security incident management.
• Hands on experience with reverse engineering tools
• Program Management
• Ability to reverse engineer undocumented binary software
• Familiarity with interpreting the log output of a wide selection of
device classes, spanning Networking and host Infrastructure service devices
• Packet-level behavioral familiarity with most major TCP/IP application
protocols
• Knowledge of basic packing and obfuscation techniques
• Strong shell or other programming skills
• Knowledge of how to operate a debugger (IDA Pro, OllyDbg)
• Enough SQL familiarity to generate nested queries and joins in a major
SQL dialect
• Experience in reverse-engineering script content in multiple formats
• Broad knowledge of data and executable file types and extracting
information from them
• Functional knowledge of shellcode fundamentals
• Some experience providing training and mentoring, preferably to an
international audience Reverse-Engineering and Executable Analysis Skills
• Well versed in multiple security technologies such as SIEM; Intrusion
Detection Systems; End-point security; Web Proxy/Content Filtering; Active
Directory, PKI, Radius, RSA SecureID, Log Analysis
• Broad knowledge of business-impacting security scenarios and viable
methods to detect these scenarios (Cross device log correlation).
• Functional experience with text and data representation and manipulation
(XML, HTML, Regular Expressions, Wiki Markup, SQL)
• Implementation experience with some of the major centralized
authentication systems (LDAP, KERBEROS, NIS, RADIUS)
• Implementation experience with general enterprise core service types
(web/mail/dns/file servers) and core infrastructure elements (general
switch/router/proxy/firewall configurations)
• General understanding of key components of international internet
architecture, both technical and political. Infrastructure and
Authentication Systems


Education:
• BA/BS or equivalent
• CISSP, GSEC, or GCIA
• Any of the following are a plus: GISP, GSLC, GCFE, GCFA, GREM, GCIH, PMP

Experience:
• 7 to 10 years experience





Thanks and Regards

*Andy*

Talent Acquisition Team  Glomark International LLC* *Direct: 908-333-5191
Fax: 908-688-8831 Email: a...@glomark-llc.com

-- 
You received this message because you are subscribed to the Google Groups 
"US_IT.Groups" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to us_itgroups+unsubscr...@googlegroups.com.
To post to this group, send email to us_itgroups@googlegroups.com.
Visit this group at http://groups.google.com/group/us_itgroups.
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to