Author name: Bruce

I have been doing IT and Cybersecurity specifically GRC for 20 years. I want to help people get into this field.

Uncategorized

Sr Systems Administrator in Cedar Rapids, IA

This is a Job Opportunity from Rockwell Collins Title                                       Sr Systems Administrator 1 (12446) Location:                             Cedar Rapids, IA Duration:                              29 W, 5 D PLEASE NOTE: **possibility of working remotely. if this is the case, there may be some training in Cedar Rapids. Travel expenses will be reimbursed for this training** Job Description: A challenging opportunity to be part of Rockwell Collins backup and storage strategies as we introduce modern redundancies, replications and cloud initiatives. These positions are responsible for the design, standards, and overall availability and performance of the Rockwell Collins backup and storage environments. Reporting to the Manager of Enterprise Data Centers and Storage, this technical position will provide second and third tier technical support and participate in projects to ensure that they are implemented to RC’s satisfaction. These roles will also be responsible for Responsible for mentoring entry level admins Requirements: -Bachelor’s degree in appropriate discipline or in the absence of a degree, HS Diploma/Equivalent plus six years of related experience -Minimum of 5-10 years related experience with emphasis in enterprise backup (EMC, NetApp, HP hardware). -Previous experience working with multiple teams, including internal and external departments and organizations. -Experience managing and leading virtual, cross-functional teams, including defining requirements, developing architecture designs, assisting in project plans, and delivering results. Preferred Experience: Demonstrated experience and/or certifications of following key technologies are a plus: *EMC VNX, *XtremIO *Networker *Avamar *Data Domain *VPLEX *RecoverPoint *Data Protection Advisor *SRM *Load balancing *clustering

Uncategorized

Automotive Cyber Security in Farmington Hill, MI

Title:                                 Automotive Cyber Security (0212-1) Location:                           Farmington Hill, MI Duration:                          Long Term Note- JD is divided into 3 classes: (a) Domain Expert (b) Product Expert (c) Testing Expert Ideally we need to find someone who is an expert in all 3 …. but it is a challenge. So we are good if we find one profile, who is aligned with any 2 of the 3 classes. Job Description         Automotive Security – Domain Expert •         Cyber Security domain experience applicable to Automotive product development with over 15+ years of experience •         Solution architect involved in protocols, standards and practices applicable in Automotive Cyber Security •         Capable of mentoring team in areas of Intelligence Transport Systems standards implementation (TS102 in particular). Hold on Cyber Security guidebook J3061 (currently in WIP) •         Good hands-on knowledge on high and low potential security loopholes and related market intelligence in Automotive domain •         Effective involvement in defining and crafting best practices in Internet security for service delivery platforms (including machine to machine; server to server and server to vehicle) •         Worked on reviewing Cyber security specifications and taking these requirements through end to end implementation for an Automotive Head unit product Automotive Security – Product Development Expert •         Cyber Security domain experience applicable to Automotive product development with over 15+ years of experience •         Experience in Communication and Network Security •         End to end involvement in bringing up security layers for embedded products using Cryptography (including Encryption identifiers) •         Contribution in areas of Authentication, Digital Signature in form of high level design, white papers, forum participations etc. Automotive Security – Testing Expert •         Cyber Security domain experience applicable to Automotive product development with over 15+ years of experience •         Hands on with Vulnerability analysis and threat modelling with the built product (preferably Infotainment head unit) •         Involved with Risk Assessment reviews •         Testing experience in form of penetration testing and fuzz testing •         Assessing the quality of the built product against Cyber Security guidelines for safety conformance •         Good hands-on knowledge on high and low potential security loopholes and related market intelligence in Automotive domain

Uncategorized

OIT – Help Desk Support I ( 1 position ) Denver CO

Identity and Access Management Analyst The Governor’s Office of Information Technology Identity and Access Management (IAM) work unit is responsible for how users within an organization are given an identity – and how it is protected, including saving critical applications, data and systems from unauthorized access while managing the identities and access rights of people both inside and outside the organization. The IAM analyst will be responsible for creating accounts in the Electronic Death Registration system. The analyst will work closely with Manager of IAM, CDPHE Program Area, IAM team and Customers. This project serves to expand capacity in the Identity & Access Management team with the Governor’s Office of Information Technology to provide access credentials to Electronic Death Registration (EDR) system users. The Office of the State Controller has implemented the new system to increase efficiency and decrease delays for individuals awaiting issuance of death certificates. In addition to those responsibilities listed above, the IAM analyst may be required to: ●    Review each registration packet received from the Office of the State Controller to determine user group assigned to applicant ●     Enter applicant data into the credentialing system to generate unique system access credentials ●    Issue complete credentials (set of user ID, Password, and PIN) to user through contact information documented in the applicant packet ●    If credentials cannot be verified or issued after two attempts to contact applicant, contractor shall document the issue or problem preventing completion of the process and maintain a list of users with unresolved/outstanding applications Cooperative agreement: This position facilitates identity and access management. The position is liable for ensuring that customer requests for security access is completed in a timely manner, provides second level technical support to the project team, end users and OIT functional groups. This position will perform ticket management and participate in project meetings. It is the responsibility of the IAM analyst to manage Identity and access within CA Service Desk, Customer Portal (EEM), Active Directory and Google. Qualifications:  The Identity and Access Management unit is responsible for provisioning support which includes ticket management, customer service, and knowledge of least privilege methodology with security rights, permissions and groups, experience with Active Directory, CA Service Desk, and Google. Due to the importance of this position, it is expected that a person supporting IAM has basic troubleshooting skills with networking and computer systems, can multitask, work in a fast paced environment while providing excellent customer service. Terms and Conditions:  As a condition of employment you may be required to submit to additional background checks and/or screenings during the course of your employment with OIT. CYBER SECURITY Contract staff is required to observe the Colorado Cyber Security Policies, as published and updated by the Office of Cyber Security. These policies provide guidelines concerning vendor security controls and vendor reporting and monitoring. Please reference P Thanks & Best Regards Nancy Sahni 22nd Century Staffing, Inc Minorities  Woman own Company Sr.Technical Recruiter nancys@22ndstaffing.com Position Title:                                                                    OIT – Help Desk Support I ( 1 position ) Position Id:                                                                         PO 2016-9259 Agency:                                                                                State of Colorado – OIT Duration:                                                                             4.5 Months Work Location:                                                                 4300 Cherry Creek Dr. S. Denver , Colorado  80246 Interview Type:                                                                In person Preferred Citizenship mandate:                                                     US citizen preferred      

Uncategorized

IBM DataPower STIG Version 1

DISA has released the IBM DataPower STIG Version 1. The requirements of the STIG become effective immediately.  The STIG is available athttp://iase.disa.mil/stigs/net_perimeter/network-infrastructure/Pages/other.aspx.

Uncategorized

VMware vSphere 6.0 STIGs, V1R1

VMware vSphere 6.0 STIGs, V1R1 DISA has released the VMware vSphere 6.0 STIGs Version 1 for ESXi, vCenter Server for Windows and Virtual Machine.  The requirements of the STIGs become effective immediately.  The STIGs are available on IASE athttp://iase.disa.mil/stigs/os/virtualization/Pages/virtualization.aspx.

Uncategorized

Information Security in CHATTANOOGA TN

  Title                                                         INFORMATION SECURITY(5263850) Location:                                                CHATTANOOGA TN 37402-2801 Duration:                                               12 month(s) Hours:                                                    8:00am to 5:00 pm Job Description THIS PERSON WILL BE ACCOUNTABLE FOR HAVING FIRM KNOWLEDGE IN A BROAD RANGE OF INFORMATION SECURITY DISCIPLINES AND TO EDUCATE AND DRIVE THE IMPLEMENTATION AND STANDARDIZATION OF THE TVA ENTERPRISE SECURITY PROGRAM. THIS WILL INVOLVE CONTRIBUTING TO THE DEVELOPMENT, MAINTENANCE, AND IMPLEMENTATION OF THE ENTERPRISE SECURITY PROGRAM, AND HELPING TO ENSURE THE OVERALL ACHIEVEMENT AND COMPLIANCE WITH THE SECURITY GOALS, REGULATORY REQUIREMENTS AND COMPANY DIRECTION. THIS PERSON WILL BRING BASIC INDUSTRY INSIGHT AND INFORMATION SECURITY UNDERSTANDING TO TVA. PERFORMS CONTROL AND VULNERABILITY ASSESSMENTS TO IDENTIFY WEAKNESSES AND ASSESS THE EFFECTIVENESS OF EXISTING CONTROLS, AND RECOMMENDS REMEDIAL ACTION REPORTS TO INFORMATION SECURITY MANAGEMENT CONCERNING RESIDUAL RISK, VULNERABILITIES AND OTHER SECURITY EXPOSURES, INCLUDING MISUSE OF INFORMATION ASSETS AND NONCOMPLIANCE PARTICIPATE IN PROJECT REVIEWS, INCIDENT DEBRIEFS AND EVALUATION (SUCH AS AUDIT) REVIEWS TO UNDERSTAND THE ISSUES AND GAPS, FACTOR INTO CONTINUOUS IMPROVEMENT AND ALTER/ENHANCE THE EDUCATION AND COMMUNICATION PLANS. PLAYS AN ADVISORY ROLE IN APPLICATION DEVELOPMENT OR ACQUISITION PROJECTS, TO ASSESS SECURITY REQUIREMENTS AND CONTROLS AND ENSURE THAT SECURITY CONTROLS ARE IMPLEMENTED AS PLANNED COLLABORATES ON CRITICAL IT PROJECTS TO ENSURE THAT SECURITY ISSUES ARE ADDRESSED THROUGHOUT THE PROJECT LIFE CYCLE ASSIST IN BUILDING BUSINESS CASES TO ESTABLISH, GROW AND CHANGE BUSINESS GROUPS, FUNCTIONS AND TECHNOLOGIES AND ESTABLISHES, DEVELOPS AND GROWS INFORMATION SECURITY, RISK AND COMPLIANCE OPERATIONAL SECURITY PROGRAM CONTRIBUTES TO THE DEVELOPMENT OF SECURITY ARCHITECTURE AND SECURITY POLICIES, PRINCIPLES AND STANDARDS. EDUCATION — A BACHELOR’S DEGREE IN COMPUTER SCIENCE, ENGINEERING OR A RELATED FIELD OF STUDY; OR EQUIVALENT EDUCATION, TRAINING & EXPERIENCE. EXPERIENCE — FIVE OR MORE YEARS OF CURRENT AND HANDS ON INFORMATION TECHNOLOGY EXPERIENCE PROTECTING ELECTRONIC AND INFORMATION BASED ASSETS. MUST HAVE SIGNIFICANT EXPERIENCE LEADING PROJECTS/TEAMS. AUDIT/INVESTIGATIONS EXPERIENCE IS HIGHLY DESIRED. OPERATING PLANT EXPERIENCE IS HIGHLY DESIRED. CERTIFICATION/LICENSE, ETC — CISSP, CISM, CISA, CPP, OR EQUIVALENT PREFERRED. KNOWLEDGE/SKILLS/ABILITIES — DEMONSTRATED MANAGERIAL COMPETENCIES IN LEADERSHIP, DELEGATION, ANALYSIS, TEAMWORK, COACHING/DEVELOPMENT, CUSTOMER SERVICE, PLANNING/ORGANIZING, FLEXIBILITY, STRESS TOLERANCE, COMMUNICATION. DEMONSTRATED STRATEGIC AND TACTICAL IT PLANNING. BROAD KNOWLEDGE OF BUSINESS FUNCTIONS AND RELATED EIT SECURITY NEEDS. MUST STAY FAMILIAR WITH FEDERAL LAWS, REGULATIONS, AND INDUSTRY BEST PRACTICES FOR EIT SECURITY STRATEGIES AND TECHNOLOGY. KNOWLEDGE OF IT OPERATIONAL INFRASTRUCTURE INCLUDING DISASTER RECOVERY/BACKUP, DATA MANAGEMENT, AND ABILITY TO DEVELOP/ENSURE SECURITY MEASURES/PROCESSES ARE IMPLEMENTED. EXCELLENT ABILITY TO RESEARCH, EVALUATE AND RECOMMEND TECHNICAL SOLUTIONS. ABILITY TO DEVELOP PLANS AND EXECUTE COMPLEX EFFORTS INVOLVING APPLICATION OF ADVANCED TECHNOLOGICAL KNOWLEDGE. MUST DEMONSTRATE TACT AND EFFECTIVE JUDGMENT DEALING WITH CONFIDENTIAL/SENSITIVE MATERIAL. ABILITY TO OBTAIN AND MAINTAIN SECRET SECURITY CLEARANCE REQUIRED. CANDIDATE MAY BE REQUIRED TO OBTAIN AND MAINTAIN A SECURITY CLEARANCE BASED ON POSITION / ACCESS REQUIREMENTS AND ESSENTIAL JOB FUNCTIONS. Job Details: • Previous work experience in the cyber security field. • Superior written and oral communication skills. • Strong understanding of TCP/IP communication and network topologies. • Vulnerability analysis and remediation using automated tools. • Extreme attention to detail, with emphasis on accuracy. • Bachelor’s degree in a computer-related field of study or 2+ years of related work experience.

Uncategorized

System Administrator in Town of Nederland CO

  Job Details- Position Title  System Administrator Position ID  2016-01 Client                          Town of Nederland Duration                                             1 Year+ extendable Work Location                                                           Town of Nederland, CO, 80466 Interview Type:  Phone/ In-Person In-Person (Submitted candidates should be local only) DESCRIPTION: Mandatory Skills: Must possess BS degree in Computer Science, Computer Engineering or related discipline Minimum 5-7 years of experience in Systems Administration and IT Experience and expertise in Microsoft Windows Server 2012, and related technologies such as backup systems, virus protection, desktop operating systems Experience in planning, design and installation/upgrade of network systems Experience in troubleshooting PC hardware and peripherals Experience in managing Windows desktops, laptops, and printers Experience in Windows Server and Linux operating systems Experience in asset inventory and renewals for all hardware and software Experience in software/ hardware-related policies and procedures Experience in system enhancement and install software & hardware

Uncategorized

Information Security Engineer in Englewood, CO

Job Title: Information Security Engineer Job Req #: 15-11366 Job Description:  Information Security Engineer Key Responsibilities and Qualifications: Information Security Engineer with experience in the following areas: Engineering Architecture Incident Response Compliance Bachelor’s degree in computer science, MIS, engineering, or a related field or equivalent work experience. 3+ years’ experience in IS working in a Security, Infrastructure and Operations environment. Good written and verbal communication skills with ability to communicate with multiple levels of the organization. Must possess the ability to deliver effective technical presentations. Focus on customer service and teamwork required. Ability to work flexible hours as required to meet business demands. Responsible for the daily operational management of Data Loss Prevention (DLP), Security Information and Event Management (SIEM), Web Security Gateway and Email Security Gateway solutions, external penetration testing, Vulnerability Scanning, and analysis of logs. Provide the organization’s information security risks under explicit management control. Documentation including SOI’s, SOP’s, and ConOps Additional Plus: Certifications – CISSP, PMP, GCFA, GCIH (any other IS certification is a plus) Location:  Englewood, CO Position Type: FTE/Direct Hire Ascent 303-694-5493 **If this is not a fit for you or you are not interested, Ascent Services Group offers an excellent Referral Bonus!  We look forward to hearing from you! About Ascent: The Ascent Services Group (ASG) is a nationally recognized technology staffing and consulting firm whose fundamental business is providing staffing services to Small, Medium, and Large Enterprise clients in our core market verticals: Financial Services, Healthcare, Technology and Life Sciences.  As consultants for ASG, you will have access to many of the top clients within the industries we serve.  Our goal is to deliver innovative talent through proven best practices and effective resource optimization.  Become one of ASG’s candidates and experience the difference! IND05    

Uncategorized

DATA/INFORMATION ARCHITECT in COLUMBIA, SC

   Please send your updated resume with rates expected for this position Position Title DATA/INFORMATION Architect Position Id 6414-1 Agency Department of Administration Duration 5 Months + Work Location 4430 BROAD RIVER ROAD, COLUMBIA, SC 29210 SCOPE OF THE PROJECT: Will work as an Information Security Architect/Engineer in the Division of Information Security and assist with the implementation, integration and operationalizing advanced security technologies. Develop operational plans for integrating and implementing security technologies within existing division and agency infrastructure and operational processes. Develop full life cycle processes and procedures along with repeatable guides for standard implementation and assist agencies as needed to incorporate systems. DAILY DUTIES / RESPONSIBILITIES: Information Security architecting, engineering and operations. This is a full information security to include, systems, network and procedural. Work with existing staff to architect and deploy advanced information security systems in a highly complex distributed enterprise environment. Develop installation, configuration, and operational process/procedure documentation to enable Division of Technology and Agencies to install and operate approved security solution. Work with Security Operations Center to identify enhanced data collection and correlation capabilities in existing data and gaps in data collection/analysis architecture, systems and procedures. Identify and develop solutions for preventing, detecting and mitigating risks to information and information systems. Conduct training as necessary to division and agency personnel on security processes, procedures and methodologies to ensure security event information is properly identified, correlated, documented and mitigated in accordance with department standards. REQUIRED EDUCATION: Bachelor’s degree or 8 to 10 years’ experience. PREFERRED CERTIFICATIONS: CISSP, CEH, MCSE, CCSP Category Name Last Used Last Used by Candidate (Year) Experience Candidate Exp. (in years) Network Security information security principles and practices Currently Using 6 + Years Network Security IT Security Currently Using 6 + Years Network Security Security Information Architecture Currently Using 6 + Years Network Security Application Security Within 1 Year 6 + Years Network Security risk/vulnerability assessments Within 10 Years 6 + Years Network Security Role Based Access Control (RBAC) Within 1 Year 6 + Years Network Security Security Information Event Management (SIEM) systems development / configuration Within 1 Year 6 + Years Networking & Directories Access control logging and reporting systems Currently Using 6 + Years Networking & Directories Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web apps, databases, strong authentication, operating systems and network security protocols and procedures. Currently Using 6 + Years Networking & Directories Information Security Currently Using 6 + Years Networking & Directories Network security Currently Using 6 + Years Networking & Directories data discovery and data loss prevention (DLP) Within 1 Year 6 + Years Networking & Directories Identity Access Management (IAM) Within 1 Year 6 + Years Networking & Directories privileged user management (PUM) Within 1 Year 6 + Years Specialties Event Handling Within 1 Year 6 + Years Specialties IBM Within 1 Year 6 + Years REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE): Cyber Awareness and understanding Expert understanding of information, computer and network security. Its operation, engineering, and architecture. Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web apps, databases, strong authentication, operating systems and network security protocols and procedures. Expert understanding of access control logging and reporting systems.PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE): Identity Access Management (IAM) Role Based Access Controls (RBAC) Privileged User Management (PUM) Data Loss Prevention (DLP) Security Information Event Management (SIEM) systems Vulnerability Assessment (VA) Applications Security (AppSec) User metadata and Information Security event collection, logging and correlation McAfee e-Policy Orchestrator (ePO) / DoD HBSS Tenable Security Center / Nessus IBM AppScan.

Uncategorized

Information Security Certification and Accreditation (C&A) specialist

Please review the job description below and let me know if this position is of interest to you. If it’s not a good fit for you currently, I’d still appreciate the opportunity to cultivate a working relationship with you. In getting to know you better, and in understanding your short-term and long-term career goals, it will certainly be a mutually beneficial relationship moving  forward. Title:                            Information Security Certification and Accreditation (C&A) specialist Location:                     Raleigh, NC Duration:                    6 Months –Job Description: The client seeks an Information Security Certification and Accreditation (C&A) specialist to perform C&A evaluations across multiple applications, ensuring continual compliance with federal and agency standards Required Skills: Experience with the Information Resource Security Certification and Accreditation (C&A) processes Must be certified in at least one of the following: Certified Information Systems Security Professional (CISSP) Certified Authorization Professional (CAP) Certified Security Analyst (CSA) Certified Information Security Manager (CISM) Experience with assessing business system for sensitivity and criticality Experience with recommending security requirements, based on generally accepted industry practices Additional Provisions Pass both a client mandated clearance process to include drug screening, criminal history check and credit check. Once candidate’s resume is approved and interview passed, the agency is responsible for providing drug screening. Failure to submit the drug screening results will delay the security clearance process. If a candidate is given an interim clearance, continuation of employment is then based on the candidate receiving a sensitive clearance.

Scroll to Top