Author name: Bruce

I have been doing IT and Cybersecurity specifically GRC for 20 years. I want to help people get into this field.

Uncategorized

System Admin with Linux and Netapps Experience in Research Triangle Park NC

System Admin with Linux and Netapps Experience in Research Triangle Park NC You can reach me at 908-765-0002 ext. 307 for any questions Position: System Admin        Location: Research Triangle Park NC Job Description: The System Administrator is responsible for troubleshooting, maintaining and implementing solutions to optimize the infrastructure operations. Analyzes and identifies all or part of a company’s existing or new computer (and/or server), peripheral, network, and telecommunications systems requirements, taking into consideration the special technology needs. Designs, implements, codes, tests, documents, and maintains systems integration solutions to total system or subsystems. Establishes functional and technical specifications, solves hardware/software interface problems, defines input/output parameters, and ensures integration of the entire system or subsystem. Required Skills: 4+ years of experience directly related to System Administration, including installation and maintenance of software and hardware. Experience administering Red Hat Linux based systems with minimal support, to include Linux sub-systems, patching, packaging (rpm), performance tuning, networking, user management, and security. Experience with Netapp Storage.

Uncategorized

Interview for Apple Identity and Access Management (IAM) Software Engineer in Bethesda, MD

Job title:-  Apple Identity and Access Management (IAM) Software Engineer Location:- Bethesda, MD Client:- NIH Overview: We are seeking an Apple IAM Software Engineer for the NIH Center for Information Technology (CIT) Identity and Access Management (IAM) service. As part of the IAM team, the Apple IAM Software Engineer will provide planning, architecture, design, development, maintenance and/or support of software tools that support the identity, credential, access and security needs of the NIH Macintosh community. You will break down software requirements and create highly complex systems; and lead mid and senior level engineers on complex tasks. You will also understand client needs working with internal and external customers; as well as, act as a mentor to junior software engineers.  This is a full-time position and will be based in the customers office in Bethesda, MD. Responsibilities: Support the NIHAuthPlugin (an open source project to enforce PIV login on Macintosh computers) Support non-PIV two-factor authentication alternatives Provide Mac security engineering support, e.g., pen-test scenarios involving Macs in the enterprise Provide support for solutions to meet other NIH enterprise and IC-specific needs, e.g., tools and engineering advice to Institutes and Centers (ICs) that lack Mac expertise Develop iOS apps, as needed Provides recommendations to infuse new technology Develops design artifacts Collaborates with PMs/Users/Business Analysts (BAs) to comprehend requirements, evaluate alternatives, and establish timelines Required Qualifications: Master’s degree and 10+ years’ experience in the IT field (or equivalent combination of education and experience) 3+ Years’ experience working with Apple/Macintosh Knowledge of OS X’s authorization APIs In-depth Objective-C knowledge C / C++ and Swift knowledge for supporting surrounding frameworks OS X System Python knowledge for installer scripts Issue tracking and version controls with git In-depth understanding of Public Key Infrastructure (PKI) Mobile app development that could assist NIH in systems / security functions Desired Qualifications: Excellent English written and oral communication. www.22ndstaffing.com

Uncategorized

Cyber Engineer in Princeton, NJ

This is a job Opportunity from CSC (Educational Testing Service) Title:                                                   Cyber Engineer (58486-1) Position:                                            1 Location:                                          Princeton, NJ Duration:                                           3 Months FTE Visa-                                                   US citizen and GC only. Comments Two phone interviews first professional/technical second with client is required Candidates should expect to convert to fulltime compensation at conversion 80-100k Skills: The Security Engineer role is a technical security position that provides activities like: Security technology operations (configuring Firewalls, IDS devices, log collectors, AV environments, etc.) Performing detail technical security reviews of new systems or architectures Investigate suspicious activities or alerts Work with service teams to secure various technologies Develop technical reports and other collateral as required by the scope of services As a generalization, the Security Engineer will support the ASM as the technical expert in the delivery of that role’s services Job Description:   Professional Data Security – Bachelor’s degree or equivalent combination of education and experience Bachelor’s degree in information systems security, computer science, or related field preferred Two or more years of experience in information systems security Experience working with company software and hardware products Experience working with domain structures and digital signatures Experience working with operating systems Experience working with firewall theory and configuration Experience working with security systems and implementation procedures Experience working with network software and hardware Experience working with computer desktop packages such as Microsoft Word, Excel, etc. Other Qualifications Communication skills to interact with team members, management, and support personnel Analytical and problem solving skills for design, creation and testing of security systems Ability to work independently and as part of a team Work Environment Specifically, we are seeking to hire a Cyber Security Technical Consultant that can work from a client site. If the candidate lives in another city, travel is required and reasonable travel expenses will be covered by the client.. · Develop and implement QRadar or SourceFire systems for external clients. · Review and assess existing client and internal QRadar or SourceFire SIEM · Develop/Tune correlation rules for QRadar or SourceFire SIEM · Develop, implement and validate monitoring and maintenance processes for QRadar Source Fire SIEM systems · Review logs submitted by customers to determine the root cause of errors and performance degradation. · Designs/performs audits of computer systems to ensure they are operating securely and that data is protected from both internal and external attack. Makes recommendations for preventive measures as necessary. · Assesses assigned system to determine system security status. Designs and recommends security policies and procedures to implement; ensures compliance to policies and procedures. · Responds to more complex queries and request for computer security information and reports from both internal and external customers. · Provides technical consultation on highly complex tasks; may assist and/or provide limited direction to lower level technical personnel. · Provides product recommendations of security packages to customers; Reviews vendor products and makes recommendations as appropriate. Conducts cost analyses to determine feasibility of new products for clients. · Designs training materials for computer security education and awareness programs. · Performs network and application vulnerability scans when required. · Network Penetration Experience is a Plus Phone:908-765-0002 Extn:-282 damandeeps@tscti.com

Uncategorized

Microsoft Windows 10 STIG, V1R2

DISA has updated the Microsoft Windows 10 STIG Version 1 Release 2.  The requirements of the STIG become effective immediately.  The STIG is available on IASE at  http://iase.disa.mil/stigs/os/windows/Pages/win10.aspx.

Uncategorized

STIG Viewer Known Issues

When adding/updating ‘Finding Details’ or ‘Comments’ for any given vulnerability within a checklist in STIG Viewer, you must leave the control, by clicking or tabbing out, in order for the information to save (the event handler raises when focus is lost from the control). While this is functioning as expected, we realize this is not necessarily intuitive to the user, and we will correct it in the next update (version 2.3) of the tool. Additionally the hot-key for saving the checklist (Ctrl+S) is not currently present, but will be added in the next update as well. Please use the menu selection to save until the next release. A STIG Viewer User’s Guide has been posted to http://iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx.

Uncategorized

FullTime Position Sr. Network Engineer USA

We are an IT Services Organization and Offering IT/ITES (Staffing) Services to our Dedicated Direct Customers. We have urgent opening with one of our direct clients with an utmost importance now and would like to share the job description as mentioned below to seek your comfort ability and availability. Please send your updated resume with contact number. Immediate Hire position 1) Title: Sr. Network Engineer Location: Houston, TX Start Date: Immediately    visa Status :: GC OR US Citizen Duration: 3-6 Months   Senior Level resource to help design, architect and implement design in new datacenter Overlay Transport Virtualization (OTV) is experienced with OTV deployments Datacenter Migration Exp. Nexus  5k- 7k design and configuration exp.     Immediate Hire position 2) Title: Sr. Network Engineer Location: NYC Start Date: Immediately    visa Status :: GC OR US Citizen Duration: 9 Months   Juniper SRX experience Juniper MX router experience, Palo alto security firewalls, nexus 5K and 9k and 2K, Mag, pulse secure, VPN appliance, BGP IGP networking and general route switch protocols, layer two networking with security. Strong networking     Immediate Hire position 3) Title: Sr. Network Engineer Location: Boston, MA Start Date: Immediately    Duration: 10 Months (U.S. Citizens)   Core Cisco Networking experience Upgrading Catalyst switches Cisco Prime Infrastructure Nexus OS upgrades Cisco Wireless

Uncategorized

LogRhythm | Technical Alliances Engineer – Boulder, CO

This position will expose you to the ever growing field of technology companies within network security. There is a clear growth opportunity to gain experience working with an established, in demand security software company that is partnering with other top tier security vendors. As LogRhythm continues to grow, this position will play a critical role in enhancing our customer base through developing successful alliances within the security ecosystem. This team is positioning our Security Intelligence Platform with the top technology partners to showcase specific use cases that will help support common customers. The business development team works with our alliance partners in a number of ways including addressing a complex and evolving security landscape, meeting compliance requirements and achieving greater operational efficiency. I’ve included the web page for our partner page which provides more detailed information: https://logrhythm.com/partners/ If you’re interested in learning more please let me know and we can set aside some time to talk. Otherwise please feel free to forward within your network to anyone that might have interest.

Uncategorized

Product Solutions Specialist in Herndon, VA

We have an immediate need of a Product Solutions Specialist in Herndon, VA. This position is with HPE. Please see below the job description and send across the updated copy of your resume ASAP. I will get back with you ASAP. Title:               Product Solutions Specialist Client:              Department of Justice Location:         HPE Duration:        10 Months General Description: The candidate applies subject matter expertise of Imperva Web Application Firewall, service oriented architecture, and web services in support of a web application hosting infrastructure. Candidate is responsible for performing ongoing maintenance, to include ensuring devices comply with enterprise security policies. Candidate works with application development teams to configure devices to support new and changing application requirements. Candidate coordinates with architecture groups to generate product roadmaps. This position requires development and deployment expertise, as well as experience troubleshooting incidents. Typical Duties: Manages and monitors web application rules and policies across the enterprise. Manages the day to day governance of the enterprise web application firewalls, database firewall, and other security controls. This includes configuration tuning, troubleshooting, as well as defining and executing escalation criteria. Work with engineering teams to tune control systems to best meet the need of the business. Troubleshoots incidents in development and production environments. Meets with auditors to provide implementation details and compliance data. Works with application and operations teams to ensure successful upgrades of infrastructure components and application code. Participates in incident and change management processes. Creates and maintains work instructions and deployment documentation. Provides after-hours on-call support. Required Skills and/or Product Knowledge: Expert level experience with the Imperva Web Application Firewalls, preferably version 11 or greater. Demonstrated knowledge of maintaining web application rules and policies Subject Matter Expert experience level. Experience with IDS/IPS networking devices in a production environment. Thorough knowledge of the OSI stack with an understanding of how these layers are utilized within a web-based application. Thorough understanding of how web applications are deployed in a load balanced infrastructure. Knowledge of SSL/TLS traffic handling and encrypt/decrypt policies. Ability to document security governance processes and work instructions. A strong attention to detail Ability to interact with personnel at all levels across the organization and to comprehend business imperatives. A strong customer/client focus with ability to manage expectations appropriately and provide superior customer/client experience and build long-term relationships. The following skills and experience are preferred: Experience with other web application firewall products and/or security technologies. Bachelor’s degree in information systems or relevant field of study. CISSP or other security certification. Excellent data analysis skills using standard office tools are required. Excellent communications skills (verbal and written) are required. Experience in an ITIL environment and working with a service ticketing system Experience with other Firewalls Experience with Load Balancers Experience with DNS Experience with Unix

Uncategorized

DISA has developed the Draft Application Security Development Security Technical Implementation Guide(STIG) Version 4

DISA has developed the Draft Application Security Development Security Technical Implementation Guide(STIG) Version 4 The Draft STIG is available at: http://iase.disa.mil/stigs/app-security/app-security/Pages/app-security.aspx for review and comment. Please provide comments, recommended changes, and/or additions to the draft STIG by 25 February 2016 on the Comment Matrix spreadsheet, and send comments via NIPRNet email to:  disa.stig_spt@mail.mil.  Include the title and version of the STIG in the subject line of your email.

Scroll to Top