Author name: Bruce

I have been doing IT and Cybersecurity specifically GRC for 20 years. I want to help people get into this field.

Uncategorized

Security Engineer Location Wayne, Pa

  please call 201-340-8700 Ext 436 to discuss as soon as possible. One of our clients a   company in the Wayne ,PA area has a current opening at a competitive rate, for a (CONTRACT) experienced  Security Engineer  professional to add to their team. I reviewed your resume in our database and think this could be a great fit! Below are some key highlights of the position, if this is of interest please call me.  We can discuss the details of this opportunity and /or further determine which types of opportunities you may be interested in exploring. Brief Job Description: Net2Source, Inc. is one of the fastest growing IT Consulting company across USA. N2S is headquartered at NJ, USA with its branch offices in Asia Pacific Region. N2S offers a wide gamut of consulting solutions customized to client needs including staffing, training and technology. Job Summary: Subject: Security Engineer Location:Wayne, Pa Long term contract Phone & Skype Relevant experience includes: • DLP technology e.g. Vontu / Symantec • Site / application security assessment • Vulnerability Management solutions e.g. Nessus / Qualys • GRC solutions e.g. RSAM / Archer • Endpoint security management e.g. BigFix/IEM, ViewFinity • Firewall rule assessment e.g. Nipper Experienced with DLP and related tools. GENERAL DUTIES & RESPONSIBILITIES: • Evaluates and recommends security technologies for use throughout the enterprise. • Establishes technical and administrative standards through development of policy, procedure and best practices. • Develops strategies to address evolving technology security needs and issues, and guide company towards a secure infrastructure that meets legal, regulatory, and client compliance requirements, as well as service and operational level agreements. • Works with all architect(s) to drive Enterprise Architecture (EA) processes and best practices. • Ensures that all security solutions, architecture design and analysis work is documented in a structured fashion. • Works closely with peers in Security Operations, Security Compliance, to ensure that security reviews regarding information security technologies provide feasible requirements and are consistent with contracts, and regulations • Monitors information security news and keep abreast of events, research, and developments. • Assists senior management in defining the overall information security strategy. • Designs in-house solutions for maintaining security posture. • Proactively remains abreast of related evaluating technology trends and requirements, such as emerging standards for new technology opportunities. • Achieves an in-depth knowledge of product offerings and interfaces. • May mentor and/or train operational staff and contractors on security tools, processes, and procedures. • Performs other related duties as assigned. EDUCATIONAL REQUIREMENTS: Bachelor’s degree in computer science preferred or the equivalent combination of education, training, or work experience. CISSP, GSEC, CCNE, or other security or network certifications desired. (“VULNERABILITY MANAGEMENT” OR NESSUS OR QUALYS) AND (“FIREWALL RULE ASSESSMENT” OR NIPPER) GENERAL KNOWLEDGE, SKILLS & ABILITIES: • Knowledge of networks technologies (protocols, design concepts, access control) • Knowledge of security technologies (encryption, data protection, design, privilege access, etc.) • Knowledge of Financial Services industry • Knowledge of network design and engineering • Proficiency in interacting with executive level clients • Proficiency in time management, communications, decision making, presentation and organizational skills • Proficiency in planning, reporting, establishing goals and objectives, standards, priorities and schedules • Excellent decision-making and problem solving skills • Excellent verbal and written communication skills to technical and non-technical audiences of various levels in the organization • Proficiency in establishing and maintaining effective working relationships with employees and clients • Excellent input and planning into application development, systems engineering, and network engineering for development of security requirements and best practices are implemented and followed

Uncategorized

Network Engineer in Monterey CA with federal

Position:               Network Engineer IT LEVEL II Location:              Monterey CA Duration:              Full Time Client:             DLI                                                                                                                                                               CCNA/CCNP or Brocade Certification Responsibilities include testing and analyzing all elements of the network facilities. The duties will include planning, installation, maintenance, and management of the network. • Educational requirements include a Bachelor’s Degree in a related discipline from an accredited college or university or the equivalent experience in network engineering. • Experience requirements include seven (IV) years of progressive experience in computer system/network engineering, including two years of specialized experience related to the task. . Two years documented experience in addition to previously stated experience requirements can be used as equivalent for certification.

Uncategorized

Administrative Assistant III In St. Denver, CO

Position: Administrative Assistant III Client: Regional Transportation District (RTD) Location: 1600 Blake St. Denver CO 80202 Duration: 06 Months Hours: 8:00am – 5:00pm M-F (work late Tuesday evenings for board nights) Dress Code: Business Casual/Professional Parking: No free parking. FREE bus pass available. Skill Set:  Customer service oriented, meeting management skills,  note taking and meeting minute preparation, technology AV savvy, expert with MS Office, calendar management skills, workload management skills, professional telephone skills with effective communication skills both orally and written. Sharepoint experience preferred, available to work late on Tuesday evenings. Duties: Customer Service Oriented Prepares, reviews and tracks Board Member expense records Reconciles credit cards and invoices and processes payment requests Meeting Management – prepares agenda, scheduling meetings and catering Prepares meeting material, note taking and preparation of minutes Attends board meetings and maintains attendance lists. Operates audio/visual equipment and e-Boardroom Provides Administrative support for Board Members and Board Office Staff Provide telephone coverage Maintain mailing list and manage calendars Performs record keeping functions

Uncategorized

Jr. Information Assurance Analyst in Wright Patterson Dayton, Ohio

Position: Jr. Information Assurance Analyst Duration: Full Time Location- Wright Patterson Dayton, Ohio   We are looking to bring 2-3 staff to support our HIAR HIAM contract at wright Peterson Dayton, Ohio. We are looking to bring staff on full time basis. We are not looking any certification like CISSP but they need to have Security Plus

Uncategorized

Systems Administrator in Durham, NC with NIEHS

  JOB DESCRIPTION: Position: Systems Administrator Location: Triangle Park, NC Duration: Full time  CLient: NIEHS • Education – Bachelors and/or advanced degree in Information Systems, Engineering or Computer Science, or 6 years of demonstrated hands on experience within the last 3 years working on Linux/Netapp environments, and 3 years demonstrated hands on experience as a Senior Unix/Linux Administrator, and 3 years demonstrated hands on experience providing a full range of Disk Array support, would qualify. • Experience – a minimum of 3 years of hands on experience working on Unix/Linux environments o 5 years of demonstrated hands on experience as a Senior Unix/Linux Administrator maintaining, troubleshooting, and enhancing Virtual Unix/Linux environments o 5 years demonstrated hands on experience providing the full range of Disk Array support Kindly send me your updated resume along with expected rates at rosalynm@tscti.com also fill the skill matrix below. Salary/Rate Expectation: Full Name: Contact No: Alternate contact (if any): Email address: Current Location: Relocation: Availability: Visa status:

Uncategorized

Quarterly release: SRG-STIG_Library.zip

DISA has released updates to the SRG/STIG Library Compilations in .ZIP format to correspond with the latest quarterly SRG/STIG update cycle. This release also includes newly released SRGs and STIGs published since the last quarterly release of the SRG/STIG Library Compilations. The SRG/STIG_Library.zip is a compilation of DoD Security Requirements Guides (SRGs), DoD Security Technical Implementation Guides (STIGs) ( provided in XCCDF or .pdf format), Checklists, Security Readiness Review (SRR) Tools that are available through the IASE web site’s STIG pages. Two versions of the compilation are produced, an FOUO version and a NON-FOUO version entitled  U_SRG-STIG_Library.zip and FOUO _SRG-STIG_Library.zip.  The file name preceded by FOUO_ contains STIGs and related content that has been designated as FOUO. As such a DoD PKI certificate is required to download it. The file name preceded by U_ is the NON-FOUO version which does not contain FOUO. It is therefore downloadable by the general public. These compilations may be used and distributed in the same manner as the individually downloaded documents. The FOUO compilation as a whole and any separated FOUO content must be handled in accordance with customary FOUO handling and dissemination guidelines. Please see “SRG/STIG Library Compilation READ ME” for additional information to include include download / extraction instructions and a FAQ. All related files are available on IASE at: http://iase.disa.mil/stigs/dod-purpose-tool/Pages/index.aspx.

Uncategorized

Job Opening In COLUMBIA, SC

Position Title:                    Linux Administrator Position Id:                         6406-1 Duration:                             5 Months Work Location:                 COLUMBIA, SC 29210 SCOPE OF THE PROJECT: SOC SECURITY AND LINUX SUPPORT ENGINEER Support the Division of Information Security (DIS) Security Operations Center (SOC) daily operations with installation, configuration, administration, monitoring and troubleshooting security sensors, log sources, and supporting systems.DAILY DUTIES / RESPONSIBILITIES: MANAGE AND ADMINISTER A LARGE NUMBER OF LINUX SERVERS AND OPEN-SOURCE SOFTWARE PACKAGES. MANAGE OPEN-SOURCE PATCH MANAGEMENT AND STATUS MONITORING SYSTEMS.INSTALL AND CONFIGURE SECURITY SENSORS COMPRISED OF OPEN-SOURCE CENTOS LINUX PLATFORMS AS WELL AS IBM/QRADAR FLOW COLLECTOR AND EVENT COLLECTOR APPLIANCES. WORK WITH STATE ENTITIES TO INTEGRATE NEW LOG SOURCES INTO SOC MONITORING AS WELL AS MAINATIN AND MONITOR EXISTING LOG SOURCES. REQUIRED EDUCATION/CERTIFICATIONS: Bachelor’s degree, or 4 years of experience in Linux system administration. Category Name Last Used Last Used by Candidate (Year) Experience Candidate Exp. (in years) Network Security information security principles and practices Within 6 Months 2 – 4 Years Network Security IT Security Within 6 Months 2 – 4 Years Network Security Security Information Event Management (SIEM) systems development / configuration Within 6 Months 2 – 4 Years Networking & Directories Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web apps, databases, strong authentication, operating systems and network security protocols and procedures. Currently Using 4 – 6 Years Networking & Directories Information Security Within 6 Months 2 – 4 Years Operating Systems/APIs Linux Currently Using 4 – 6 Years Programming Languages BASH SCRIPTING Within 6 Months 2 – 4 Years Programming Languages Perl Within 6 Months 2 – 4 Years Programming Languages Python Within 6 Months 2 – 4 Years Programming Languages Relevant programming languages and scripting tools. Within 6 Months 2 – 4 Years Protocols Knowledge of networking protocols, including TCP/IP, HTTP, NTP, DNS, MLLP, NDM Currently Using 4 – 6 Years Protocols TCP/IP Currently Using 4 – 6 Years Specialties Experience in developing and maintaining documentation for policies, procedures, and best practices Within 1 Year 2 – 4 Years REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE): Expert level ability to administer Linux and open-source systems. Skilled in scripting languages such as Bash, Perl or Python. Understanding of computer and network operating system fundamentals on diverse platforms (e.g. Unix, Linux, Windows, Mac/OS, Cisco, Juniper, etc.) Knowledge of network protocols and ability to perform TCP/IP packet analysis Excellent written and oral communication skills PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE): Cyber awareness and understanding. Knowledge of information security topics related to computers, networks, and software Experience with Security Information Event Management (SIEM) and Intrusion Detection Systems (IDS) configuration, tuning, and operation. Understanding of information security event correlation. Experience with authoring of policies, standards, or procedures.

Uncategorized

Security Specialist in Raleigh NC

www.22ndstaffing.com Short Description: Contract resource with senior Information Security Analyst skillset, with focus on Identity and Access Management (I&AM), risk analysis, and information security policy, standards and procedure development. Complete Description: The Department of Transportation is seeking a short-term contractor to implement and maintain information security best practices within the NCDOT environment related to Identity and Access Management (I&AM) as well as other information security risk assessments, analysis and consultation for various IT systems.  Identity and Access Management (I&AM) is responsible for designing, developing and supporting a suite of agency wide shared services that primarily focus on identity, authentication, authorization, request management, provisioning, and certification.  The staff is part of the IT Information Security Office (ISO), with end-to-end responsibility for the agency-wide information security policy and standards.  The candidate should be an information security analyst with extensive information security operational experience, that also understands enterprise architecture, policy, standards and procedure and can consult with support, implementation and architecture teams. Responsibilities will include: Working with project & team managers and stakeholders to produce high quality and detailed identity and access management business requirements as they related to information security Develop and enforce policies for identity and access management (I&AM) team for claims based authentication Define the information security policy, standards and process/procedures as required for utilizing an identity management system including:  role mining, attestation, account provisioning, cloud/federated access provisioning, and others. Develop  security policies and procedures for Roles Based Access Controls in claims based architecture Develop security policies and procedures for claims based architecture for Active Directory and Sharepoint Actively participate in assessment, planning, architecture, and design activities Design, document, and implement security controls for Identity and Access Management BizTalk, UDDI, web services, and claims based authentication experience Design, document, and put security governance in place for external claims based authentication The position will be responsible for documentation of security standards, security patterns, processes and procedures related to securing of web services and interoperability of all systems for the 3C and Data Services project.  The individual will educate application development teams on those standards and processes from an information security perspective.

Uncategorized

SCCM SME in Dahlgren VA with JWAC

This is Parmender Singh from 22nd Century Technologies  Inc. (TSCTI). We are Government Software integrators working with DoD and civilian space and are fast growing company in DoD sector with clients like US Air Force, US Navy and Army. Find more about us at www.tscti.com . Kindly share detailed resume to parmenders@tscti.com to discuss this opportunity in detail. Position: SCCM/ SME Location- Dahlgren VA Client: JWAC Deployment Support SME – Prepping and developed applications for deployment, experience with configuring, executing, monitoring and troubleshooting deployments in MS SCCM

Uncategorized

Security Manager at Boston Area, MA

Please send your updated resume with rates expected for this position on shivamn@tscti.com Title:                                                  Security Manager (57620-1) Location:                                            Boston Area, MA Duration:                                            6 Months+ Fulltime Permanent Visa-                                                   US citizen and GC only Comments:    Long term position on site at client Merck Job Description:   The Account Security Manager (ASM) is the primary point of contact for the delivery of Cyber services to the customer. The ASM is responsible for assuring that the compliance of services and obligations is met for any in-scope delivery for the account. This includes overseeing other service centers as they deliver to the customer, as well as management oversight of all Cyber Security Managed services delivered to the account. The ASM will represent CSC to the account on all matters of IT Security and Compliance and will engage other Cyber resources as necessary to fulfill this obligation. The ASM’s roles functions include the following: * Develop a deep relationship with the client based on trust, delivery and execution in order to drive service excellence and ultimately sales * Develop a thorough understanding of the client’s business and IT Security Risk & Compliance Management strategies; and deliver Cyber Security services accordingly * Ensure that Cyber Security’s capabilities are provided maximum opportunity to support account expansion goals, including assisting in opportunity identification; strategy and service offering development; proposal writing; and client presentations * Strive to become a ‘go-to security expert’ to the client, either providing expert technical advice themselves, or bringing in subject matter experts where appropriate from both within and outside CSC * Coordinates investigation, management, and response to all security and virus incidents with impacts to the account and keeps appraised of all security and virus incidents and response in other regions * Provides security reports to the client and the CSC account as required by contractual commitments or as operational conditions dictate * Develops security and compliance strategy jointly with the client to anticipate future threats and requirements, and defines the strategic roadmap for future services and technology * Manages “reach-back” support to the CSC Cybersecurity organization and other CSC product lines (PLs) for subject matter expert (SME) support and technical assistance, such as forensic investigation Qualifications CISSP/CISM or equivalent certification highly desired, or someone willing and able to achieve those certifications strongly preferred. It is also recommended that ASMs have an understanding of ITIL Foundations. An ASM should also have good communications, interpersonal and organizational skills.

Scroll to Top