Author name: Bruce

I have been doing IT and Cybersecurity specifically GRC for 20 years. I want to help people get into this field.

Uncategorized

Symantec Endpoint Architect 6-9 months in Milwaukee T&E paid

Location: Milwaukee, WI (with the first few weeks on site to get acclimated then various trips back on site when necessary– client will pay T&E) Length:6-9 months Role:Symantec Endpoint Architect Scope:  *    Symantec Endpoint architect, CCS is a plus, CSP is required. *     Must have Symantec DCP Experience  *    Architect will understand the full scope of Symantec product life cycle. *    Able to design and deploy product to worldwide client sites. *    Training of staff on operational procedures in order to maintain product. *    Troubleshoot and resolve issues *    Understand networks, OS, security and best practices *    Document product configurations and lead in all aspects of Symantec interactions *    Good communication skills with upper management on Symantec projects, status and availability. Rate:60-80/hr Thanks, John Pardue www.linkedin.com/pub/john-pardue/36/338/9b6/

Uncategorized

SPECIALIST, INFORMATION SECURITY SR – LEVEL SR CHATTANOOGA TN

Title SPECIALIST, INFORMATION SECURITY SR – LEVEL SR (5273172) Location: CHATTANOOGA CHA 1101 MARKET STREET CHATTANOOGA TN 37402-2801 Duration: 9-12 month(s) Hours: 8:00am to 5:00 pm Pay rate: $50.48 Job Description THIS PERSON WILL BE ACCOUNTABLE FOR HAVING DETAILED KNOWLEDGE IN A BROAD RANGE OF INFORMATION SECURITY DISCIPLINES AND TO EDUCATE AND DRIVE THE IMPLEMENTATION AND STANDARDIZATION OF THE TVA ENTERPRISE SECURITY PROGRAM. THIS WILL INVOLVE CONTRIBUTING TO THE DEVELOPMENT, MAINTENANCE, AND IMPLEMENTATION OF THE ENTERPRISE SECURITY PROGRAM, AND HELPING TO ENSURE THE OVERALL ACHIEVEMENT AND COMPLIANCE WITH THE SECURITY GOALS, REGULATORY REQUIREMENTS AND COMPANY DIRECTION. THIS PERSON WILL BRING INDUSTRY INSIGHT AND INFORMATION SECURITY UNDERSTANDING AND IMPLEMENTATION EXPERIENCES TO TVA AND ESTABLISH SECURITY APPROACHES AND DEPLOYMENT PLANS TO INITIATE AND DRIVE THE SECURITY FUNCTION INTO THE ORGANIZATION. THIS PERSON WILL BRING SIGNIFICANT INFORMATION SECURITY DOMAIN EXPERIENCE AS WELL AS EXCELLENT COMMUNICATION SKILLS AND ABILITY TO COORDINATE AND PARTNER WITH THE VARIOUS BUSINESS UNITS TO EDUCATE AND FACILITATE THE SECURITY GOALS. A BACHELOR’S DEGREE IN COMPUTER SCIENCE, ENGINEERING OR A RELATED FIELD OF STUDY; OR EQUIVALENT EDUCATION, TRAINING & EXPERIENCE. FIVE OR MORE YEARS OF EXPERT IT ENTERPRISE OPERATIONAL EXPERIENCE PROTECTING ELECTRONIC AND INFORMATION BASED ASSETS, WITH AT THE LAST FIVE YEARS OF THAT CURRENT AND HANDS-ON. AT LEAST 10 YEARS LEADING PROJECTS/TEAMS. AUDIT/INVESTIGATIONS EXPERIENCE IS HIGHLY DESIRED. OPERATING PLANT EXPERIENCE IS HIGHLY DESIRED. CISSP, CISM, CISA, CPP, OR EQUIVALENT. DEMONSTRATED MANAGERIAL COMPETENCIES IN LEADERSHIP, DELEGATION, ANALYSIS, TEAMWORK, COACHING/DEVELOPMENT, CUSTOMER SERVICE, PLANNING/ORGANIZING, FLEXIBILITY, STRESS TOLERANCE, COMMUNICATION. DEMONSTRATED STRATEGIC AND TACTICAL IT PLANNING. BROAD KNOWLEDGE OF BUSINESS FUNCTIONS AND RELATED EIT SECURITY NEEDS. MUST STAY FAMILIAR WITH FEDERAL LAWS, REGULATIONS, AND INDUSTRY BEST PRACTICES FOR EIT SECURITY STRATEGIES AND TECHNOLOGY. KNOWLEDGE OF IT OPERATIONAL INFRASTRUCTURE INCLUDING DISASTER RECOVERY/BACKUP, DATA MANAGEMENT, AND ABILITY TO DEVELOP/ENSURE SECURITY MEASURES/PROCESSES ARE IMPLEMENTED. EXCELLENT ABILITY TO RESEARCH, EVALUATE AND RECOMMEND TECHNICAL SOLUTIONS. ABILITY TO DEVELOP PLANS AND EXECUTE COMPLEX EFFORTS INVOLVING APPLICATION OF ADVANCED TECHNOLOGICAL KNOWLEDGE. MUST DEMONSTRATE TACT AND EFFECTIVE JUDGMENT DEALING WITH CONFIDENTIAL/SENSITIVE MATERIAL. ABILITY TO OBTAIN AND MAINTAIN SECRET SECURITY CLEARANCE REQUIRED. CANDIDATE MAY BE REQUIRED TO OBTAIN AND MAINTAIN A SECURITY CLEARANCE BASED ON POSITION / ACCESS REQUIREMENTS AND ESSENTIAL JOB FUNCTIONS.   908-765-0003/ Ext-275 Fax: 609-228-4044 Email: nitinsh@tscti.com

Uncategorized

Part time position for Project Manager in Denver Colorado

Kindly share detailed resume along with your expected rates at amans@22ndstaffing.com or call me at 703-945-1791 ext: 675 to discuss this opportunity in detail. Rate/Salary Expectation: Full Name: Contact No: Email address: Current Location: Relocation: Availability: Visa status: In-Person interview (Yes/No): End Date of current/last project: Position Title:                                                                    Project Manager Position Id:                                                       PO IHGA 2016-8974 Agency:                                                                                State of Colorado – OIT Duration:                                                          5 Months Work Location:                                                                  Denver , Colorado  80203 Description: PROJECT OVERVIEW This is a Part time Project management position of 20-30 hr per week Looking for Jr to Sr Project Managers. The LEAP sponsored by Colorado Department of Human Services  is seeking a part time project Manager for the Low-Income Energy Assistance Program (LEAP) is a federally funded program within the Colorado Department of Human Services, Office of Economic Security, which helps pay a portion of program participants winter home heating costs thereby alleviating some of the financial burden associated with the colder months. The program’s primary functions are to perform case, eligibility and benefit management. Pay out is done through home heating bill assistance payments made to utility companies for energy supplied to participating households or in a minority of cases, directly to the participating households. The program has a state-level office for program administration and each of Colorado’s 64 counties is responsible for processing their respective county’s LEAP applications.  One of the state office’s primary responsibilities is to administer and maintain the LEAP computer system. The system was deployed in the early 1980s and is one of the last applications running on the state’s legacy mainframe system. The LEAP program is being evaluated by exploring the options available for migrating to a platform that will meet the programs administration needs as well as leveraging the capabilities of a state-of-the-art software solution. The new platform will enable the LEAP program to be administered more efficiently and simplify the application and approval process. The new system will allow for intake of  client application data; determination of eligibility; distribution of benefits to an electronic transfer system; interface with energy vendors; noticing to clients; and reporting for State and County program staff. The role of the Project Manager is to plan, execute, and finalize projects according to defined timelines and within the allocated budget. The Project Manager is responsible for ensuring that business and end users are consulted with and their input garnered for the project at hand. Responsible for assisting agency executive management, division directors, and information technology (IT) staff and leading project tasks, resources, including State personnel and deliverables. Use appropriate project management tools, reports, templates, mentoring, training, and coaching to IT project teams. Work directly with agency staff, as well as vendors and, when necessary, other state agencies in fulfilling and carrying out the requirements of assigned IT projects. Utilize project management best practices, including risk management, quality management, change management, change control and communication. Manage by providing leadership, collaboration, supervision, training, guidance and support to all IT project team members on assigned projects. Lead the effort for ensuring agency compliance with the State’s project management policies and standards.

Uncategorized

Sr Cyber Security Engineer Fairfax

  Company Profile Every day CSRA makes a difference in how the government serves our country and our citizens. We are inspired by the important missions of our customers and we believe that by working together we can deliver exceptional solutions and services to enable the safety, security, health and well-being of our nation. CSRA was formed through the combination of the North American Public Sector business of CSC and SRA International. With over 90 years of experience supporting U.S. government agencies and programs, our DNA is grounded in important mission work. We deliver a broad range of innovative, next-generation IT solutions and professional services to help our customers modernize their legacy systems, protect their networks and assets, and improve the effectiveness and efficiency of mission-critical functions for our warfighters and our citizens. Our 19,000 employees understand that success is a matter of perseverance, courage, adaptability and experience. We remain focused on our customers at all times, demonstrate ethical leadership, commit to excellence in program execution, aspire to achieve great things for our customers, and are inspired to deliver exceptional results to help our customers succeed. Our outstanding teams collaborate with our customers, business partners and with each other to deliver the best technologies and solutions aligned to critical mission requirements. http://www.csra.com OverviewWe have an immediate opening for a Senior Cyber Security Engineer located in Fairfax, VA. The Senior Cyber Security Engineer will be accountable for the following: Supports the operations and maintenance of ArcSight ESM, ArcSight Logger, and ArcSight Connector appliances, and other security tools such as network IPS. Performs administration, management, configuration, and testing activities related to ArcSight. Maintains the application and appliances in accordance with DoD and Army security directives. Ability to develop ArcSight ESM content, such as rules, filters, channels, and notifications. Teach junior SOC analysts to create ArcSight ESM content and security tool maintenance. Define, design and develop system requirements.  Define system support requirements to include monitoring, capacity, staffing and patching/updating. Analyze and resolve program support deficiencies. Conducts independent technical investigations in systems design. The Senior Cyber Security Engineer responsibilities include: Install, configure, and maintain ArcSight ESM per Army build guides and instructions. Participate in weekly ArcSight SEIM meetings with other Army organizations. Manage and maintain the Red Hat Enterprise Linux operating system. Coordinate with the US Army to ensure lessons learned and content from other ArcSight instances are incorporated into the ArcSight system. Mentors junior Cyber Security Engineers, ensuring they have required knowledge and training and familiarity with specific Agency Security requirements and processes. Participates in network and systems design to ensure implementation of appropriate systems security policies. Qualifications Security Clearance:  Candidate must have an active DoD Secret Security Clearance.  Interim Secret clearance may be considered for qualified candidates. Years Of Experience: 6 – 9 years Education:  Bachelors’ degree required.  Candidates with additional work experience may be considered in lieu of degree.  Masters’ degree highly desirable. Certifications: Individual must obtain ITILv3 Foundations and Security+ certification within 45 days of start date. Must have CNDSP Infrastructure Support or CNDSP Incident responder certification: SSCP, CEH, GCIH, CSIH, or GCFA. This position requires an innovative self-starter. Candidate must be willing to ask for help when needed and push their comfort zone to learn new technologies and skills. The candidate must be able to take high-level direction, apply lessons learned and job knowledge to the task, and share that knowledge with other members of the team.   https://jobs.csra.com/job/fairfax/senior-cyber-security-engineer/3459/1125030  < -Job Description/Apply

Uncategorized

System Analyst in Austin TX with Department of Aging & Disability Services

System Analyst in Austin TX with Department of Aging & Disability Services The services to be provided include, but are not limited to the following: Any tasks related to the successful migration of SCCM from version 2007 to version 2012. Participate in all facets of automation system design, testing and implementation. Develop and review project documentation, including technical requirements, training materials, deliverable, project plans and schedules, testing scenarios. Coordinate with IT project technical leads, DADS program and other subject-matter experts, contractor representatives, and other State agency representatives as required to ensure necessary tasks, deliverable and timelines are completed. Participate in test planning to help ensure successful project implementation, including development of test scenarios and actual testing when needed. Perform meeting and/or presentation preparation tasks as needed (e.g., prepare or oversee preparation of and provide agendas and pre-meeting materials as well as follow-up notes, post meeting materials, assignment follow-up and related activities). Skilled in the administration of Microsoft’s System Center Configuration Manager version 2012 Skilled in the use of the complete MS Office product line. Other duties as assigned.   Kindly share detailed resume to amritas@22ndstaffing.com Please provide the following information Rate/ Salary: Full Legal Name: Address- (either Full address or at least City name and State name): Contact No: Alternate Contact No (if any): Best time to take call: Email ID/ Email IDs: Relocation at own Expenses- (Yes/No): Distance from client’s location- (In Miles, In case candidate is Local or adjoining): Interview- (In-Person/ Phone/ Both): Visa Status- (in case of H1b, please mention validity date of his visa): End Date of Current Project:   Job Description:    Position Title:   System Analyst 3  Position Id:     53901132016 Client:     Department of Aging & Disability Services, TX Duration:    +3 months                                                                                                            Work Location:        701 W. 51st Street, Austin, Texas 78751 Interview Type:  Phone/ IN Person-     Depends on the Hiring Manager         Minimum Requirements: Years Skills/Experience Candidate experience 8 Experience preparing System Requirements documents and requirement traceability matrixes 5 Full-time experience performing requirements analysis, documentation and testing in a production environment, maintaining customer critical applications in a high-visibility environment. 5 Reviews, analyzes, and evaluates business systems and user needs to develop requirements, requirements traceability matrix, test scenarios, test plans, etc. 5 Strong writing, analytical, interpersonal, organizational, and communications skills are necessary. 5 Extensive work experience and understanding of software development lifecycle methodologies, thorough knowledge of the software specification process and software development processes, and software testing processes. 1 Microsoft SCCM version 2012. Strong Must have excellent communication skills both orally and in writing. Strong Microsoft suite of products, i.e. Outlook, Word, Excel, and Visio   Preferences: Years Skills/Experience Candidate experience 3 Experience working in a State/Federal government environment. Microsoft SCCM certification (test # 243) 3 experience administering Active Directory 1 Experience with DADS programs a plus. Microsoft Certifications: MCP, MCTS, MCITP, and/or MCSA   Description: The Department of Information Resources (DIR) requires the services of one System Analyst, hereafter referred to as Worker(s), who meets the general qualifications of a System Analyst 3 Category, Core Technology Type Worker will perform tasks under general supervision with considerable latitude for the use of initiative and independent judgment.  All communication with internal and external staff will be handled in a professional manner    

Uncategorized

Security Analyst in Columbia, SC with State of SC

  22nd Century Technologies is an equal opportunity employer and considers qualified applicants for employment without regard to race, gender, age, color, religion, disability, veterans status, sexual orientation, or any other protected factor. Kindly send me your updated resume along with expected rates at rosalynm@tscti.com also fill the skill matrix below. Salary/Rate Expectation: Full Name: Contact No: Alternate contact (if any): Email address: Current Location: Relocation: Availability: Visa status: JOB TITLE                           : Security Analyst LOCATION                           : 300A Outlet Pointe Blvd., Columbia, SC 29210 POSITION TYPE                  : Contract Duration                               : 6 Months Job Requirement : Develops and manages security for more than one IT functional area (e.g., data, systems, network and/or Web) across the enterprise. Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines). Prepares status reports on security matters to develop security risk analysis scenarios and response procedures. Responsible for the tracking and monitoring of software viruses. Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls. Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness. Provides direct support to the business and IT staff for security related issues. Educates IT and the business about security policies and consults on security issues regarding user built/managed systems. Represents the security needs of the organization by providing expertise and assistance in all IT projects with regard to security issues. Must have extensive knowledge in networking, databases, systems and/or Web operations. More junior level position primarily focuses on security administration; a more senior level position is involved in developing enterprise security strategies, management of security projects and the most complicated security issues.

Uncategorized

Cyber Threat Analyst in NEWARK, Delaware

JOB Description:- Title:                                                  Cyber Threat Analyst I (58054-1) Location:                                           NEWARK, Delaware 19711 Duration:                                           6 Month Visa-                                                   US citizen and GC only. Comments : ****SHIFT WORK – ONLY THOSE CANDIDATES  REPLY WHO ARE INTERESTED IN 12-hour Shift work on the AM shift from 1AM-1PM on a 2-3-2 (Every other weekend off) schedule ***** Job Description:   TAC Information Security Analyst (Must be a US Citizen) The Tier I Information Security Analyst is responsible for executing day-to-day tasks in the Security Operations Center 24×7. These tasks include: answering the NASS security support hotline, monitoring the NASS security support mailbox, creating tickets for client requests, monitoring and responding to Instant Messaging applications, and executing a variety of scripted actions on timed intervals. This position will also act as Tier I support for several endpoint services. Basic Requirements: Eyes on glass monitoring and resolution of security incidents within established customer Service Level Agreements. Perform daily operational ‘eyes on glass’ real-time monitoring and analysis of security events from multiple sources including but not limited to events from Security Information Monitoring tools, network and host based intrusion detection systems, firewall logs, system logs (Unix & Windows), mainframes, midrange, applications and databases. Monitors and analyzes attempted efforts to compromise security protocols. Identifies and investigates activities and conducts and provides analyses regarding results. Escalates issues to higher level associates. Reviews computer logs and messages to identify and report possible violations of security. Coordinates, documents, and reports on internal investigations of security violations. Interacts with customers to understand their security needs; assists in the development and implementation of procedures to accommodate them. Writes security status reports to provide system status, report potential and actual security violations and provide procedural recommendations. Basic Qualifications:  Bachelor’s degree or equivalent combination of education and experience in Information Security is required. Zero or more years of experience in information systems security. Experience working with operating systems. Experience working with domain structures and digital signatures. Experience working with computer desktop packages such as Microsoft Word, Excel, etc. Communication skills to interact with team members, management, and support personnel. Analytical and problem solving skills for design, creation and testing of security systems. Ability to work independently and as part of a team.

Uncategorized

Security Analyst Opportunity in the DTC

Looking for someone to conduct risk management assessments, design, testing and implementation of security tools and controls, and participate as a subject matter expert on projects.  This Security Analyst is responsible for the maintenance of (and monitoring compliance) information security governance policies and procedures; ensuring timely responses to client RFP’s and questionnaires; research and investigation of security alerts; providing security awareness training to staff; and assisting with response, research and investigation of security incidents.  This is a very hands on role.  Candidates need to understand vulnerabilities. how they impact the organization. how to get those escalated, and resolved. BridgeView IT is seeking an IT Security Analyst located in Denver, CO. (DTC).  One of our top clients is growing their Security team. In this role, the Security Analyst will conduct risk management assessments, design, testing and implementation of security tools and controls, and participate as a subject matter expert on projects.  This Security Analyst is responsible for the maintenance of, and monitoring compliance with, information security governance policies and procedures; ensuring timely responses to client/customer RFP’s and questionnaires; research and investigation of security alerts; providing security awareness training and materials to staff; and assisting with response, research and investigation of security incidents. REQUIRED SKILLS 3+ years previous information technology audit experience, and/or 4 years information security analyst experience required. (Preferably in highly complex technical environment, within the Financial Services area.) Previous experience should include: security incident response, performing extensive security planning, and conducting information security audits. 3+ years project management experience including the ability to organize, plan, prioritize and complete assignments with minimal supervision Prior experience should include having applied relevant technical knowledge in at least one of the following areas: Internal or Operational IT audits Information security technologies, tools, and best practices Working with external vendors for penetration testing, audits, or other regulatory related requests Participating in defining overall governance strategies and plans Demonstrated ability to clearly communicate information security technical issues & concepts using language and examples, to a wide audience of both technical and non-technical personnel (to include executives, auditors, end users, and engineers.) Demonstrated working knowledge of information systems security standards and practices (e.g., access control and system hardening, system audit and log file monitoring, security policies, and incident handling) is required. Demonstrated ability to interpret information security data and processes, to identify risk and potential compliance issues is required. Bachelor’s Degree (Computer Science or Information Systems) and/or equivalent applicable experience. JOB OVERVIEW Plans, implements and maintains security administration for people, process and technology in assigned functional areas (e.g., policies, vendor management, awareness and training, RFI/RFP). Assesses the impact on the business caused by theft, destruction, alteration, or denial of access to information. Conduct evaluations to verify that appropriate security controls are in place on all devices and processes within the corporate network and application development functions. Provide the necessary support to monitor and ensure compliance with information security policies and procedures including assistance with technical reviews and identification of security risks. Develop information security end-user communication and training materials, including general population, as well as targeted audiences such as developers, system administrators, DBAs, supervisors and officers. Work directly with internal teams and external customers to provide guidance and documentation for security related purposes. Partner with IT and businesses to enhance enterprise awareness of IT security requirements/controls and embed these controls into the system development life cycle. Identify, monitor, and report on IT issues (control gaps, issues, findings, vulnerabilities) identified during audits/assessments and associated remediation activities. Perform vendor security risk assessments. Translate and communicate the results to vendor management and business partners. Perform other tasks related to developing, monitoring, and assessing the effectiveness of IT security controls as assigned. Assist in the execution of special assignments and projects as directed. Coordinates and manages proposals/project responses as an Information Security/Risk Subject Matter Expert on an assigned basis and works with various teams and subject matter experts to ensure the appropriate strategy is used, and responses provided, to accurately meet the objectives of the RFP.

Uncategorized

NCDOT – Info Security Specialist- 3C North Carolina

22ndstaffing.com Work Location:                                                                   4101 Capital Blvd, Raleigh NC 27604 Interview Type:                                                                  Either Phone or In Person Short Description: Contract resource with senior Information Security Analyst skillset, with focus on Identity and Access Management (I&AM), risk analysis, and information security policy, standards and procedure development. Complete Description: The Department of Transportation is seeking a short-term contractor to implement and maintain information security best practices within the NCDOT environment related to Identity and Access Management (I&AM) as well as other information security risk assessments, analysis and consultation for various IT systems.  Identity and Access Management (I&AM) is responsible for designing, developing and supporting a suite of agency wide shared services that primarily focus on identity, authentication, authorization, request management, provisioning, and certification.  The staff is part of the IT Information Security Office (ISO), with end-to-end responsibility for the agency-wide information security policy and standards.  The candidate should be an information security analyst with extensive information security operational experience, that also understands enterprise architecture, policy, standards and procedure and can consult with support, implementation and architecture teams. Responsibilities will include: Working with project & team managers and stakeholders to produce high quality and detailed identity and access management business requirements as they related to information security Develop and enforce policies for identity and access management (I&AM) team for claims based authentication Define the information security policy, standards and process/procedures as required for utilizing an identity management system including:  role mining, attestation, account provisioning, cloud/federated access provisioning, and others. Develop  security policies and procedures for Roles Based Access Controls in claims based architecture Develop security policies and procedures for claims based architecture for Active Directory and Sharepoint Actively participate in assessment, planning, architecture, and design activities Design, document, and implement security controls for Identity and Access Management BizTalk, UDDI, web services, and claims based authentication experience Design, document, and put security governance in place for external claims based authentication The position will be responsible for documentation of security standards, security patterns, processes and procedures related to securing of web services and interoperability of all systems for the 3C and Data Services project.  The individual will educate application development teams on those standards and processes from an information security perspective. Questions: Questions Questions Answers Question 1 Absences greater than two weeks MUST be approved by CAI management in advance, and contact information must be provided to CAI so that the resource can be reached during his or her absence. The Client has the right to dismiss the resource if he or she does not return to work by the agreed upon date. Do you accept this requirement? Question 2 All work must be completed on site. Do you accept this requirement? Question 3 Please list candidate’s email address HERE that will be used when submitting E-RTR. Question 4 Please indicate how soon this candidate is available to start work. Vendors are encouraged to submit candidates that are available for the duration of the assignment. Question 5 Vendor must disclose to the agency if the candidate will be subcontracted at the time of submission. Do you accept this requirement? Question 6 Vendor must notify the agency if any portion of the requirements listed in this task order are to be outsourced to other countries. Do you accept this requirement? Question 7 This role is not new to the Department. There has been someone working in the role in the past. However, this is a new requirement for those services and it is open for competition.

Uncategorized

Security Administrator in TORRANCE, CA

Security Administrator in TORRANCE, CA 22nd Century is an equal opportunity employer and considers qualified applicants for employment without regard to race, gender, age, color, religion, disability, veterans status, sexual orientation, or any other protected factor. Kindly send me your updated resume along with expected rates and below details at damandeeps@tscti.com Rate/ Salary: Full Name: Contact No: Alternate contact (if any): Email address: Current Address: Availability: Best time to take call: Relocation at own Expenses- (Yes/No): Distance from client’s location- (In Miles, In case candidate is Local or adjoining): Interview- (In-Person/ Phone/ Both): End Date of Current Project: Availability: Interviews/ Offers in pipeline: Visa Status- (in case of H1b, please mention validity date of his visa): Title:                                                   Security Administrator (58468-1) Position:                                            1 Location:                                          TORRANCE, CA 90501 Duration:                                           6 Month Visa-                                                   US citizen and GC only. Comments:    long term role please present candidates that will be willing to convert to FTE. Job Description:   Security Administrator Responsibilities Systems administration support for IBM Security Identity Environment (ISIM / ISDI / ISDS). Installing, updating and configuring ISIM application adaptors. Development of policies, internal security, workflow and forms within ISIM. Supporting project teams for integrations into the Honda security environment. Investigate operational problems and develop counter measure for remediation. Perform upgrades and apply patches to IBM Security software. Monitor the environment for effective operations.MUSTS IBM Security Identity Manager administration, design and support. IBM Security Directory Integrator – Including the ability write complicated assembly lines from scratch and maintain an existing code base. Experience with IBM Security Directory Server – including the ability to install from scratch, setup replication, manage issues and develop complex queries and reports. Strong understanding of Identity Managements architecture concepts and best practices. Strong technical skills with UNIX. – This means you need to be comfortable with UNIX and can easily ssh into servers, use vi and other common UNIX tools. Strong Javascript development skills – This means you should have no problem writing custom operations in ISIM and maintaining an existing javascript code base in ISIM Must have broad range of understanding with different technical platforms (servers, networks, storage, etc.) Must be able to work individually as well as in a team. Self-starter, must be able to see projects and tasks from start to completion. Must have strong written and verbal communications skills. You will be required to work with project teams and end users in person, on the phone and in writing. WANTS Experience with IBM Security Access Manager administration, design and support. Experience with web application design and a strong understanding of the HTTP protocol and reverse proxy systems. Experience with J2EE, C# or other language development Basic SQL and reporting skills – You should be able to write simple SQL queries and work with reporting software to generate and manage reports.

Scroll to Top