Author name: Bruce

I have been doing IT and Cybersecurity specifically GRC for 20 years. I want to help people get into this field.

Uncategorized

ETHICAL HACKER/ PEN TESTER – Keller/TX

  ob Title ETHICAL HACKER/ PEN TESTER Project Location Keller TX Duration 24 months /Contract   Skills Required and Job Description: MOI-Telephonic followed by Skype Job Description The Senior Ethical Hacker / Penetration Tester will be working individually and in teams.  This individual will be performing penetration testing or vulnerability assessment of web application, network, wireless, code review and firewall on multi-protocol enterprise systems.  This resource must have technical acumen.  This resource will be a key figure in monthly software releases for the client, semiannual complete regression testing of the entire platform, as well as other testing needs that may be arise. Duties and Responsibilities Independence: self-managed and motivated.  High energy, results driven person with strong interpersonal skills Team oriented Project Management: Takes responsibility for satisfaction of assigned project Effective at speaking and collaborating with others Effective at Technical writing and conducting vulnerability research Effective at scoping a client’s testing effort Good communicator to a technical audience. Good understanding QA Methodology Excellent communication skills and the ability to interface with more senior co-workers and leadership with confidence and clarity Education and Training Bachelor’s Degree in Information Technology/Computer Science or 5 years IT experience Any of the following certifications: CISSP, GIAC, CEH certifications Required Skills Strong web application penetration testing experience Experience in vulnerability identification and remediation Knowledge of the software development lifecycle in a large enterprise environment Programming background (C++, Perl, Python, Shell ) for tool and exploit development Operating Systems: Windows, Linux, HP-UX, Solaris, AIX, etc. Web Servers: IIS, Apache, Lotus Domino, Sun Java System, TC Server Middleware software: Oracle’s WebLogic, IBM’s WebSphere, Apache Tomcat In-depth knowledge of any proxying tools such as Paros, Burp, WebScarab, Achilles “fault injection” Experience with any of the following commercial application scanning tools: IBM’s AppScan, HP’s WebInspect, HP’s Fortify, NTOSpider, Cenzic’s Hailstorm Commercial database software like Application Security Inc.’s AppDetective Experience with any open source tools such as Whisker or Nikto WebServices technologies such as XML, SOAP, AJAX Networking tools such as Nessus, nmap, Retina netcat Understanding of various web application architectures Understanding of server and client side application development Physical and logical security audits Logical protocol and network traffic audits Client/Server exposure (i.e. Java, JSP, Servlet, Linux, UNIX, SQL). Mainframe exposure (i.e. COBOL, JCL, IDMS/ADSO, CICS). Database exposure (i.e. SQL Server, DB2). Automation Testing Tool / frameworks exposure Desired Skills Experience with performing code review, wireless and firewall assessments Solid network penetration testing experience Technical knowledge in network security products, cryptographic suites and network/application firewalls Experience with mobile application and operating system testing Experience in evasion techniques to bypass firewalls and intrusion detection ,     Regards, Nikunj | RG Talent Inc. (D) 510-443-0757 Ext-142,  nikunj@rgtalent.com; \ nikunj.rgtalent@gmail.com

Uncategorized

How to Find a Job

I know some people that have a really hard time finding jobs. I have not had this issue. I have been able to find a job in good and bad times. If I can do it anyone can do it. I am a high school drop out who is now doing better than the average American. And I wanted to explain how I have done it. Here are some resources you can use: studentaid.ed.gov fafsa.ed.gov linkedin.com airforce.com careerjet.com indeed.com careerbuilder.com groups: facebook groups yahoo groups linkedin groups https://youtu.be/XzAiW4mldpo  

Uncategorized

Network Engineer in Salem, Oregon

To know more about our service offerings and additional information we strongly encourage you to visit our website www.tscti.com.   Please send your updated resume with rates expected for this position Position Title Network Engineer Position Id DASPS-1418-16 Agency DAS ETS Duration 6 months  (02/15/2016- 07/15/2016) Work Location 550 Airport Rd SE, Salem , Oregon  97301 Due Date for Questions January 18, 2016, 11:59 PM Eastern Description:- Assists in the development and maintenance of network communications. Uses knowledge of LAN/WAN systems to help design and install internal and external networks. Tests and evaluates network systems to eliminate problems and make improvements. Requires a bachelor’s degree in area of specialty and at least 2 years or equivalent experience in the field or in a related area. Familiar with standard concepts, practices, and procedures within a particular field. Relies on experience and judgment to plan and accomplish goals. Performs a variety of tasks. A certain degree of creativity and latitude is required. SKILLS AND ATTRIBUTES The successful Contractor’s Key Person(s) and any other staff delivering services under the Work Order Contract must demonstrate the following attributes and skills throughout the course of performance: Communication: Strong communication skills, both verbal and written, are required. Contractor shall effectively communicate with agency stakeholders that have a variety of different skill sets and personalities, including technical, business, and management staff. Risk management: Contractor shall be proactive in gathering information, identifying issues and recommending solutions so that the Project continues to move forward quickly. Technical knowledge: Contractor must have sufficient technical knowledge to understand and help resolve technical issues. Organization: Contractor shall organize and manage tasks for the Project. Qualifications Type Qualification Description Competency Experience Required Skills Build a router In-depth knowledge/experience Advanced 3-4 yrs Yes Skills Build switch configuration In-depth knowledge/experience Advanced 3-4 yrs Yes Skills Cisco ME38XX adn Cisco 6807 switches plus Knowledge/experience Advanced 3-4 yrs Yes Skills Cisco Routers In-depth knowledge/experience Advanced 3-4 yrs Yes Skills Cisco routing protocols Knowledge/experience Proficient 1-2 yrs Yes Skills Cisco switeches In-depth knowledge/experience Advanced 3-4 yrs Yes Skills Cisco VLANs Knowledge/experience Proficient 1-2 yrs Yes Skills Cisco vrfs Knowledge/experience Proficient 1-2 yrs Yes Skills Cisco wireless network access oints using CIsco Prime ability Novice 1-2 yrs Yes Skills Configure & Connect Cisco 19XX and 29xx Routers In-depth knowledge/experience Advanced 3-4 yrs Yes Skills Configure & Connect Cisco 3750 and 2960x In-depth knowledge/experience Advanced 3-4 yrs Yes Skills Troubleshoot configuration issues remotely ability Novice 1-2 yrs Yes Skills Troubleshoot connectivity remotely Ability Novice 1-2 yrs Yes

Uncategorized

Security Analyst Location 300A Outlet Pointe Blvd., Columbia, SC 29210

Security Analyst Location 300A Outlet Pointe Blvd., Columbia, SC 29210 We are looking for Security Analyst Location 300A Outlet Pointe Blvd., Columbia, SC 29210 (WITH DIRECT CLIENT)                                                         Additional Job Details: JOB TITLE                           : Security Analyst LOCATION                           : 300A Outlet Pointe Blvd., Columbia, SC 29210 POSITION TYPE                  : Contract Duration                               : 6 Months IN PERSON INTERVIEW Job Requirement : Develops and manages security for more than one IT functional area (e.g., data, systems, network and/or Web) across the enterprise. Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines). Prepares status reports on security matters to develop security risk analysis scenarios and response procedures. Responsible for the tracking and monitoring of software viruses. Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls. Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness. Provides direct support to the business and IT staff for security related issues. Educates IT and the business about security policies and consults on security issues regarding user built/managed systems. Represents the security needs of the organization by providing expertise and assistance in all IT projects with regard to security issues. Must have extensive knowledge in networking, databases, systems and/or Web operations. More junior level position primarily focuses on security administration; a more senior level position is involved in developing enterprise security strategies, management of security projects and the most complicated security issues. If interested then please respond with the below mentioned details along with your updated resume at harshs@22ndstaffing.com so that we can discuss this further. Full Name Contact Number: Current Location: Skype ID: Work Authorization: Expected Rates: Total Experience: Total US Experience: Availability for Joining:  

Uncategorized

SCCM/SME in Dahlgren VA

ABOUT US: 22nd Century Technologies, Inc. is a SBA certified 8 (a) Small Disadvantage Business with over 16 years of experience in providing IT services and solutions to Federal, State & Local government agencies. Headquartered in Somerset, NJ, 22nd Century Technologies has its Federal Practice Headquarters in Mclean, VA and presence in over 35 states across the nation. We presently have 500 plus employees, and we hire our people through the best recruiting practices followed in the industry, and ensure that all our employees have a long term career growth with us. 90% of our Revenue comes from Prime Contracts, 70% DoD and 30% Civilian Agencies. Our customers consist of and are not limited to: DoD – Air Force (7 AFBs), DLA, US Navy, US Army, DHA, 5 DoD Hospitals in Navy, Army and Air Force, Marine Corps, DLI, FBI, DHS, USDA, IRS, SEC DOT, NIH, HHS, DOI, FMC, FBI, HOR, EPA, USMS, USPS, GPO, and the Peace Corps. Company.  To know more about our service offerings and additional information we strongly encourage you to visit our website www.tscti.com. Position: SCCM/ SME Location- Dahlgren VA Client: JWAC Deployment Support SME – Prepping and developed applications for deployment, experience with configuring, executing, monitoring and troubleshooting deployments in MS SCCM

Uncategorized

DISA Draft Mainframe Product Security Requirement Guide

DISA has developed the Draft Mainframe Product Security Requirement Guide (SRG) Version 1. The Draft SRG is available at: http://iase.disa.mil/stigs/srgs/Pages/index.aspx Please provide comments, recommended changes, and/or additions to the draft SRG by 4 February 2016 on the Comment Matrix spreadsheet, and send comments via NIPRNet email to: disa.stig_spt@mail.mil.  Include the title and version of the SRG in the subject line of your email.

Uncategorized

Information Security Framework aka System Compliance

What are Cyber Security Standards? These are rules that put in place to protect every aspect of an information system. Also know as information system security standards, information security framework, security system compliance, information system compliance, risk management framework. There are also many types that specialize on different functions of a given industry. For example the medical industry has a standard for protecting patient information called HIPAA which is an acronym for the Health Insurance Portability and Accountability Act that was passed by Congress in 1996. And there is a standard for protecting point of sale and merchant systems called PCI. There are many others.. but the mission is the same… to protect the confidentiality, availability and integrity of important data.

Uncategorized

Network Engineer Strivector, Austin, TX

Job Description ABOUT STRIVECTOR Strivector is a recruitment and staffing agency. We work with some of the leading, fastest growing companies in the United States. Our clients are growing so fast that they can’t hire good people fast enough to keep up with their growth. So we help them. We reach out to awesome talented individuals like you and connect them to their dream companies and dream jobs. If you’re the best, and you are looking for something better, let’s talk. 😀 THE EMPLOYER Take your career up a few notches with this award winning, rapidly growing startup that provides a next generation hyperlocal intelligence platform. This young company is already a runaway success in their domain. They are the platform of choice for 13 of the 15 most advertised US brands. THE JOB Our client is looking for a Network Engineer who will be responsible for deploying, managing, and ensuring stability of the local/wide area network infrastructure technologies to provide high availability, fault tolerance, and scalability to effectively and efficiently support mission critical business systems. In this role of a Network Engineer, your roles and responsibilities will include: Monitor/ maintain performance & capacity for our 7 global data centers and 9 corporate offices to ensure maximum efficiency and operational uptime Work with vendors and cross-functional teams for on-going design efforts and systems support Troubleshoot and resolve service level and/or critical and system related issues Document projects including scope, costs, schedule, testing and terms of delivery to ensure project is completed with the highest level of quality, on time and within budget Will participate in an on-call/standby rotation and is expected to respond after hours for service restoration, troubleshooting and/or repair of all necessary equipment Test and validate all new hardware, software and connections for proper configuration and performance Perform scheduled maintenance on all networking equipment such as software and equipment upgrades and assist with such maintenance DESIRED SKILLS AND EXPERIENCE The ideal Network Engineer must demonstrate a high level of competence in LAN/WAN technologies, routing and switching platforms, troubleshooting critical issues, and coordination of implementation and be able to performs moves, adds and changes of equipment and systems specifically following the company change management policies. The Network Engineer would be someone with deep experience in many (if not all) of the following: A minimum of 5 years of data network operations and support experience Experience with Cisco Nexus switches (5548/5596, 3016 & 3064) and ASAs (5515 through 5585) Hands on experience with BigIPs (5050s through Viprion) Familiar with Broadcom MLXE routers and Sonicwall (NSA 4500 to 6600) Experience in lab-testing, certification of configurations, and validation testing Experience managing complex technical projects Telecom experience (6M to 10G Internet circuits) Strong Unix/Linux skills and the ability to script in Perl or other code base preferred International deployments and working with international team members Cisco Access Points and controllers Cisco WAS or Riverbed WAN accelerators a plus Industry recognized network certifications is preferred but not required (CCNP, CCIE, CISSP and/or CISA/CISM) We understand that even if you are a seasoned Network Engineer you may not have all the skills listed here. If you are a good at what you do and have a willingness to learn, let’s talk. ADDITIONAL INFORMATION Compensation: Based on Experience. One of the best in the industry Minimum Education: Bachelor’s, Master’s or Doctorate in Computer Science or Engineering Minimum Experience: 5+ Years of Network Engineer Experience Type of position: Full time Permanent Position with benefits Telecommute: No Location: Austin, TX

Uncategorized

DISA Draft Microsoft SQL Server 2014 STIG

DISA has developed the Draft Microsoft SQL Server 2014 Security Technical Implementation Guides (STIGs) Version 1 The Draft STIGs are available at: http://iase.disa.mil/stigs/app-security/database/Pages/sql.aspx for review and comment. Please provide comments, recommended changes, and/or additions to the draft STIGs by 1 February 2016 on the Comment Matrix spreadsheet, and send comments via NIPRNet email to:  disa.stig_spt@mail.mil.  Include the title and version of the STIGs in the subject line of your email.

Uncategorized

DISA Draft JIE Enterprise Remote Access STIG, Version 1

DISA has developed the Draft JIE Enterprise Remote Access STIG, Version 1 The Draft STIG is available at http://iase.disa.mil/stigs/net_perimeter/jie_network/Pages/jie_network.aspx for review and comment. Please provide comments, recommended changes, and/or additions to the draft STIG by 28 January 2016 on the Comment Matrix spreadsheet, and send comments via NIPRNet email to:  disa.stig_spt@mail.mil.  Include the title and version of the STIG in the subject line of your email.

Scroll to Top