Monday, December 2, 2013

US CONSULTING - CONTRACT Urgent Need - Network Security Architect.

Hi,
Hope you are doing great.
I am part of Talent Acquisition team which handles openings across US. Pull Skill technologies is one of the US's fastest growing talent acquisition company.
I have an opportunity that may be of interest to you with a global IT consulting company. Kindly let me know if you are interested in this position.

Apply to or call : 201-266-0564 or 

Email Id: shyam@pullskill.com



Title: Network Security Architect
Location: Miami FL, 4+ months, potential full time hire


Green Card, Citizen and EAD (Green Card) Preferred.


MUST have hands on expertise, UNIX, LAN/WAN, CISSP – Cisco security products

 

Senior Network Security Architect

 

Job Description

 

The Senior Information Security Architect reports directly to the Chief Information Security Officer (CISO).

 

The primary responsibility of a Senior Network Security Architect is to provide the technical expertise to support the day-to-day information security operations. This includes leading problem analysis, solutions development and implementation, and decision making that significantly impacts projects. The rest of his or her time will be spent performing project management activities for multiple information security projects; gap analysis, vendor product evaluations, current systems maintenance, and new system implementations utilizing traditional, agile, and scrum based methodology/approach in a fast-paced environment with a challenging set of requirements. A Senior Network Security Architect will be expected to demonstrate innovative approaches to solving the unique challenges encountered. The ideal candidate should have extensive hands-on experience in the following areas: Network protocols, security administration, intrusion detection systems, vulnerability assessment and penetration testing tools, database applications, configuration management and network/security analysis tools.

 

Job Requirements

 

Additionally the candidate will:
• Lead other technical specialist team member(s) in selected project and daily activities. 
• Act as a subject matter expert while providing coaching and mentoring to more junior technical specialists (in subsidiaries). 
• Resolve escalated complex trouble tickets within the established timeframes while providing quality customer service. 

Primary Duties:

·         Assist the CISO in designing complex application security architecture. Coordinate technical design/review activities with application development, enterprise architecture, information security, systems, network, and database groups to develop secure frameworks and enterprise applications.

·         Assist the CISO in designing the enterprise security infrastructure and architectural topology, including recommending hardware, operating system, software, and information security requirements to ensure the confidentiality, integrity, availability, and privacy of information systems. Ensure consistency and sufficient integration with existing infrastructure.

·         Develop systems and procedures to safeguard internal information systems and databases from unauthorized users. Recommends and implements revisions as appropriate.

·         Research, recommend and implement changes to procedures and systems to enhance systems security.

·         Educate customers to increase awareness of information security policies and best practices.

·         Oversee relationships with outside consultants/agencies as appropriate for independent security audits. Collaborates with business management to communicate security risk and countermeasures.

·         Manage the day-to-day functions of the Security Operation Center (SOC)

·         Analyze information security events and escalate according to policies and procedures

·         Manage various components of the information security infrastructure 

·         Execute security initiatives including risk assessments, data classification, attack and penetration analysis, intrusion detection and response, policy compliance and communication, and awareness programs

·         Identify process risks, weaknesses and controls, and develop recommendations and plans to address vulnerabilities

·         Perform penetration testing, vulnerability scanning and health checking on devices and systems within the infrastructure. Must be familiar with security tools and practices in terms of penetration testing, vulnerability scanning and health checking.

·         Evaluate new products, service offerings, and new internal applications to ensure that information assets are handled in accordance with laws, regulations and organization's information security policies

·         Provide on call security support and participate in the activities of the Computer Emergency Response Team (CERT)

·         Identify and develop requirements for an effective monitoring and intrusion response capability

·         Verify that security components are functioning optimally

·         Research new security tools and applications and assess their applicability to the team's operational capability.

·         Perform advanced security information and event monitoring; compile and validate statistical data from logging tools in a timely manner; fuse threat and vulnerability information with data collected across the enterprise

·         Support the daily coordination and remediation of incidents with senior management, peer security analysts, and various stakeholders

·         Prepare and deliver incident and root cause analysis reports and summaries with a high level of technical accuracy; explain technical concepts to non-technical audience

Qualifications:

ü  Five years + of experience as a network security architect

ü  Working knowledge of UNIX (Sun, Linux) operating systems

ü  Good knowledge of networking and routing protocols; experience as a network engineer is preferred

ü  Experience with one or more Security Information Management (SIM) products (SIM is also referred to as SEM – Security Event Management) such as Netforensics

ü  Experience with scanning and penetration testing tools such as ISS, Nmap, Nessuss, etc.

ü  Experience with deployment and management of Intrusion Detection and Intrusion Prevention Systems (IDS & IPS) 

ü  Experience working with one of the leading firewall vendors such as Checkpoint, Netscreen and/or Cisco PIX

ü  Experience with Web Application Firewalls (WAFs), preferably with Imperva 

ü  Experience with information security investigations; prefer experience with some type of forensics tool such as Encase (not a must have, but it would be a huge plus)

ü  Hands on experience with network analysis tools such as Wireshark and TCPdump.

ü  Detailed understanding of how network-based attacks work at the operating system and/or protocol level.

ü  Experience in Penetration Testing and hacking techniques

ü  Well versed in multiple areas of information technology such as: TCP/IP (UDP, TCP, and ICMP); DHCP; Operation of Routers, hubs, and switches; Windows, Linux operating systems (RedHat); Malware, Ad-Ware, and Spyware; and Viruses / Trojans / IRC Bots.

ü  Good understanding and knowledge of security concepts, protocols, processes, architectures, and tools (authentication and access control technologies, intrusion detection, network traffic analysis, SIM technology, incident handling, media/malware analysis, etc.).

ü  Experience with Blue Coat or any other proxies

ü  Experience with Splunk a plus

ü  Experience working with Tripwire or any File Integrity Monitoring technology a plus

ü  Excellent communication and customer relations, negotiations and facilitation skills

Education Requirements

BS in Computer Science or related field

 

 Certifications

Certified Information Systems Security Professional (CISSP)

CCNA, CCNP is strongly desired

CISM, CISA (Certified Information Security Auditor) desirable

Certification in Checkpoint, Netscreen, and/or Cisco PIX desirable


Thanks & Regards

cid:image003.jpg@01CE257F.061DBE90

Shyam Kiran IT Recruiter

Direct: 201-266-0564| Fax: 201-641-0110
|shyam@pullskill.com |
E-Verified | Certified Minority Women Owned Business Enterprise (MWBE)

--
--
You received this message because you are subscribed to the Google
Groups "US consulting Contract Opportunities" group.
To post to this group, send email to us-consulting-temp@googlegroups.com
To unsubscribe from this group, send email to
us-consulting-temp+unsubscribe@googlegroups.com
For more options, visit this group at
http://groups.google.co.in/group/us-consulting-temp?hl=en-GB
---
You received this message because you are subscribed to the Google Groups "US consulting Contract Opportunities" group.
To unsubscribe from this group and stop receiving emails from it, send an email to us-consulting-temp+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.

No comments:

Post a Comment