Position : 1.
Title | Security Engineer |
Track | Information Security |
Role | Tools Implementation |
Specifics | Incident tracking system, monitoring tools design, implementation |
Type of Project | Design and Implementation |
Work Location | Lincoln, RI preferred, would consider remote |
Assignment Duration | 12 Months |
Job Description | 1. Design and implementation of an incident tracking system, capable of meeting information security requirements for confidentiality of data. 2. Implementation of a suite of tools capable of providing the security team with visibility into a variety of IT infrastructure services and devices. This includes netflow, SNMP monitoring, device configuration management, vulnerability scanning and remediation tracking, 3. Strong documentation skills. Must be able to clearly document the proposed high level and detailed level designs for all proposed solutions, implementation plans, related change tickets (presenting to a Change Advisory Board), needed maintenance, and operational activities related to the use of the implemented tools. |
Total Experience | At least 10 years |
Specific Experience |
|
Position: 2.
Track | Information Security |
Role | Security Engineer |
Specifics | Incident Response, Audit, Security Solution Design |
Type of Project | Design and Implementation |
Work Location | Lincoln, RI preferred, would consider remote |
Assignment Duration | 12 Months |
Job Description | 1. Participate in a variety of information security functions – Incident Response, Audit, Solution Design |
Total Experience | At least 10 years |
Specific Experience | 1. Strong understanding of networking, TCP/IP, packet analysis 2. Hands on experience utilizing snort, nmap tcpdump, wireshark, nessus 3. Experience with designing and deploying Antivirus, DLP and SIEM solutions 4. Experience with patch management, device hardening, configuration auditing and other end point security best practices. 5. Understanding of firewall technologies, IDS/IDP, proxies 6. Understanding of Public Key Infrastructure 7. Experienced in the use of virtualization technologies 8. Exposure to network security and design best practices. 9. Willingness to proactively provide input for improvements 10. Ability to communicate security guidance to a non-technical audience. Security certifications such as CISSP, CEH, GIAC Certs (GPEN, GWAPT, GSEC), Security+ |
Lorven Technologies, Inc
Tel:609-799-4202 X 220
E-Mail: alok@lorventech.com
Gtalk/YIM: rmgalok
NOTE: This mail has been sent through Google Groups. If you do not want to receive emails in future then please remove your Email ID from that specific Google Group.
Disclaimer:
This is not an unsolicited mail. If you have received this message by mistake or are not interested in receiving our e-mails, please reply with a "REMOVE" in the subject line and delete this message from your system. We are sorry for the inconvenience caused to you.
You received this message because you are subscribed to the Google Groups "Hotlist of US Consultants" group.
To unsubscribe from this group and stop receiving emails from it, send an email to usaconsultants+unsubscribe@googlegroups.com.
To post to this group, send email to usaconsultants@googlegroups.com.
Visit this group at http://groups.google.com/group/usaconsultants.
For more options, visit https://groups.google.com/d/optout.
Postar um comentário