• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

Security Engineer Location Wayne, Pa

February 3, 2016 by Bruce Brown Leave a Comment

 

please call 201-340-8700 Ext 436 to discuss as soon as possible.

One of our clients a   company in the Wayne ,PA area has a current opening at a competitive rate, for a (CONTRACT) experienced  Security Engineer  professional to add to their team. I reviewed your resume in our database and think this could be a great fit!

Below are some key highlights of the position, if this is of interest please call me.  We can discuss the details of this opportunity and /or further determine which types of opportunities you may be interested in exploring.

Brief Job Description: Net2Source, Inc. is one of the fastest growing IT Consulting company across USA. N2S is headquartered at NJ, USA with its branch offices in Asia Pacific Region. N2S offers a wide gamut of consulting solutions customized to client needs including staffing, training and technology.

Job Summary:

Subject: Security Engineer
Location:Wayne, Pa
Long term contract
Phone & Skype

Relevant experience includes:
• DLP technology e.g. Vontu / Symantec
• Site / application security assessment
• Vulnerability Management solutions e.g. Nessus / Qualys
• GRC solutions e.g. RSAM / Archer
• Endpoint security management e.g. BigFix/IEM, ViewFinity
• Firewall rule assessment e.g. Nipper
Experienced with DLP and related tools.

GENERAL DUTIES & RESPONSIBILITIES:

• Evaluates and recommends security technologies for use throughout the enterprise.
• Establishes technical and administrative standards through development of policy, procedure and best practices.
• Develops strategies to address evolving technology security needs and issues, and guide company towards a secure infrastructure that meets legal, regulatory, and client compliance requirements, as well as service and operational level agreements.
• Works with all architect(s) to drive Enterprise Architecture (EA) processes and best practices.
• Ensures that all security solutions, architecture design and analysis work is documented in a structured fashion.
• Works closely with peers in Security Operations, Security Compliance, to ensure that security reviews regarding information security technologies provide feasible requirements and are consistent with contracts, and regulations
• Monitors information security news and keep abreast of events, research, and developments.
• Assists senior management in defining the overall information security strategy.
• Designs in-house solutions for maintaining security posture.
• Proactively remains abreast of related evaluating technology trends and requirements, such as emerging standards for new technology opportunities.
• Achieves an in-depth knowledge of product offerings and interfaces.
• May mentor and/or train operational staff and contractors on security tools, processes, and procedures.
• Performs other related duties as assigned.

EDUCATIONAL REQUIREMENTS:
Bachelor’s degree in computer science preferred or the equivalent combination of education, training, or work experience. CISSP, GSEC, CCNE, or other security or network certifications desired.

(“VULNERABILITY MANAGEMENT” OR NESSUS OR QUALYS) AND (“FIREWALL RULE ASSESSMENT” OR NIPPER)

GENERAL KNOWLEDGE, SKILLS & ABILITIES:
• Knowledge of networks technologies (protocols, design concepts, access control)
• Knowledge of security technologies (encryption, data protection, design, privilege access, etc.)
• Knowledge of Financial Services industry
• Knowledge of network design and engineering
• Proficiency in interacting with executive level clients
• Proficiency in time management, communications, decision making, presentation and organizational skills
• Proficiency in planning, reporting, establishing goals and objectives, standards, priorities and schedules
• Excellent decision-making and problem solving skills
• Excellent verbal and written communication skills to technical and non-technical audiences of various levels in the organization
• Proficiency in establishing and maintaining effective working relationships with employees and clients
• Excellent input and planning into application development, systems engineering, and network engineering for development of security requirements and best practices are implemented and followed

Filed Under: DIARMF Jobs, risk jobs, Risk Management For DoD IT Tagged With: CCNE, CISSP, data protection, Design, encryption, GSEC, Pa, privilege access, Security Engineer Location Wayne

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Social connect:

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Convocourses Podcast: Plan of Action and Milestone
  • Start with These IT Certifications (Part 1)
  • How to Tailor Security Controls in NIST 800
  • #cybersecurityjobs are recession proof
  • What IT Certifications for Information Security (part 2) (8140)

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce IA implement implementation info assurance information assurance information security ISSO IT it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in