• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

Cloud Security for IaaS/PaaS/SaaS

endpoint cybersecurity consultant (sacramento, ca)

May 13, 2019 by cyberaware2 Leave a Comment

endpoint cybersecurity consultant (sacramento, ca)

my course: http://securitycompliance.thinkific.com

THE JOB

contact # 510-722-8503 Ext- 509.

Job Title End-Point Cybersecurity Consultant
Location Sacramento CA
Duration 6 months /Contract

JOB DESCRIPTION

We are looking for an End-Point Cybersecurity Consultant – Sacramento California

The ideal candidate will have 5 or more years of perimeter Cybersecurity experience, with a focus on designing and deploying end-point security solutions.

Mandatory Qualifications (MQ’s):

A minimum of five (5) years’ experience, of which three (3) must be in a lead capacity, in designing and developing an endpoint security infrastructure and developing procedures defining their use to meet business requirements
A minimum of three (3) years’ combined experience in designing and integrating device vulnerability scanning, securing systems, software, certificate authority, two-factor authentication, Patching, Security Information and/or Event Management.
A minimum of three (3) years’ combined experience related to Antivirus, Mobile Device Management, Encryption (In Transit/At Rest), Data Loss Prevention and/or Mobile Device Management.
Desired Qualifications:
Six (6) years’ experience, of which three (3) must be in a lead capacity, in designing and developing an endpoint security infrastructure and developing procedures defining their use to meet business requirements.
Four (4) years’ combined experience in designing and integrating device vulnerability scanning, securing systems, software, certificate authority, two-factor authentication, Patching, Security Information and/or Event Management.
Three or more (3+) years’ combined experience related to email hybrid integration and operational support of cloud Cisco e-mail Security services including hygiene/SPAM, Antivirus, Malware, Encryption, Data Loss Prevention and premise-based SMTP relays, VMWare AirWatch Mobile Device Management/ Workspace 1 and/or Active Directory (AD) authentication utilizing AD Federation Services
Three or more (3+) years’ experience utilizing Palo Alto web filtering technologies and developing automated reporting procedures for their use.
Possess SANS certifications, which may include Advanced Security Essentials, Enterprise Defender Certificate or other applicable SANS certification.
Three (3) years’ demonstrated experience in Malware/endpoint protection for incident response using McAfee and FireEye.
Three (3) years’ combined experience integrating border Router/Switches, Layer 3/ Application/Micro-Segmentation Firewall Policy/Administration, Load Balancer, Cloud Security for IaaS/PaaS/SaaS, DoS, Log/Monitoring correlation and/or Data Packet Inspection.
Three or more (3+) years’ combined experience related to Hypervisor, DNS, Identity/RBAC and Directory Services, MFA, IDS/IPS, Virtual Private Network, DMZ and/or Encryption (At Rest/In Transit).
Desired Soft Skills:

Excellent written and verbal communication and presentation skills with the ability to explain complex concepts
Highly self-motivated and directed with an attention to detail
Ability to take initiative and exercise judgment
Possess a flexible, proactive, can-do attitude
Job Responsibilities

Essential Security Endpoint and Operations Duties
Essential Security, SIEM, Vulnerability and Incident Duties
Security Compliance
Security Leadership/Mentor/Guidance
Closure, Transition, Training and Knowledge Transfer
Unanticipated Tasks
Other Requirements

Fully fluent in English for both written and verbal
Pass a Background check
Finalists must provide three references to verify skills and experience

Regards,
Abhishek Mishra
Technical Resource Specialist
Talent Anytime Inc.
41041 Trimboli way suite 1398 Fremont CA 94538
Contact# : 510-722-8503 x 509
Direct : 510-722-8835

Filed Under: cyberspace workforce, DIARMF Jobs, Information Assurance Jobs, IT Security Jobs, risk jobs Tagged With: AntiVirus, border Router/Switches, Cloud Security for IaaS/PaaS/SaaS, Data Loss Prevention and premise-based SMTP relays, DoS, encryption, Essential Security, Layer 3/ Application/Micro-Segmentation Firewall Policy/Administration, Load Balancer, Log/Monitoring correlation and/or Data Packet Inspection, malware, SIEM, VMWare AirWatch Mobile Device, Vulnerability and Incident Duties

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Convocourses Podcast: Plan of Action and Milestone
  • Start with These IT Certifications (Part 1)
  • How to Tailor Security Controls in NIST 800
  • #cybersecurityjobs are recession proof
  • What IT Certifications for Information Security (part 2) (8140)

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce IA implement implementation info assurance information assurance information security ISSO IT it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in