• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

encryption

endpoint cybersecurity consultant (sacramento, ca)

May 13, 2019 by Leave a Comment

endpoint cybersecurity consultant (sacramento, ca)

my course: http://securitycompliance.thinkific.com

THE JOB

contact # 510-722-8503 Ext- 509.

Job Title End-Point Cybersecurity Consultant
Location Sacramento CA
Duration 6 months /Contract

JOB DESCRIPTION

We are looking for an End-Point Cybersecurity Consultant – Sacramento California

The ideal candidate will have 5 or more years of perimeter Cybersecurity experience, with a focus on designing and deploying end-point security solutions.

Mandatory Qualifications (MQ’s):

A minimum of five (5) years’ experience, of which three (3) must be in a lead capacity, in designing and developing an endpoint security infrastructure and developing procedures defining their use to meet business requirements
A minimum of three (3) years’ combined experience in designing and integrating device vulnerability scanning, securing systems, software, certificate authority, two-factor authentication, Patching, Security Information and/or Event Management.
A minimum of three (3) years’ combined experience related to Antivirus, Mobile Device Management, Encryption (In Transit/At Rest), Data Loss Prevention and/or Mobile Device Management.
Desired Qualifications:
Six (6) years’ experience, of which three (3) must be in a lead capacity, in designing and developing an endpoint security infrastructure and developing procedures defining their use to meet business requirements.
Four (4) years’ combined experience in designing and integrating device vulnerability scanning, securing systems, software, certificate authority, two-factor authentication, Patching, Security Information and/or Event Management.
Three or more (3+) years’ combined experience related to email hybrid integration and operational support of cloud Cisco e-mail Security services including hygiene/SPAM, Antivirus, Malware, Encryption, Data Loss Prevention and premise-based SMTP relays, VMWare AirWatch Mobile Device Management/ Workspace 1 and/or Active Directory (AD) authentication utilizing AD Federation Services
Three or more (3+) years’ experience utilizing Palo Alto web filtering technologies and developing automated reporting procedures for their use.
Possess SANS certifications, which may include Advanced Security Essentials, Enterprise Defender Certificate or other applicable SANS certification.
Three (3) years’ demonstrated experience in Malware/endpoint protection for incident response using McAfee and FireEye.
Three (3) years’ combined experience integrating border Router/Switches, Layer 3/ Application/Micro-Segmentation Firewall Policy/Administration, Load Balancer, Cloud Security for IaaS/PaaS/SaaS, DoS, Log/Monitoring correlation and/or Data Packet Inspection.
Three or more (3+) years’ combined experience related to Hypervisor, DNS, Identity/RBAC and Directory Services, MFA, IDS/IPS, Virtual Private Network, DMZ and/or Encryption (At Rest/In Transit).
Desired Soft Skills:

Excellent written and verbal communication and presentation skills with the ability to explain complex concepts
Highly self-motivated and directed with an attention to detail
Ability to take initiative and exercise judgment
Possess a flexible, proactive, can-do attitude
Job Responsibilities

Essential Security Endpoint and Operations Duties
Essential Security, SIEM, Vulnerability and Incident Duties
Security Compliance
Security Leadership/Mentor/Guidance
Closure, Transition, Training and Knowledge Transfer
Unanticipated Tasks
Other Requirements

Fully fluent in English for both written and verbal
Pass a Background check
Finalists must provide three references to verify skills and experience

Regards,
Abhishek Mishra
Technical Resource Specialist
Talent Anytime Inc.
41041 Trimboli way suite 1398 Fremont CA 94538
Contact# : 510-722-8503 x 509
Direct : 510-722-8835

Filed Under: cyberspace workforce, DIARMF Jobs, Information Assurance Jobs, IT Security Jobs, risk jobs Tagged With: AntiVirus, border Router/Switches, Cloud Security for IaaS/PaaS/SaaS, Data Loss Prevention and premise-based SMTP relays, DoS, encryption, Essential Security, Layer 3/ Application/Micro-Segmentation Firewall Policy/Administration, Load Balancer, Log/Monitoring correlation and/or Data Packet Inspection, malware, SIEM, VMWare AirWatch Mobile Device, Vulnerability and Incident Duties

Security Engineer Location Wayne, Pa

February 3, 2016 by Bruce Brown Leave a Comment

 

please call 201-340-8700 Ext 436 to discuss as soon as possible.

One of our clients a   company in the Wayne ,PA area has a current opening at a competitive rate, for a (CONTRACT) experienced  Security Engineer  professional to add to their team. I reviewed your resume in our database and think this could be a great fit!

Below are some key highlights of the position, if this is of interest please call me.  We can discuss the details of this opportunity and /or further determine which types of opportunities you may be interested in exploring.

Brief Job Description: Net2Source, Inc. is one of the fastest growing IT Consulting company across USA. N2S is headquartered at NJ, USA with its branch offices in Asia Pacific Region. N2S offers a wide gamut of consulting solutions customized to client needs including staffing, training and technology.

Job Summary:

Subject: Security Engineer
Location:Wayne, Pa
Long term contract
Phone & Skype

Relevant experience includes:
• DLP technology e.g. Vontu / Symantec
• Site / application security assessment
• Vulnerability Management solutions e.g. Nessus / Qualys
• GRC solutions e.g. RSAM / Archer
• Endpoint security management e.g. BigFix/IEM, ViewFinity
• Firewall rule assessment e.g. Nipper
Experienced with DLP and related tools.

GENERAL DUTIES & RESPONSIBILITIES:

• Evaluates and recommends security technologies for use throughout the enterprise.
• Establishes technical and administrative standards through development of policy, procedure and best practices.
• Develops strategies to address evolving technology security needs and issues, and guide company towards a secure infrastructure that meets legal, regulatory, and client compliance requirements, as well as service and operational level agreements.
• Works with all architect(s) to drive Enterprise Architecture (EA) processes and best practices.
• Ensures that all security solutions, architecture design and analysis work is documented in a structured fashion.
• Works closely with peers in Security Operations, Security Compliance, to ensure that security reviews regarding information security technologies provide feasible requirements and are consistent with contracts, and regulations
• Monitors information security news and keep abreast of events, research, and developments.
• Assists senior management in defining the overall information security strategy.
• Designs in-house solutions for maintaining security posture.
• Proactively remains abreast of related evaluating technology trends and requirements, such as emerging standards for new technology opportunities.
• Achieves an in-depth knowledge of product offerings and interfaces.
• May mentor and/or train operational staff and contractors on security tools, processes, and procedures.
• Performs other related duties as assigned.

EDUCATIONAL REQUIREMENTS:
Bachelor’s degree in computer science preferred or the equivalent combination of education, training, or work experience. CISSP, GSEC, CCNE, or other security or network certifications desired.

(“VULNERABILITY MANAGEMENT” OR NESSUS OR QUALYS) AND (“FIREWALL RULE ASSESSMENT” OR NIPPER)

GENERAL KNOWLEDGE, SKILLS & ABILITIES:
• Knowledge of networks technologies (protocols, design concepts, access control)
• Knowledge of security technologies (encryption, data protection, design, privilege access, etc.)
• Knowledge of Financial Services industry
• Knowledge of network design and engineering
• Proficiency in interacting with executive level clients
• Proficiency in time management, communications, decision making, presentation and organizational skills
• Proficiency in planning, reporting, establishing goals and objectives, standards, priorities and schedules
• Excellent decision-making and problem solving skills
• Excellent verbal and written communication skills to technical and non-technical audiences of various levels in the organization
• Proficiency in establishing and maintaining effective working relationships with employees and clients
• Excellent input and planning into application development, systems engineering, and network engineering for development of security requirements and best practices are implemented and followed

Filed Under: DIARMF Jobs, risk jobs, Risk Management For DoD IT Tagged With: CCNE, CISSP, data protection, Design, encryption, GSEC, Pa, privilege access, Security Engineer Location Wayne

Primary Sidebar

search

Learn to Make 6 Figures in CyberSecurity

Cyber Security How to make up to 6 Figures
6 figures in Cyber Security

This course explains how I have been able to consistently make 6 figures doing cyber security. There is a method that I have used during my development in cyber security. I am presenting that method to you.

View Course

Teleworking - IT Remote Work
Teleworking – IT Remote Work

Teleworking is something I have been doing for the last 5 years. This is how I did it.

Find Teleworking IT Jobs

View Course

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • ConvoCourses podcast: Cyber Security day to day activity
  • ConvoCourses podcast – Cyber Security Therapy Sessions
  • ConvoCourses podcast: privacy protection overview resume review
  • Listing Lab work on Cybersecurity Resume
  • My Security Control Assessor Course

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert
  • Disa Help Desk | VinHomesData.com on STIG Update – DISA has released the Oracle Java Runtime Environment (JRE) 8 STIG Version 1
  • Bruce Brown on DIARMF – Continuous Monitoring
  • dpresbit on DIARMF – Continuous Monitoring

Tags

8140 8570 ArcSight c&a CISSP colorado cyber cybersecurity cyber security denver DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce HBSS IA implement implementation info assurance information assurance information security ISSO job jobs Linux mcafee nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security SIEM STIG stigs unix VMWare windows

Copyright © 2021 · Author Pro on Genesis Framework · WordPress · Log in