• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs
  • Log in

Linux

Learn Linux, Splunk and ArcSight

March 30, 2020 by cyberaware2 Leave a Comment

Splunk training:
www.splunk.com/en_us/training.html
www.udemy.com/Splunk/Online-Course
www.onlc.com/Splunk
bootcamp.du.edu/Cybersecurity/Boot-Camp

for courses on how to get into IT Security check out:
http://convocourses.com

Filed Under: cyberspace workforce Tagged With: ArcSight, Linux, splunk

System Administrator Monterey, CA

April 2, 2019 by cyberaware2 Leave a Comment

Interested in knowing how I get so many job offers:
http://securitycompliance.thinkific.com

Position: Systems Administrator
Location: Monterey, CA
Certification- Need windows/ linux/vmware certification and Security+

Responsibilities:

Provide technical support for both hardware and software issues our users encounter Manage the configuration and operation of client-based computer operating systems Monitor the system daily and respond immediately to security or usability concerns Create and verify backups of data Respond to and resolve help desk requests Upgrade systems and processes as required for enhanced functionality and security issue resolution Administrate infrastructure, including firewalls, databases, malware protection software and other processes Review application logs Install and test computer-related equipment Microsoft, VMware, Linux, storage, solarwind experience required

Please provide the following information
Rate Expectation:
Full Name:
Contact No:
Alternate contact (if any):
Email address:
Current Location:
Relocation:
Availability:
Visa status

Kindly share your detailed resume at sakship@etalentnetwork.com

If you are qualified and interested in making a change or know of a friend who might have the required qualifications, please call me ASAP at (703) 687-6627 (Work) | Ext. 1121, even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you. In considering candidates, time is of the essence, so please respond ASAP. Thank you.

Sincerely yours,
SakshiPuri
E TalentNetwork

Home


8251 Greensboro Drive
McLeanVA
sakship@etalentnetwork.com
(703) 687-6627 (Work) | Ext. 1121

Filed Under: cyberspace workforce, FISMA, IT Security Jobs, risk jobs, Risk Management For DoD IT, security compliance, STIGS Tagged With: it jobs, Linux, logs, microsoft, Monterey, solarwind, System Administrator, VMWare

Senior Advanced Splunk IT Specialist

April 1, 2019 by cyberaware2 Leave a Comment

Check out how I am able to get all these offers:
https://securitycompliance.thinkific.com

More on that #splunk job:
Sr Advanced Splunk / IT Security Specialist
https://careers-gd-ais.icims.com/jobs…
POC:
quan.nguyen@gd-ms.com
443-755-8136 (O)

Bachelor’s degree in a related specialized area or equivalent is required plus a minimum of 8 years of relevant experience; or Master’s degree plus a minimum of 6 years of relevant experience.
Knowledge Skills and Abilities:
Senior Splunk Administrator
Advanced knowledge of backend operating systems to implement, maintain, configure, and remediate issues (UNIX/Linux/Windows)
Knowledge of operating systems and networking.
Understanding of SIEM & logging fundamentals.
Understanding of SOC Monitor and Response fundamentals.
Experience in any type of SIEM – Splunk, Arcsight, Log Rhythm, etc.
Experience with implementation of SIEM products and tools.
Understanding of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix
Knowledge of applications, databases, middleware to address security threats against the same.
Proficient in preparation of reports, dashboards and documentation
Excellent communication and leadership skills
Ability to handle high pressure situations with key stakeholders
Good Analytical skills, problem solving and Interpersonal skills
Working knowledge and experience with MS office with proficiency in Excel

Preferred degree types and experience:

The leading candidate will have a Bachelor’s Degree in Computer Science, a related field, or equivalent experience. with a minimum of 5 years of experience in a SOC, or an Associates Degree in Computer Science, Information Systems, Cyber Security, or related discipline with a minimum of 7 years of experience in a SOC. Strong candidates will have previous experience working with users; possess a talent for problem-solving as well as organization and time management skills.

Filed Under: cyberspace workforce, Information Assurance Jobs, information system compliance, IT Security Jobs Tagged With: ArcSight, Linux, security job, SIEM, SOC, splunk, unix

STIG Update – Canonical Ubuntu 16.04 STIG V1R1

September 22, 2017 by Bruce Brown Leave a Comment

STIG Update – Canonical Ubuntu 16.04 STIG V1R1


DISA Risk Management Executive has released the Canonical Ubuntu 16.04 Security Technical Implementation Guide (STIG) Version 1 Release 1. The requirements of the STIG become effective immediately. The STIG is available on IASE at https://iase.disa.mil/stigs/os/unix-linux/Pages/index.aspx.


For all STIG related questions, please contact the DISA STIG Customer Support Desk: disa.stig_spt@mail.mil


Update your subscriptions, modify your password or e-mail address, or stop subscriptions at any time on your Subscriber Preferences Page. You will need to use your email address to log in. If you have questions or problems with the subscription service, please visit subscriberhelp.govdelivery.com. All other inquiries can be directed to subscriptions@disa.mil.

Filed Under: STIGS Tagged With: disa, Linux, STIG, ubuntu

Remote Position: Security Engineer/ Architect: Greenwood Village, CO

April 5, 2016 by Bruce Brown Leave a Comment

Job Title: Security Engineer/ Architect (50% Remote)
Location: Greenwood Village, CO
Duration: 12+ Months Contract (Very High possibility of Extension/ Conversion)

Job Description:
KP’s Cyber Security team is looking to expand, mature, and execute the Enterprise Technology Security Hardening Service.  The goal of the Security Hardening Service is to develop security-hardening standards for platforms, applications, networks and protocols.  These hardening standards serve as the gold image requiring compliance for all implementation of a particular technology or a protocol.  The hardening standards take into account the entire lifecycle of a technology or a protocol, and include hardening requirements and/or security recommendations for each phase in the lifecycle from a people, process and technology perspective. These baselines are produced and maintained for applications, networks, and platforms to ensure consistent implementation of technical security controls across KP’s technology landscape. This position is focused towards providing expert level security guidance for producing and maintaining security certifications for KP’s IT landscape based on identification and analysis of security control gaps, industry security best practices, regulatory guidance, and KP’s IS Policies. The position will also involve building a security strategy for the service to ensure the service is extensible to accommodate the changing IT landscape for near term future (e.g. cloud, mobile, big data etc.).

Top 3-5 Daily Responsibilities:

  • Perform Security Hardening Service Design including process, methodology, and any tools that would be required to ensure hardening standards are developed using a repeatable methodology.
  • Formally document the artifacts for various phases of security architecture engagements, and obtain sign-off from all stakeholders.

Top 3-5 Required Skills:

  • BS in IT-related or engineering degree and 4 years of experience  in IT industry, OR Associates/ equivalent collegiate certificate in an IT-related or engineering degree program and six years of experience in IT industry.
  • At least two years of experience in general endpoint configuration management and/or computer engineering, with one year of specialized experience in the following platform OS’s:   (requirements can be broken up among different people)
  • Windows Professional
  • Windows Server
  • Linux (RedHat & Suse)
  • Unix (Solaris)
  • At least one year specialized experience in interpreting and applying a system of cyber security controls to endpoints, such as NIST 800-53, Defense Information Systems Agency Security Technical Implementation Guides (DISA STIGs), or Center for Internet Security (CIS) Security Benchmarks.
  • Demonstrated understanding of cloud computing and mobile computing concepts and how to apply them.

Desired Skills:

  • At least one year’s specialized experience in configuring security settings and setting Enterprise security policy for the following operating systems:  (requirements can be broken up among different people)
  • RedHat Enterprise Linux 7.1, 6.x and 5.x
  • Suse Linux 11 and 12
  • Solaris 10 and 11
  • IBM AIX 5.x, 6.x and 7.x
  • MacOS 10.x
  • Experience in working in one of the following cloud architecture environments:
  • AWS
  • Azure
  • Experience in working with and managing mobile devices in an Enterprise environment.
  • Advanced GIAC certification and/or CISSP

Soft Skills:

  • Very strong communication skills

If you are qualified, available, interested and planning to make a change, or know of a friend who might have the required qualifications and interest, you can contact me on desk: 415-915-1164 even if we have spoken recently about a different position. If you do respond via e-mail please include the Best time to call and phone number so I can reach you.

Thank you,

Anuj S. Verma
Executive – Resourcing
Pyramid Consulting, Inc.
Email:
anuj.verma@pyramidci.com

Filed Under: cyberspace workforce, DIARMF Jobs, Information Assurance Jobs, risk jobs Tagged With: 800-53, Center for Internet Security (CIS), CO, disa, Greenwood Village, Linux, nist, redhat, STIG, SuSe, unix, Windows Professional, Windows Services

Senior Network Security Engineer

February 23, 2016 by Bruce Brown Leave a Comment

If you are a Senior or Lead level Network Security Engineer with a comprehensive understanding of network architecture, please read on!

Located in the heart of the Silicon Valley, we are a rapidly growing software organization that has created a robust product suite focused on cyber security and vulnerability management. Due to recent growth and on-boarding of new clients, we have an immediate need to hire a full-time Senior Network Security Engineer to join our Professional Services team that covers North America. Our ideal candidate is someone that is located in the San Francisco Bay Area, but we are also very open to someone working remotely anywhere in the United States. Our Professional Services Team is responsible for product deployments with customers, training customers on our product suite, providing value-added services and consultative advice, and designing solutions for our clients. As a Senior member on our team, you will be looked on to lead projects and implementations while mentoring some of the more mid-level PS Engineers on the team.

Top Reasons to Work with Us

1. Opportunity to work remotely with minimal travel requirements!
2. Excellent Compensation Plan – Salary + Bonus + Full Benefits + Equity
3. Ability to work with a cutting edge Cyber Security product suite!

What You Will Be Doing

In this role, you will provide a wide range of Profession Services solutions to our clients from coast-to-coast. This role will require a strong understanding of network architecture and design because a lot of the day-to-day will encompass solving the customers problems by building network models that emulate the customers network. Once you have modeled the customers network, you will be checking for vulnerabilities and customizing our product suite to make sure it is fully optimized for the client’s environment. You will be interacting with clients over the phone, via Web Ex, Skype, and other virual tools. There could be a little bit of travel involved with the role, but it would be minimal (up to 10%). You will be leading clients through the onboarding process and providing value added services to help automate processed and help with integration / implementation activities. You will need to be able to create scripts on your own (Python / Perl) to create automated processes and customize our products to fit client specifications. As a Senior member of the team, you will need to be comfortable leading client meetings and managing projects from planning to completion.

What You Need for this Position

7+ years of experience in a professional Network Security engineering capacity
3+ years of experience in a Professional Services / Client-facing role
Comprehensive understanding of network architecture with a focus on Layer 3 networking
Strong background and hands-on experience with firewalls (CISCO, Juniper, Check Point)
Experience with vulnerability scanners and vulnerability management tools
Ability to create network models based on a client’s existing network
Scripting skills in Python or Perl
Experience leading customer projects, providing consultative advice to clients, and lead client training sessions
Intermediate – Advanced Linux experience (administration, configuration, etc..) – our products are all Linux based (CentOS)
Bonus Points for Penetration Testing experience or experience with MySQL queries
Professional Certifications highly desired (CISSP, CCNP, CCIE, etc..)

What’s In It for You

Competitive Salary ($120,000 – $150,000 DOE)
Excellent Bonus Potential (20%)
Comprehensive Benefits Package
401k
Paid Time Off
Flexible Work Hours & Opportunity to Telecommute
So, if you are a Senior Network Security Engineer looking for new challenges and a great growth opportunity, please apply today!

Applicants must be authorized to work in the U.S.

Filed Under: DIARMF Jobs, risk jobs, Risk Management For DoD IT Tagged With: ccie, ccnp, centos, check point, Cisco, CISSP, cyber, Juniper, Linux, php, python, security, senior network security engineer

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to Next Page »

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Convocourses Podcast: Plan of Action and Milestone
  • Start with These IT Certifications (Part 1)
  • How to Tailor Security Controls in NIST 800
  • #cybersecurityjobs are recession proof
  • What IT Certifications for Information Security (part 2) (8140)

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce IA implement implementation info assurance information assurance information security ISSO IT it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in