Tag Archives: logs

System Administrator Monterey, CA

Interested in knowing how I get so many job offers:
http://securitycompliance.thinkific.com

Position: Systems Administrator
Location: Monterey, CA
Certification- Need windows/ linux/vmware certification and Security+

Responsibilities:

Provide technical support for both hardware and software issues our users encounter Manage the configuration and operation of client-based computer operating systems Monitor the system daily and respond immediately to security or usability concerns Create and verify backups of data Respond to and resolve help desk requests Upgrade systems and processes as required for enhanced functionality and security issue resolution Administrate infrastructure, including firewalls, databases, malware protection software and other processes Review application logs Install and test computer-related equipment Microsoft, VMware, Linux, storage, solarwind experience required

Please provide the following information
Rate Expectation:
Full Name:
Contact No:
Alternate contact (if any):
Email address:
Current Location:
Relocation:
Availability:
Visa status

Kindly share your detailed resume at sakship@etalentnetwork.com

If you are qualified and interested in making a change or know of a friend who might have the required qualifications, please call me ASAP at (703) 687-6627 (Work) | Ext. 1121, even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you. In considering candidates, time is of the essence, so please respond ASAP. Thank you.

Sincerely yours,
SakshiPuri
E TalentNetwork

Home


8251 Greensboro Drive
McLeanVA
sakship@etalentnetwork.com
(703) 687-6627 (Work) | Ext. 1121

secureDenver2016

Attend the (ISC)² SecureDenver Event on June 17

Threat Intelligence – From Haystacks to Needles
Information Security, as a function, sits at a great confluence of raw unfiltered data; perhaps more data about the enterprise than any other function of the organization. From state-based data such as vulnerability scan results, to event-based data such as IDS logs, we are collecting more and more information about the enterprise every passing day.
The next step is to make sense of this treasure trove of data. To find the nuggets of truth and transform them into useful information.
Date: June 17, 2016

Registration: 8:00 a.m.

Time: 9:00 a.m.5:00 p.m.
Venue: Marriott Denver South
10345 Park Meadows
Littleton, Colorado 80124
USA
Registration Fee: $99
For full program, speaker information, and registration,
click here.