• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

unix

Full time (Permanent position) position Engineer/Systems Engineer

May 15, 2020 by cyberaware2 Leave a Comment

Job Title – Engineer I – Mission Systems Engineer (Systems Operability)
Location – Boulder, Colorado

Salary: $90,000–$95,000 / yr

What You’ll Need

Current TS/SCI security clearance required.
Experience working in UNIX, Mac, and MS-Windows environments is preferred.
Best Regards,
InstantServe LLC
175 Strafford Avenue, Suite one # 907, Wayne, PA 19087
(610) 455-5523

Filed Under: Risk Management For DoD IT Tagged With: boulder, MAC, mission system engineer, MS-Windows, unix

Senior Advanced Splunk IT Specialist

April 1, 2019 by cyberaware2 Leave a Comment

Check out how I am able to get all these offers:
https://securitycompliance.thinkific.com

More on that #splunk job:
Sr Advanced Splunk / IT Security Specialist
https://careers-gd-ais.icims.com/jobs…
POC:
quan.nguyen@gd-ms.com
443-755-8136 (O)

Bachelor’s degree in a related specialized area or equivalent is required plus a minimum of 8 years of relevant experience; or Master’s degree plus a minimum of 6 years of relevant experience.
Knowledge Skills and Abilities:
Senior Splunk Administrator
Advanced knowledge of backend operating systems to implement, maintain, configure, and remediate issues (UNIX/Linux/Windows)
Knowledge of operating systems and networking.
Understanding of SIEM & logging fundamentals.
Understanding of SOC Monitor and Response fundamentals.
Experience in any type of SIEM – Splunk, Arcsight, Log Rhythm, etc.
Experience with implementation of SIEM products and tools.
Understanding of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix
Knowledge of applications, databases, middleware to address security threats against the same.
Proficient in preparation of reports, dashboards and documentation
Excellent communication and leadership skills
Ability to handle high pressure situations with key stakeholders
Good Analytical skills, problem solving and Interpersonal skills
Working knowledge and experience with MS office with proficiency in Excel

Preferred degree types and experience:

The leading candidate will have a Bachelor’s Degree in Computer Science, a related field, or equivalent experience. with a minimum of 5 years of experience in a SOC, or an Associates Degree in Computer Science, Information Systems, Cyber Security, or related discipline with a minimum of 7 years of experience in a SOC. Strong candidates will have previous experience working with users; possess a talent for problem-solving as well as organization and time management skills.

Filed Under: cyberspace workforce, Information Assurance Jobs, information system compliance, IT Security Jobs Tagged With: ArcSight, Linux, security job, SIEM, SOC, splunk, unix

Remote Position: Security Engineer/ Architect: Greenwood Village, CO

April 5, 2016 by Bruce Brown Leave a Comment

Job Title: Security Engineer/ Architect (50% Remote)
Location: Greenwood Village, CO
Duration: 12+ Months Contract (Very High possibility of Extension/ Conversion)

Job Description:
KP’s Cyber Security team is looking to expand, mature, and execute the Enterprise Technology Security Hardening Service.  The goal of the Security Hardening Service is to develop security-hardening standards for platforms, applications, networks and protocols.  These hardening standards serve as the gold image requiring compliance for all implementation of a particular technology or a protocol.  The hardening standards take into account the entire lifecycle of a technology or a protocol, and include hardening requirements and/or security recommendations for each phase in the lifecycle from a people, process and technology perspective. These baselines are produced and maintained for applications, networks, and platforms to ensure consistent implementation of technical security controls across KP’s technology landscape. This position is focused towards providing expert level security guidance for producing and maintaining security certifications for KP’s IT landscape based on identification and analysis of security control gaps, industry security best practices, regulatory guidance, and KP’s IS Policies. The position will also involve building a security strategy for the service to ensure the service is extensible to accommodate the changing IT landscape for near term future (e.g. cloud, mobile, big data etc.).

Top 3-5 Daily Responsibilities:

  • Perform Security Hardening Service Design including process, methodology, and any tools that would be required to ensure hardening standards are developed using a repeatable methodology.
  • Formally document the artifacts for various phases of security architecture engagements, and obtain sign-off from all stakeholders.

Top 3-5 Required Skills:

  • BS in IT-related or engineering degree and 4 years of experience  in IT industry, OR Associates/ equivalent collegiate certificate in an IT-related or engineering degree program and six years of experience in IT industry.
  • At least two years of experience in general endpoint configuration management and/or computer engineering, with one year of specialized experience in the following platform OS’s:   (requirements can be broken up among different people)
  • Windows Professional
  • Windows Server
  • Linux (RedHat & Suse)
  • Unix (Solaris)
  • At least one year specialized experience in interpreting and applying a system of cyber security controls to endpoints, such as NIST 800-53, Defense Information Systems Agency Security Technical Implementation Guides (DISA STIGs), or Center for Internet Security (CIS) Security Benchmarks.
  • Demonstrated understanding of cloud computing and mobile computing concepts and how to apply them.

Desired Skills:

  • At least one year’s specialized experience in configuring security settings and setting Enterprise security policy for the following operating systems:  (requirements can be broken up among different people)
  • RedHat Enterprise Linux 7.1, 6.x and 5.x
  • Suse Linux 11 and 12
  • Solaris 10 and 11
  • IBM AIX 5.x, 6.x and 7.x
  • MacOS 10.x
  • Experience in working in one of the following cloud architecture environments:
  • AWS
  • Azure
  • Experience in working with and managing mobile devices in an Enterprise environment.
  • Advanced GIAC certification and/or CISSP

Soft Skills:

  • Very strong communication skills

If you are qualified, available, interested and planning to make a change, or know of a friend who might have the required qualifications and interest, you can contact me on desk: 415-915-1164 even if we have spoken recently about a different position. If you do respond via e-mail please include the Best time to call and phone number so I can reach you.

Thank you,

Anuj S. Verma
Executive – Resourcing
Pyramid Consulting, Inc.
Email:
anuj.verma@pyramidci.com

Filed Under: cyberspace workforce, DIARMF Jobs, Information Assurance Jobs, risk jobs Tagged With: 800-53, Center for Internet Security (CIS), CO, disa, Greenwood Village, Linux, nist, redhat, STIG, SuSe, unix, Windows Professional, Windows Services

Systems Analyst – Senior Highlands Ranch, CO

February 16, 2016 by Bruce Brown Leave a Comment

updated resumeaditistaffing.com or call to 425 457 7934
                                                                                          
Title –  Systems Analyst – Senior
Location – Highlands Ranch, CO
Duration of assignment and possible extensions: 1 year. May be some potential to extend or convert.

Must have skills
• Bachelor’s degree in engineering, computer science or a related field OR related certification is required. • 5-8+ years information security experience (ID & Access Mgt) • Working knowledge of Oracle Identity Management suites (OIM) • Strong knowledge of the UNIX/Linux systems administration, Unix Enterprise Directory, and Privileged access management tools (e.g. Unix Privileged Manager, Random Password Manager, etc.). • Scripting in UNIX • Familiar with security concepts such as PKI, SSL, and encryption • Manage access controls for Visa key information resources residing on multiple platforms, with a focus area in UNIX, Linux and databases (MS SQL, ORACLE, DB2). • MUST be able to work onsite in Denver

Nice to have skills
Post graduate degree a plus • CISSP, CISA, CISM and other comparative information security certifications are preferred • Development experience a plus (Java, C#, VBScript, Perl and Shell script, etc.) • Proficiency in Microsoft Office Applications, experience developing applications in Excel VBA.

Roles and responsibilities
• Manage access controls for Visa key information resources residing on multiple platforms • Needs to be familiar and comfortable to use local commands, scripts and tools to perform job tasks. • See JD for more
Preference on industry background or previous companies worked for?

Description
Position Summary
The ideal candidate for position will be a proactive and self-motivated professional who will work with other team members to manage access controls for Visa key information resources residing on multiple platforms, with a focus area in UNIX, Linux and databases (MS SQL, ORACLE, DB2). The successful candidate should be familiar and comfortable to use local commands, scripts and tools that will be used to perform job tasks.

Qualifications
• Bachelor’s degree in engineering, computer science or a related field is required. Post graduate degree a plus
• 5+ years information security experience required
• Strong knowledge of the UNIX/Linux systems administration, Unix Enterprise Directory, and Privileged access management tools (e.g. Unix Privileged Manager, Random Password Manager, etc.). This includes good analytical and troubleshooting skills on all platforms and tools supported.
• Working knowledge of Oracle Identity Management suites
• In-depth and proven knowledge in building automated solutions using various coding languages will be an added advantage (Java, C#, VBScript, Perl and Shell script, etc.)
• Proficiency in Microsoft Office Applications, experience developing applications in Excel VBA.
• Ability to gather and document business requirements and implement solutions to address them

Filed Under: Risk Management For DoD IT Tagged With: colorado, DB2, highland ranch, Linux, MS SQL, Oracle, PKI, SSL, unix

Product Solutions Specialist in Herndon, VA

February 4, 2016 by Bruce Brown Leave a Comment

We have an immediate need of a Product Solutions Specialist in Herndon, VA. This position is with HPE. Please see below the job description and send across the updated copy of your resume ASAP. I will get back with you ASAP.
Title:               Product Solutions Specialist
Client:              Department of Justice
Location:         HPE
Duration:        10 Months

General Description: The candidate applies subject matter expertise of Imperva Web Application Firewall, service oriented architecture, and web services in support of a web application hosting infrastructure. Candidate is responsible for performing ongoing maintenance, to include ensuring devices comply with enterprise security policies. Candidate works with application development teams to configure devices to support new and changing application requirements. Candidate coordinates with architecture groups to generate product roadmaps. This position requires development and deployment expertise, as well as experience troubleshooting incidents.

Typical Duties: Manages and monitors web application rules and policies across the enterprise. Manages the day to day governance of the enterprise web application firewalls, database firewall, and other security controls. This includes configuration tuning, troubleshooting, as well as defining and executing escalation criteria. Work with engineering teams to tune control systems to best meet the need of the business. Troubleshoots incidents in development and production environments. Meets with auditors to provide implementation details and compliance data. Works with application and operations teams to ensure successful upgrades of infrastructure components and application code. Participates in incident and change management processes. Creates and maintains work instructions and deployment documentation. Provides after-hours on-call support.

Required Skills and/or Product Knowledge:
Expert level experience with the Imperva Web Application Firewalls, preferably version 11 or greater.
Demonstrated knowledge of maintaining web application rules and policies
Subject Matter Expert experience level.
Experience with IDS/IPS networking devices in a production environment.
Thorough knowledge of the OSI stack with an understanding of how these layers are utilized within a web-based application.
Thorough understanding of how web applications are deployed in a load balanced infrastructure.
Knowledge of SSL/TLS traffic handling and encrypt/decrypt policies.
Ability to document security governance processes and work instructions.
A strong attention to detail
Ability to interact with personnel at all levels across the organization and to comprehend business imperatives.
A strong customer/client focus with ability to manage expectations appropriately and provide superior customer/client experience and build long-term relationships.

The following skills and experience are preferred:
Experience with other web application firewall products and/or security technologies.
Bachelor’s degree in information systems or relevant field of study.
CISSP or other security certification.
Excellent data analysis skills using standard office tools are required.
Excellent communications skills (verbal and written) are required.
Experience in an ITIL environment and working with a service ticketing system
Experience with other Firewalls
Experience with Load Balancers
Experience with DNS
Experience with Unix

Filed Under: cyberspace workforce, DIARMF Jobs, risk jobs Tagged With: dns, firewall, ITIL, load balancers, security, unix

Systems Administrator in Durham, NC with NIEHS

February 2, 2016 by Bruce Brown Leave a Comment

 

JOB DESCRIPTION:
Position: Systems Administrator
Location: Triangle Park, NC
Duration: Full time
 CLient: NIEHS
• Education – Bachelors and/or advanced degree in Information Systems, Engineering or
Computer Science,
or 6 years of demonstrated hands on experience within the last 3 years working on Linux/Netapp environments, and 3 years demonstrated hands on experience as a Senior Unix/Linux Administrator, and 3 years demonstrated hands on experience providing a full range of Disk Array support, would qualify.
• Experience – a minimum of 3 years of hands on experience working on Unix/Linux environments
o 5 years of demonstrated hands on experience as a Senior Unix/Linux Administrator maintaining, troubleshooting, and enhancing Virtual Unix/Linux environments
o 5 years demonstrated hands on experience providing the full range of Disk Array support
Kindly send me your updated resume along with expected rates at rosalynm@tscti.com also fill the skill matrix below.
Salary/Rate Expectation:
Full Name:
Contact No:
Alternate contact (if any):
Email address:
Current Location:
Relocation:
Availability:
Visa status:

Filed Under: cyberspace workforce, DIARMF Jobs, Information Assurance Jobs, risk jobs Tagged With: Linux, NC, netapp, niehs, systems administrator, triangle park, unix

  • Go to page 1
  • Go to page 2
  • Go to Next Page »

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Convocourses Podcast: Plan of Action and Milestone
  • Start with These IT Certifications (Part 1)
  • How to Tailor Security Controls in NIST 800
  • #cybersecurityjobs are recession proof
  • What IT Certifications for Information Security (part 2) (8140)

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce IA implement implementation info assurance information assurance information security ISSO IT it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in