Hello, Hope you are doing well, Please go through the following requirement and let me know on Kevin@riderconsultinginc.comif you have any available resources
Role : Information Security Specialist Duration : 8 month project Location : Reston, VA Candidates must be able to attend an on-site interview for the 2nd interview. All candidates must have a work authorization of Citizen or Green Card. Information Security Specialist -IT: · The role will maintain a continuous process improvement work environment, recommending and implementing new/improved processes in accordance with industry standards and best practices. · The role will lead efforts to identify, evaluate , and test, appropriate security products to assist with monitoring and detection of security events within the infrastructure environment. The role will perform all procedures necessary to protect the safety of the information systems from internal and external threats and will lead efforts in the identification and resolution of critical security issues . · This role will also support actions or recommend alternate solutions to resolve problems or situations related to the detection of security events within the environment, researching and maintaining current with security threats and potential implications for the bank. Responsibilities include : · Data Analytics Develop processes using commercial off the shelf products to create a Security Information and Event Management program to support the existing bank's security monitoring and incident management processes. · Experience and ability to build a data analytics program as well as ability to identify malicious patterns (APTs). · Relational database experience or data mining experience is a plus. · Information Security Monitoring: Develop enhancements to existing monitoring processes for a wide variety of infrastructure platforms. · SIEM solution implementation: detection content development, ability to develop, implement, and fine tune complex, custom detection strategies. Ability to correlate and analyze log information, packet captures, security alerts and artifacts to identify malicious activity. · Information Security Configuration Management: Develop enhancements to existing monitoring processes for published configuration baseline scans across a wide variety of infrastructure platforms. · Information Security Incident Management: Assist with developing enhancements to existing incident management processes Thanks. Kevin*Patel* Ph No:- 980-819-0687 E-mail:- ke...@riderconsultinginc.com G-Talk : kevinpatel.ri...@gmail.com Web Site :- www.riderconsultinginc.com -- You received this message because you are subscribed to the Google Groups "Open Source Erp & Crm" group. To unsubscribe from this group and stop receiving emails from it, send an email to open-source-erp-crm+unsubscr...@googlegroups.com. To post to this group, send email to open-source-erp-crm@googlegroups.com. Visit this group at http://groups.google.com/group/open-source-erp-crm. For more options, visit https://groups.google.com/d/optout.