Hello,
Hope you are doing well,
Please go through the following requirement and let me know on 
Kevin@riderconsultinginc.comif 
you have any available resources

 

 

Role : Information Security Specialist

Duration : 8 month project

Location : Reston, VA

Candidates must be able to attend an on-site interview for the 2nd interview.  


 

 

All candidates must have a work authorization of Citizen or Green Card.

 

Information Security Specialist -IT:

 

·         The role will maintain a continuous process improvement work 
environment, 
recommending and implementing new/improved processes in accordance with 
industry 
standards and best practices.

·         The role will lead efforts to identify, evaluate , and test, 
appropriate 
security products to assist with monitoring and detection of security events 
within the infrastructure environment. The role will perform all procedures 
necessary to protect the safety of the information systems from internal and 
external threats and will lead efforts in the identification and resolution 
of critical security issues .

·         This role will also support actions or recommend alternate solutions 
to resolve problems or situations related to the detection of security events 
within the environment, researching and maintaining current with security 
threats 
and potential implications for the bank.  

Responsibilities include : 

·         Data Analytics Develop processes using commercial off the shelf 
products 
to create a Security Information and Event Management program to support the 
existing bank's security monitoring and incident management processes.

·         Experience and ability to build a data analytics program as well 
as ability to identify malicious patterns (APTs). 

·         Relational database experience or data mining experience is a plus.

 

·         Information Security Monitoring: Develop enhancements to existing 
monitoring processes for a wide variety of infrastructure platforms.

·         SIEM solution implementation: detection content development, ability 
to develop, implement, and fine tune complex, custom detection strategies. 
Ability to correlate and analyze log information, packet captures, security 
alerts and artifacts to identify malicious activity. 

·         Information Security Configuration Management: Develop enhancements 
to existing monitoring processes for published configuration baseline scans 
across a wide variety of infrastructure platforms.

·         Information Security Incident Management: Assist with developing 
enhancements to existing incident management processes

 

 


  Thanks.

  Kevin*Patel*

   

  Ph No:- 980-819-0687

  E-mail:- ke...@riderconsultinginc.com    

  G-Talk : kevinpatel.ri...@gmail.com                                           
            


  Web Site :- www.riderconsultinginc.com

 

-- 
You received this message because you are subscribed to the Google Groups "Open 
Source Erp & Crm" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to open-source-erp-crm+unsubscr...@googlegroups.com.
To post to this group, send email to open-source-erp-crm@googlegroups.com.
Visit this group at http://groups.google.com/group/open-source-erp-crm.
For more options, visit https://groups.google.com/d/optout.

Reply via email to