** Client: State of Alabama**

**Need Expert or Strong Senior Most Consultant**



*Position: Network Security Engineer*

*Location: Montgomery, AL*

*Duration: 12-36 months*

*Rate: $55/hr C2C Max*



The *Network Security Engineer *position will be responsible for designing,
implementing, maintaining, and supporting web application firewalls and
other security devices within the Agency in order to ensure the integrity
of high availability security infrastructure for maximum performance and
stability of critical applications & services.



*Minimum Requirements:*

*• **Security oriented advanced certifications such as CISSP, CISA, CISM,
SANS GCIH\GCED, CASP, etc.*

*• Professional CE Systems Certification (MCSE, MCITP:EA, VCP, CCNP, or
similar) is required *

* • 3-5 years of Information Security Experience  • 7-10 years of
Enterprise IT Systems Experience *

*• Advanced p*
*roficiency in managing web application firewalls, intrusion detection \
prevention systems • Proficient knowledge of cryptographic systems and key
management*
• Advanced knowledge of Host-based security end-point management

• Advanced knowledge of data encryption tools such as Bitlocker, McAfee
Endpoint Protection, etc
• Advanced knowledge of Cloud Computing and Virtual Services
• Subject Matter Expert knowledge of Patch Management Tools such as:
Microsoft SCCM, WSUS, etc
• Subject Matter Expert knowledge of Computer and Server Operating Systems
and hardening
• Subject Matter Expert knowledge of Microsoft Active Directory GPOs



This includes:

§  Provides Subject Matter Expert performance of engineering, operations,
implementation, and maintenance of all Information Security-related systems
architecture to include: Firewalls, IPS\IDS, Domain Structures, Virtual
Services, Host-based Malware Defense and Management, Patch Management, and
OS hardening.

   - Implement, communicate and enforce the organization's security
   policies.  Responsible for developing additional feedback for the ongoing
   IT security awareness.
   - Perform periodic security compliance auditing, assessments and reviews
   for evidence of vulnerability or compromise and assists in/facilitates the
   implementation of a resolution.
   - Respond to IT security incidents, providing initial assessment of
   impact severity and types of incidences being addressed. Coordinates
   resolution efforts for reporting to management personnel for critical or
   serious incidents.
   - Monitor computing resources for evidence of compromise, responding to
   security incidents. Analyzes compromised computing resources to improve
   security design, policy compliance, and to understand and document new
   threat profiles.  Monitors and enforces compliance with security policies,
   standards and guidelines. Prepare reports for presentation to management.

 *Regards,*

*Rahman,       *

*Sr Resource Recruiter*

*rahm...@usmsystems.com <rahm...@usmsystems.com>*

*703 246 1849*

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-abap+unsubscr...@googlegroups.com.
To post to this group, send email to sap-abap@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-abap.
For more options, visit https://groups.google.com/d/optout.

Reply via email to