*Hi Partners,*
**
*Greetings,*
**
*Hope you are doing Well!!!!!!!!!!!!!!!*
**
*Please forward a profiles to
**shan...@techconsultinc.com*<shan...@techconsultinc.com>
**
*Here are the requirement details*


*POSITION #1*




Security Analyst x 2

Duration- 3 mo contract

Plymouth, MN (Information Risk Management)



UnitedHealth Group and its affiliates understand and take seriously our
responsibility to protect confidential and proprietary information and to
maintain the availability and integrity of information systems and assets.
This commitment is integral to ensuring innovation flourishes in our company
allowing us to go forward in our mission of making healthcare work for
everyone.

Our current security and privacy practices must ensure that the appropriate
level of controls exist to protect the integrity, confidentiality and
availability of our information assets and their delivery systems. Advanced
persistent threats (APTs), or blended threats, where different types of
malicious software are used in combination with social engineering and other
attack vectors, are rapidly evolving the threat landscape. Malware is
becoming more complex, architectural changes create new vulnerabilities, and
attackers are willing to focus their efforts on specific companies. As the
value of intelligence held within the healthcare data ecosystem becomes
better understood, UnitedHealth Group will become a prominent target for
attackers.

Maintaining this obligation requires the development of an effective Counter
Threat function inherent in the security fabric of UnitedHealth Group. To
develop and advance this function within the enterprise, we are requesting
two contracted resources be procured for the Information Risk Management
team.

The function of the contracted resources would include, but not be limited
to:
– Develop processes to gather threat intelligence across industries, to
detect those that may impact UHG’s infrastructure and services.
– Develop a process to classify emerging threats into a taxonomy.
– Conduct advanced counter intelligence analysis, simulate adversary
activity and consult on outcomes.
– Develop processes that integrate the counter intelligence activities with
the security incident response.
– Develop role based awareness process that can be used to communicate
emerging threats.
– Identify and create procedures to utilize unstructured analysis tools to
detect and respond to advanced or complicated threats.
– Analyze internal metrics and provide consultation on patterns and trends.
– Develop integrated procedures to manage threats evolving internal UHG
capabilities and teams within IRM and beyond (e.g. Security Services,
Corporate Security, UCC, Computer Services, and Privacy Office)
– Develop training materials to teach incident and event handlers management
tactics for advanced threats.

The engagement period requested is August 1, 2011 through November 30, 2011.
Additional funding for 2012 activity to be determined as the program
evolves.

* *

*POSITION #2*




Security Consultant

Duration- 4mo contract

St Louis Park ( System Safety and Security)

* *

Monitor RSA SecurID token logs for alerts and validate failed user
authentication attempts that are logged to our Security Incident and Event
Management (SIEM) tool.

* *

*POSITION #3*



Security Consultant

Duration- 5mo contract

Plymouth, MN (Information Risk Management)







UnitedHealth Group is seeking a Sr. IT Security Consultant that will support
the Strong Authentication platform. The successful applicant will provide
assistance with the design, implementation and maintenance of the strong
authentication infrastructure. This member will be sought out as an IT
Security expert who is results oriented, innovative and have experience
leading edge technologies in a fast-paced growth focused organization. This
job requires strong communication skills, a positive attitude an exceptional
technical skills.


Qualifications:
• Extensive knowledge and experience with RSA Strong Authentication
technology
• 4+ years of security experience with expertise in Remote Network Access,
LDAP Directory Servers, Internet and Networking Protocols, Network and
Network Security Applications, TACACS and RADIUS protocols
• Strong in-depth technical knowledge in security engineering, computer and
network security, authentication and security protocols
• Excellent verbal and written communication skills.
• No direct management responsibilities; but highly accountable for the
quality, effectiveness and timeliness of assigned projects
• Provide a process driven approach to ensure accuracy and consistency
within change activity.
• Large enterprise security planning project experience.
• Experience with an enterprise change control processes.
• Extensive operating systems experience.

* *
-- 
Regards,

Shankar
248-522-6879
Technology consultanst inc

-- 
You received this message because you are subscribed to the Google Groups "SAP 
ABAP" group.
To post to this group, send email to sap-abap@googlegroups.com.
To unsubscribe from this group, send email to 
sap-abap+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/sap-abap?hl=en.

Reply via email to