*Hi Partners,* ** *Greetings,* ** *Hope you are doing Well!!!!!!!!!!!!!!!* ** *Please forward a profiles to **shan...@techconsultinc.com*<shan...@techconsultinc.com> ** *Here are the requirement details*
*POSITION #1* Security Analyst x 2 Duration- 3 mo contract Plymouth, MN (Information Risk Management) UnitedHealth Group and its affiliates understand and take seriously our responsibility to protect confidential and proprietary information and to maintain the availability and integrity of information systems and assets. This commitment is integral to ensuring innovation flourishes in our company allowing us to go forward in our mission of making healthcare work for everyone. Our current security and privacy practices must ensure that the appropriate level of controls exist to protect the integrity, confidentiality and availability of our information assets and their delivery systems. Advanced persistent threats (APTs), or blended threats, where different types of malicious software are used in combination with social engineering and other attack vectors, are rapidly evolving the threat landscape. Malware is becoming more complex, architectural changes create new vulnerabilities, and attackers are willing to focus their efforts on specific companies. As the value of intelligence held within the healthcare data ecosystem becomes better understood, UnitedHealth Group will become a prominent target for attackers. Maintaining this obligation requires the development of an effective Counter Threat function inherent in the security fabric of UnitedHealth Group. To develop and advance this function within the enterprise, we are requesting two contracted resources be procured for the Information Risk Management team. The function of the contracted resources would include, but not be limited to: – Develop processes to gather threat intelligence across industries, to detect those that may impact UHG’s infrastructure and services. – Develop a process to classify emerging threats into a taxonomy. – Conduct advanced counter intelligence analysis, simulate adversary activity and consult on outcomes. – Develop processes that integrate the counter intelligence activities with the security incident response. – Develop role based awareness process that can be used to communicate emerging threats. – Identify and create procedures to utilize unstructured analysis tools to detect and respond to advanced or complicated threats. – Analyze internal metrics and provide consultation on patterns and trends. – Develop integrated procedures to manage threats evolving internal UHG capabilities and teams within IRM and beyond (e.g. Security Services, Corporate Security, UCC, Computer Services, and Privacy Office) – Develop training materials to teach incident and event handlers management tactics for advanced threats. The engagement period requested is August 1, 2011 through November 30, 2011. Additional funding for 2012 activity to be determined as the program evolves. * * *POSITION #2* Security Consultant Duration- 4mo contract St Louis Park ( System Safety and Security) * * Monitor RSA SecurID token logs for alerts and validate failed user authentication attempts that are logged to our Security Incident and Event Management (SIEM) tool. * * *POSITION #3* Security Consultant Duration- 5mo contract Plymouth, MN (Information Risk Management) UnitedHealth Group is seeking a Sr. IT Security Consultant that will support the Strong Authentication platform. The successful applicant will provide assistance with the design, implementation and maintenance of the strong authentication infrastructure. This member will be sought out as an IT Security expert who is results oriented, innovative and have experience leading edge technologies in a fast-paced growth focused organization. This job requires strong communication skills, a positive attitude an exceptional technical skills. Qualifications: • Extensive knowledge and experience with RSA Strong Authentication technology • 4+ years of security experience with expertise in Remote Network Access, LDAP Directory Servers, Internet and Networking Protocols, Network and Network Security Applications, TACACS and RADIUS protocols • Strong in-depth technical knowledge in security engineering, computer and network security, authentication and security protocols • Excellent verbal and written communication skills. • No direct management responsibilities; but highly accountable for the quality, effectiveness and timeliness of assigned projects • Provide a process driven approach to ensure accuracy and consistency within change activity. • Large enterprise security planning project experience. • Experience with an enterprise change control processes. • Extensive operating systems experience. * * -- Regards, Shankar 248-522-6879 Technology consultanst inc -- You received this message because you are subscribed to the Google Groups "SAP ABAP" group. To post to this group, send email to sap-abap@googlegroups.com. To unsubscribe from this group, send email to sap-abap+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/sap-abap?hl=en.