most important info is bolded:
-SIEM logging with LogRhythm -checking alerts and monitoring -vulnerabilty scans Plano, TX with Rent a Center, Security Analyst - Ensuring that all existing and newly developed business applications and all external connections include adequate security control measures. Gaining widespread support of and compliance with information security requirements. Regularly monitors compliance through log reviews; responding to intrusion alerts, etc. Serving as the technical lead on the Incident Response Team in responding to various security incidents such as denial of service attacks, virus/worm infestations, and questionable internal activities. Working with others, evaluating commercial information security products and services to determine which of these should be adopted by or tested by the company. Providing special technical guidance and recommendations to co-workers about the risks and control measures associated with new and emerging information system technologies. Participating in, and acting as a technical leader in periodic information systems risk assessments including those of new or significantly enhanced business applications and their underlying supporting infrastructures. Assisting in the preparation and periodic update of information security policies, architectures, standards and other technical requirements documents needed to enhance security. Assisting with the selection, installation and adoption of automated tools that enforce or monitor the compliance with information security policies, procedures, standards and similar information security requirements. Identifying and determining causes of security violations and leading in the corrective actions to assure data and infrastructure security. JOB REQUIREMENTS: Bachelor’s degree in related field – not necessary One to three years relevant work experience Experience working with *Websense, Tipping Point, Blue Coat, Trend Micro, Symantec, Cisco IOS, IDS/IPS, anti-virus software and MS Windows 20XX/XP/2003, Unix/Linux systems, Proofpoint, Vmware, AWS cloud, Alert Logic. Familiar with McAfee vs Symantec that ok, but they will use Symantec.* People willing to learn new, put in effort to figure things out. Demonstrated understanding of security business controls, strategies, and methodologies as well as knowledge and experience with at least some of the following technologies; firewalls; intrusion detection; directory services; web access controls; advanced authentication methods; public key infrastructure (PKI); VPN; TCP/IP; anti-malware, single sign on; and audit; diagnostics, Log Rhythm, and forensic tools. Must be competent to work at a high technical level of all phases of architectural design and implementation by processing a broad understanding of networks, computers, communication systems, threats and vulnerabilities and their interrelationships. Must be familiar with the current regulatory environment such as Sarbanes-Oxley, GLBA, etc. *Thanks and Regards,* *Warm Regards,* *Randhir Kumar* *IDC Technologies* *1851 McCarthy Blvd. Suite 116, Milpitas, CA 95035* *Email: **randhir.ku...@idctechnologies.com* <randhir.ku...@idctechnologies.com> *Phone: * *408-459-1535 Web: **www.idctechnologies.com* <http://www.idctechnologies.com/> -- You received this message because you are subscribed to the Google Groups "SAP or Oracle Financials" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-or-oracle-financials+unsubscr...@googlegroups.com. To post to this group, send email to sap-or-oracle-financials@googlegroups.com. Visit this group at https://groups.google.com/group/sap-or-oracle-financials. For more options, visit https://groups.google.com/d/optout.