most important info is bolded:


-SIEM logging with LogRhythm

-checking alerts and monitoring

-vulnerabilty scans





Plano, TX with Rent a Center, Security Analyst  -



Ensuring that all existing and newly developed business applications and
all external connections include adequate security control measures.

Gaining widespread support of and compliance with information security
requirements.  Regularly monitors compliance through log reviews;
responding to intrusion alerts, etc.

Serving as the technical lead on the Incident Response Team in responding
to various security incidents such as denial of service attacks, virus/worm
infestations, and questionable internal activities.

Working with others, evaluating commercial information security products
and services to determine which of these should be adopted by or tested by
the company.

Providing special technical guidance and recommendations to co-workers
about the risks and control measures associated with new and emerging
information system technologies.

Participating in, and acting as a technical leader in periodic information
systems risk assessments including those of new or significantly enhanced
business applications and their underlying supporting infrastructures.

Assisting in the preparation and periodic update of information security
policies, architectures, standards and other technical requirements
documents needed to enhance security.

Assisting with the selection, installation and adoption of automated tools
that enforce or monitor the compliance with information security policies,
procedures, standards and similar information security requirements.

Identifying and determining causes of security violations and leading in
the corrective actions to assure data and infrastructure security.





JOB REQUIREMENTS:



Bachelor’s degree in related field – not necessary

One to three years relevant work experience

Experience working with *Websense, Tipping Point, Blue Coat, Trend Micro,
Symantec, Cisco IOS, IDS/IPS, anti-virus software and MS Windows
20XX/XP/2003, Unix/Linux systems, Proofpoint, Vmware, AWS cloud, Alert
Logic.  Familiar with McAfee vs Symantec that ok, but they will use
Symantec.*

People willing to learn new, put in effort to figure things out.

Demonstrated understanding of security business controls, strategies, and
methodologies as well as knowledge and experience with at least some of the
following technologies; firewalls; intrusion detection; directory services;
web access controls; advanced authentication methods; public key
infrastructure (PKI); VPN; TCP/IP; anti-malware, single sign on; and audit;
diagnostics, Log Rhythm, and forensic tools.

Must be competent to work at a high technical level of all phases of
architectural design and implementation by processing a broad understanding
of networks, computers, communication systems, threats and vulnerabilities
and their interrelationships.

Must be familiar with the current regulatory environment such as
Sarbanes-Oxley, GLBA, etc.





*Thanks and Regards,*



*Warm Regards,*

*Randhir Kumar*

*IDC Technologies*

*1851 McCarthy Blvd. Suite 116, Milpitas, CA 95035*

*Email: **randhir.ku...@idctechnologies.com*
<randhir.ku...@idctechnologies.com>

*Phone: *
*408-459-1535 Web: **www.idctechnologies.com*
<http://www.idctechnologies.com/>

-- 
You received this message because you are subscribed to the Google Groups "SAP 
or Oracle Financials" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-or-oracle-financials+unsubscr...@googlegroups.com.
To post to this group, send email to sap-or-oracle-financials@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-or-oracle-financials.
For more options, visit https://groups.google.com/d/optout.

Reply via email to