Hi, Hope you are doing good, I have below direct client requirement. let me know if you have any one available. *Replay to sw...@genuineitllc.com <sw...@genuineitllc.com>*
*Cyber Security Consultant* *12 months * *San Francisco, C**A* *Must be local to San Fran* *CYBER SECURITY CANDIDATE* · *Must have good cyber** security domain knowledge, but doesn’t necessarily need to be a CISSP (preferred)* · Ability to interpret 2700x requirements and conformance criteria · Ability to lead and manage the work of others to produce the needed results · Having some auditor/assessor training is a plus · Tool and platform specific knowledge · Must be detail oriented (for recording results) · Sys Admin skills to do necessary configuration checks, as directed · Knowledge on Asset Management · To carry out health check against ISO 27001 best practices. · Craft 27001 policies around customer’s security environment ( approx. . 50 ) · Audit of current IT Infrastructure as per below: · Overall o Number of locations ( data center, data closet, data service operation/any place (where there is an asset ) o Number of personnel served ( internal customers / external customers ) · Describe the network architecture & add to existing topologies. · How many of each do you have in the estate( actively managing ) ? discuss reliability & accuracy of the cmdb & whether the asset management has been refreshed recently. · Assist Customer with configuration and asset management. o Servers (by flavor) § Virtual § Physical o Firewalls/Access Points o Switches o Routers o Appliances (by usage/category): security / storage / applications o Storage § Types/tiers § Sizes o etc. · Asset management program o Refresh policy o How are assets tracked? frequency of refresh · External data services (describe and document each)webex, telecom, data pipes/sources, bandwidth, ,,...the usage of the topology. o How many do you utilize? § Inbound? § Outbound? § Both? o What are they for? · Specialized tools and services (describe and document) o Asset management ( other tools used by Finance for depreciation, etc., etc. o Access control ( IT) o Physical security o Security management tools o Backup and restore o Cryptography o Voice/Video o Other *With Regards* Swamy Technical Recruiter Genuineit LLC Making IT Happen… [image: Description: Description: Description: Description: cid:image001.png@01CD0B34.DFB7EBF0] Desk: *713.230.8558 Ex 101 || *Fax: 281 605 5969 Email: sw...@genuineitllc.com Hangout: swamyrecruiting [image: Description: Description: cid:image004.png@01CDB5D0.74A7EE40] According to Bill S.1618 Title III passed by the 105th US Congress,this message is not considered as "Spam" as we have included the contact information.If you wish to be removed from our mailing list, please respond with "remove" in the subject field. We apologize for any inconvenience caused. -- You received this message because you are subscribed to the Google Groups "SAP Workflow" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-workflow+unsubscr...@googlegroups.com. To post to this group, send email to sap-workflow@googlegroups.com. Visit this group at https://groups.google.com/group/sap-workflow. For more options, visit https://groups.google.com/d/optout.