Hi,
Hope you are doing good,
I have below direct client requirement. let me know if you have any one
available. *Replay to sw...@genuineitllc.com <sw...@genuineitllc.com>*

*Cyber Security Consultant*
*12 months *
*San Francisco, C**A*
*Must be local to San Fran*

*CYBER SECURITY CANDIDATE*
·         *Must have good cyber** security domain knowledge, but doesn’t
necessarily need to be a CISSP (preferred)*
·         Ability to interpret 2700x requirements and conformance criteria
·         Ability to lead and manage the work of others to produce the
needed results
·         Having some auditor/assessor training is a plus
·         Tool and platform specific knowledge
·         Must be detail oriented (for recording results)
·         Sys Admin skills to do necessary configuration checks, as directed
·         Knowledge on Asset Management
·         To carry out health check against ISO 27001 best practices.
·         Craft 27001 policies around customer’s security environment (
approx. . 50 )
·         Audit of current IT Infrastructure as per below:
·         Overall
o   Number of locations ( data center, data closet, data service
operation/any place (where there is an asset )
o   Number of personnel served ( internal customers / external customers )
·         Describe the network architecture  & add to existing topologies.
·         How many of each do you have in the estate( actively managing ) ?
discuss reliability  & accuracy of the cmdb & whether the asset management
has been refreshed recently.
·         Assist Customer with configuration and asset management.
o   Servers (by flavor)
§  Virtual
§  Physical
o   Firewalls/Access Points
o   Switches
o   Routers
o   Appliances (by usage/category): security / storage / applications
o   Storage
§  Types/tiers
§  Sizes
o   etc.
·         Asset management program
o   Refresh policy
o   How are assets tracked? frequency of refresh
·         External data services (describe and document each)webex,
telecom, data pipes/sources, bandwidth, ,,...the usage of the topology.
o   How many do you utilize?
§  Inbound?
§  Outbound?
§  Both?
o   What are they for?
·         Specialized tools and services (describe and document)
o   Asset management ( other tools used by Finance for depreciation, etc.,
etc.
o   Access control ( IT)
o   Physical security
o   Security management tools
o   Backup and restore
o   Cryptography
o   Voice/Video
o   Other

*With Regards*
Swamy
Technical Recruiter
Genuineit LLC
Making IT Happen…
[image: Description: Description: Description: Description:
cid:image001.png@01CD0B34.DFB7EBF0]
Desk: *713.230.8558 Ex 101 || *Fax: 281 605 5969
Email: sw...@genuineitllc.com
Hangout: swamyrecruiting

[image: Description: Description: cid:image004.png@01CDB5D0.74A7EE40]
According to Bill S.1618 Title III passed by the 105th US Congress,this
message is not considered as "Spam" as we have included the contact
information.If you wish to be removed from our mailing list, please respond
with "remove" in the subject field. We apologize for any inconvenience
caused.

-- 
You received this message because you are subscribed to the Google Groups "SAP 
Workflow" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-workflow+unsubscr...@googlegroups.com.
To post to this group, send email to sap-workflow@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-workflow.
For more options, visit https://groups.google.com/d/optout.

Reply via email to