Network Security - Intrusion Detection Needed @ Kansas City, MO

2012-08-17 Thread Harish Vummidi
*REPLY TO har...@jmastaffing.com ASAP!!*


Hi ,



Greetings of the day!!



We have a *Network Security - Intrusion Detection* position available
at *Kansas
City, MO* that I believe you would be qualified for. I have included the
job description below.

JMA Information Technology is an IT consulting firm, headquartered in
Overland Park, KS.   Our areas of expertise includes: Network Design and
Security, Voice, Video and Data Infrastructure, Performance Analysis and
Improvement, Maintenance Service, Software Development, Project Management,
and Staff Augmentation.



I look forward to speaking to you at your earliest convenience to discuss
your possible future with JMA. Please attach your word formatted resume and
give me a call at your earliest convenience.  My contact information is
below.



*Position: Network Security - Intrusion Detection*

*Location: Kansas City, MO  *

*Duration: **Long Term Contract (3+ Years)*



*Network Security - Intrusion Detection*

This position is located on the Network Security Staff of the National
Information Technology Center (NITC). Incumbent is an intermediate level
security analyst I engineer and functions as a subject matter expert
supporting the following NITC security systems:



• Responsibilities include installation, administration, monitoring,
operation, analysis, maintenance, and reporting of the Host Based Intrusion
Detection and

Intrusion Prevention Systems (HIDS I HIPS) (Cisco Security Agent). The
incumbent:

· Must have a detailed understanding of Microsoft, Linux, and UNIX
operating systems and work with system administrators to strengthen the
security posture of server systems.

· Documents all aspects of the system for daily operations and
disaster recovery, in addition to adherence of federal certification and
accreditation requirements.

· Provides statistical reporting to illustrate server security
improvements.

· Must stay current on security skills by attending training
annually at the cost of the contracted organization.

· Participates in the creation, review and enforcement of security
policy, procedures and system documentation.

· Evaluates, recommends for acquisition, implements, or
disseminates IT security tools, procedures, and practices to protect
organizational systems.

· Updates system contingency or disaster recovery plans.

· Conducts security system and documentation reviews for managed
systems.

· Analyzes systems performance of new and existing equipment.

· Provides knowledge transfer to government counterparts



• In a backup capacity, responsibilities include installation,
administration, operation, analysis, maintenance, and reporting of the
Network Intrusion Detection I Prevention Systems (NIDS I NIPS) (Enterasys
Dragon).

· Must have a detailed understanding of networks and work with
government security & network administrators to strengthen the security
posture of the enterprise.

· Documents all aspects of the system for daily operations and
disaster recovery in addition to adherence of federal certification and
accreditation requirements.

· Provides statistical reporting to illustrate enterprise security
improvements.

· Must stay current on security skills by attending training
annually at the cost of the contracted organization.

· Participates in the creation, review and enforcement of security
policy, procedures and system documentation.

· Evaluates, recommends for acquisition, implements, or
disseminates IT security tools, procedures, and practices to protect
organizational systems.

· Updates system contingency or disaster recovery plans.

· Conducts security system and documentation reviews for managed
systems.

· Analyzes systems performance of new and existing equipment.

· Provides knowledge transfer to government counterparts



• In a backup capacity, responsibilities include installation,
administration, operation, analysis, maintenance, and reporting of the
future Security Information Management System (SIMS).

· Must have an understanding of system log management and retention
to strengthen the security posture of the enterprise.

· Documents all aspects of the system for daily operations and
disaster recovery in addition to adherence of federal certification and
accreditation requirements.

· Provides statistical reporting to illustrate enterprise security
improvements.

· Must stay current on security skills by attending training
annually at the cost of the contracted organization.

· Participates in the creation, review and enforcement of security
policy, procedures and system documentation.

· Evaluates, recommends for acquisition, implements, or
disseminates IT security tools, procedures, and practices to protect
organizational systems.

· Updates system contingency or disaster recover

Network Security - Intrusion Detection Needed @ Kansas City, MO

2012-08-15 Thread Harish Vummidi
*REPLY TO har...@jmastaffing.com ASAP!!*


Hi ,



Greetings of the day!!



We have a *Network Security - Intrusion Detection* position available
at *Kansas
City, MO* that I believe you would be qualified for. I have included the
job description below.

JMA Information Technology is an IT consulting firm, headquartered in
Overland Park, KS.   Our areas of expertise includes: Network Design and
Security, Voice, Video and Data Infrastructure, Performance Analysis and
Improvement, Maintenance Service, Software Development, Project Management,
and Staff Augmentation.



I look forward to speaking to you at your earliest convenience to discuss
your possible future with JMA. Please attach your word formatted resume and
give me a call at your earliest convenience.  My contact information is
below.



*Position: Network Security - Intrusion Detection*

*Location: Kansas City, MO  *

*Duration: **Long Term Contract (3+ Years)*



*Network Security - Intrusion Detection*

This position is located on the Network Security Staff of the National
Information Technology Center (NITC). Incumbent is an intermediate level
security analyst I engineer and functions as a subject matter expert
supporting the following NITC security systems:



• Responsibilities include installation, administration, monitoring,
operation, analysis, maintenance, and reporting of the Host Based Intrusion
Detection and

Intrusion Prevention Systems (HIDS I HIPS) (Cisco Security Agent). The
incumbent:

· Must have a detailed understanding of Microsoft, Linux, and UNIX
operating systems and work with system administrators to strengthen the
security posture of server systems.

· Documents all aspects of the system for daily operations and
disaster recovery, in addition to adherence of federal certification and
accreditation requirements.

· Provides statistical reporting to illustrate server security
improvements.

· Must stay current on security skills by attending training
annually at the cost of the contracted organization.

· Participates in the creation, review and enforcement of security
policy, procedures and system documentation.

· Evaluates, recommends for acquisition, implements, or
disseminates IT security tools, procedures, and practices to protect
organizational systems.

· Updates system contingency or disaster recovery plans.

· Conducts security system and documentation reviews for managed
systems.

· Analyzes systems performance of new and existing equipment.

· Provides knowledge transfer to government counterparts



• In a backup capacity, responsibilities include installation,
administration, operation, analysis, maintenance, and reporting of the
Network Intrusion Detection I Prevention Systems (NIDS I NIPS) (Enterasys
Dragon).

· Must have a detailed understanding of networks and work with
government security & network administrators to strengthen the security
posture of the enterprise.

· Documents all aspects of the system for daily operations and
disaster recovery in addition to adherence of federal certification and
accreditation requirements.

· Provides statistical reporting to illustrate enterprise security
improvements.

· Must stay current on security skills by attending training
annually at the cost of the contracted organization.

· Participates in the creation, review and enforcement of security
policy, procedures and system documentation.

· Evaluates, recommends for acquisition, implements, or
disseminates IT security tools, procedures, and practices to protect
organizational systems.

· Updates system contingency or disaster recovery plans.

· Conducts security system and documentation reviews for managed
systems.

· Analyzes systems performance of new and existing equipment.

· Provides knowledge transfer to government counterparts



• In a backup capacity, responsibilities include installation,
administration, operation, analysis, maintenance, and reporting of the
future Security Information Management System (SIMS).

· Must have an understanding of system log management and retention
to strengthen the security posture of the enterprise.

· Documents all aspects of the system for daily operations and
disaster recovery in addition to adherence of federal certification and
accreditation requirements.

· Provides statistical reporting to illustrate enterprise security
improvements.

· Must stay current on security skills by attending training
annually at the cost of the contracted organization.

· Participates in the creation, review and enforcement of security
policy, procedures and system documentation.

· Evaluates, recommends for acquisition, implements, or
disseminates IT security tools, procedures, and practices to protect
organizational systems.

· Updates system contingency or disaster recover