Network Security - Intrusion Detection Needed @ Kansas City, MO
*REPLY TO har...@jmastaffing.com ASAP!!* Hi , Greetings of the day!! We have a *Network Security - Intrusion Detection* position available at *Kansas City, MO* that I believe you would be qualified for. I have included the job description below. JMA Information Technology is an IT consulting firm, headquartered in Overland Park, KS. Our areas of expertise includes: Network Design and Security, Voice, Video and Data Infrastructure, Performance Analysis and Improvement, Maintenance Service, Software Development, Project Management, and Staff Augmentation. I look forward to speaking to you at your earliest convenience to discuss your possible future with JMA. Please attach your word formatted resume and give me a call at your earliest convenience. My contact information is below. *Position: Network Security - Intrusion Detection* *Location: Kansas City, MO * *Duration: **Long Term Contract (3+ Years)* *Network Security - Intrusion Detection* This position is located on the Network Security Staff of the National Information Technology Center (NITC). Incumbent is an intermediate level security analyst I engineer and functions as a subject matter expert supporting the following NITC security systems: • Responsibilities include installation, administration, monitoring, operation, analysis, maintenance, and reporting of the Host Based Intrusion Detection and Intrusion Prevention Systems (HIDS I HIPS) (Cisco Security Agent). The incumbent: · Must have a detailed understanding of Microsoft, Linux, and UNIX operating systems and work with system administrators to strengthen the security posture of server systems. · Documents all aspects of the system for daily operations and disaster recovery, in addition to adherence of federal certification and accreditation requirements. · Provides statistical reporting to illustrate server security improvements. · Must stay current on security skills by attending training annually at the cost of the contracted organization. · Participates in the creation, review and enforcement of security policy, procedures and system documentation. · Evaluates, recommends for acquisition, implements, or disseminates IT security tools, procedures, and practices to protect organizational systems. · Updates system contingency or disaster recovery plans. · Conducts security system and documentation reviews for managed systems. · Analyzes systems performance of new and existing equipment. · Provides knowledge transfer to government counterparts • In a backup capacity, responsibilities include installation, administration, operation, analysis, maintenance, and reporting of the Network Intrusion Detection I Prevention Systems (NIDS I NIPS) (Enterasys Dragon). · Must have a detailed understanding of networks and work with government security & network administrators to strengthen the security posture of the enterprise. · Documents all aspects of the system for daily operations and disaster recovery in addition to adherence of federal certification and accreditation requirements. · Provides statistical reporting to illustrate enterprise security improvements. · Must stay current on security skills by attending training annually at the cost of the contracted organization. · Participates in the creation, review and enforcement of security policy, procedures and system documentation. · Evaluates, recommends for acquisition, implements, or disseminates IT security tools, procedures, and practices to protect organizational systems. · Updates system contingency or disaster recovery plans. · Conducts security system and documentation reviews for managed systems. · Analyzes systems performance of new and existing equipment. · Provides knowledge transfer to government counterparts • In a backup capacity, responsibilities include installation, administration, operation, analysis, maintenance, and reporting of the future Security Information Management System (SIMS). · Must have an understanding of system log management and retention to strengthen the security posture of the enterprise. · Documents all aspects of the system for daily operations and disaster recovery in addition to adherence of federal certification and accreditation requirements. · Provides statistical reporting to illustrate enterprise security improvements. · Must stay current on security skills by attending training annually at the cost of the contracted organization. · Participates in the creation, review and enforcement of security policy, procedures and system documentation. · Evaluates, recommends for acquisition, implements, or disseminates IT security tools, procedures, and practices to protect organizational systems. · Updates system contingency or disaster recover
Network Security - Intrusion Detection Needed @ Kansas City, MO
*REPLY TO har...@jmastaffing.com ASAP!!* Hi , Greetings of the day!! We have a *Network Security - Intrusion Detection* position available at *Kansas City, MO* that I believe you would be qualified for. I have included the job description below. JMA Information Technology is an IT consulting firm, headquartered in Overland Park, KS. Our areas of expertise includes: Network Design and Security, Voice, Video and Data Infrastructure, Performance Analysis and Improvement, Maintenance Service, Software Development, Project Management, and Staff Augmentation. I look forward to speaking to you at your earliest convenience to discuss your possible future with JMA. Please attach your word formatted resume and give me a call at your earliest convenience. My contact information is below. *Position: Network Security - Intrusion Detection* *Location: Kansas City, MO * *Duration: **Long Term Contract (3+ Years)* *Network Security - Intrusion Detection* This position is located on the Network Security Staff of the National Information Technology Center (NITC). Incumbent is an intermediate level security analyst I engineer and functions as a subject matter expert supporting the following NITC security systems: • Responsibilities include installation, administration, monitoring, operation, analysis, maintenance, and reporting of the Host Based Intrusion Detection and Intrusion Prevention Systems (HIDS I HIPS) (Cisco Security Agent). The incumbent: · Must have a detailed understanding of Microsoft, Linux, and UNIX operating systems and work with system administrators to strengthen the security posture of server systems. · Documents all aspects of the system for daily operations and disaster recovery, in addition to adherence of federal certification and accreditation requirements. · Provides statistical reporting to illustrate server security improvements. · Must stay current on security skills by attending training annually at the cost of the contracted organization. · Participates in the creation, review and enforcement of security policy, procedures and system documentation. · Evaluates, recommends for acquisition, implements, or disseminates IT security tools, procedures, and practices to protect organizational systems. · Updates system contingency or disaster recovery plans. · Conducts security system and documentation reviews for managed systems. · Analyzes systems performance of new and existing equipment. · Provides knowledge transfer to government counterparts • In a backup capacity, responsibilities include installation, administration, operation, analysis, maintenance, and reporting of the Network Intrusion Detection I Prevention Systems (NIDS I NIPS) (Enterasys Dragon). · Must have a detailed understanding of networks and work with government security & network administrators to strengthen the security posture of the enterprise. · Documents all aspects of the system for daily operations and disaster recovery in addition to adherence of federal certification and accreditation requirements. · Provides statistical reporting to illustrate enterprise security improvements. · Must stay current on security skills by attending training annually at the cost of the contracted organization. · Participates in the creation, review and enforcement of security policy, procedures and system documentation. · Evaluates, recommends for acquisition, implements, or disseminates IT security tools, procedures, and practices to protect organizational systems. · Updates system contingency or disaster recovery plans. · Conducts security system and documentation reviews for managed systems. · Analyzes systems performance of new and existing equipment. · Provides knowledge transfer to government counterparts • In a backup capacity, responsibilities include installation, administration, operation, analysis, maintenance, and reporting of the future Security Information Management System (SIMS). · Must have an understanding of system log management and retention to strengthen the security posture of the enterprise. · Documents all aspects of the system for daily operations and disaster recovery in addition to adherence of federal certification and accreditation requirements. · Provides statistical reporting to illustrate enterprise security improvements. · Must stay current on security skills by attending training annually at the cost of the contracted organization. · Participates in the creation, review and enforcement of security policy, procedures and system documentation. · Evaluates, recommends for acquisition, implements, or disseminates IT security tools, procedures, and practices to protect organizational systems. · Updates system contingency or disaster recover