*Good Morning,*
I hope you are well! I wanted to inform you of an excellent job opportunity that has become available with one of our Direct Clients. They are looking for a * Network Engineer* *Job Title: Application Security Tester (Phone then Face to Face)* *Location: Washington DC* *Duration: 3 month +* *Job Description:* *Summary: *Responsible for ensuring the security of Internet-based applications by interacting with software engineers, quality assurance testers, business analysts, and software application managers throughout the entire software lifecycle. Provides direct support to the business and IT projects for security related issues. Educates IT and the business about security policies and consults on security issues. Enforces security policies and procedures by administering and monitoring security profiles, reviewing security violation reports and investigating possible security violations. Involved in the evaluation of security products and/or procedures to enhance productivity and effectiveness. Here are the test types that the security test contractor may need to perform: · Ad-hoc Pen Test · Planned Pen Test · Release Testing · Appscan (automated application security test tool) · Appscan Source (automated application security source code evaluation tool) · Manual Cod Review *1) **List the minimum qualifications necessary for this position:* *a) **Number of years and type of education and training:* - Bachelor's degree in computer science, information systems or related field required. *b) **Number of years and type of practical experience:* - 5-7 years of IT work experience, with at least 3 years' experience in software development or network security testing. - Previous system administrator or software developer experience desired. *c) **Any special knowledge or skills:* - ISO27001 training highly desired. - COBIT and/or ITIL Foundation Certification highly desired. - CISSP, CIPP, CISM, CISA, CRISC or equivalent industry certifications desired. - Demonstrated strong analytical ability and technology related experience performing problem resolution. - Excellent oral and written communication skills required including ability to make effective presentations and create documentation and reporting artifacts. - Excellent desktop skills in Microsoft Office products required. - Knowledge of software engineering methodologies, technology architectures, systems integration, emerging technologies, contract management and operations. - Ability to exercise sound judgment in complex situations. *2) **Describe the frequency and complexity of internal and/or external contact with others.* The position requires frequent and close contact with IT staff, other AAMC staff, contractors, consultants and vendors. *3) **Describe the amount of supervision received.* This is a senior technical position and minimal supervision. *4) **List the job titles and functions supervised and describe the degree of supervision:* This position does not provide any supervision. *5) **Describe each duty performed and assign a percentage of total working time to the approximate amount of time spent at each task.* *Percent of Time* *Duties* 65 Analyzes risk, plan and perform security testing for new application systems, business services, and changes, including new 3rd party delivered business services. Record issues and recommend potential solutions. 5 Respond to and, where appropriate, investigate, resolve or escalate reported security incidents. 5 Monitor and ensure the security of databases and data transferred both internally and externally. Review logs and reports for problematic activity and initiate corrective action 5 Monitor and review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, firewalls, business applications, etc.). Interpret the implications of that activity and devise plans for appropriate resolution. 5 Monitor access and authentication controls, end-user accounts, privileged accounts, permissions and access rights. 5 Maintain up-to-date baselines for the secure configuration and operations of all in-place devices and applications, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, business applications, etc.). 5 Recommend, schedule, test, and/or apply fixes, security patches and any other measures required in the event of a security breach or identification of a new vulnerability. 5 Provide data for information security measurements and metrics (key goal indicators, key performance indicators, etc) and create audience appropriate reports. Thanks and Regards *Ashok Kumar | Technical Recruiter* *Email: **as...@svsintegration.com* <apo...@svsintegration.com> *Ph: 408-722-9100 Ext: 101* *www.svsIntegration.com* <http://www.svsintegration.com/> 2033 Gateway Place, Suite 500, San Jose, CA 95110 San Jose | Chicago | New York -- You received this message because you are subscribed to the Google Groups "USITCV" group. To unsubscribe from this group and stop receiving emails from it, send an email to usitcv+unsubscr...@googlegroups.com. To post to this group, send email to usitcv@googlegroups.com. Visit this group at http://groups.google.com/group/usitcv. For more options, visit https://groups.google.com/d/optout.