Send resumes to souja...@icynergyit.com Delaware 6 months +
The focus on three key areas: Description of Information Security Engineer Skill Set Contractor candidate should have a focus on the network engineer skills, but also be able to demonstrate and cover the host and end-point security skills. *1. Information Security Engineer-Network (consultant)* · Ability to design and support network designs for perimeter and internal environments · *Candidate must be able to evaluate and recommend an automated NAC (Network Access Controls) solution and deploy solution into client’s environment * · *Candidate must be able to evaluate and recommend firewall risk assessment tool, such as algosec or firemon, and deploy solution into client’s environment * · *Must be familiarity with designing and implementing internal segmentation and hotel-ing environments * · *Must have strong Cisco and Checkpoint skills. CCNA and/or Checkpoint certifications are preferred. * · *Candidate must build and document requirements, policies, standards, and operational procedures to make the program/tools operational * · *Candidate must be able to present the strengths and weaknesses of each tool evaluated and make recommendations based on his/her research/experiences. * · *Candidate must be innovative with excellent communication skills * · *Candidate must have a sense of urgency and be able to work at a fast pace on a small, delivery-oriented team. * · *Candidate may be working directly with Vendor consultants, senior Information Security Clients Engineer, or other external consultants. * · *CISSP certification required.* 2. Information Security Engineer-Host (consultant) · Experience with HIDS (Host Intrusion Detection Systems) products including Tripwire, Symantec, etc. · *Hands-on experience with Tripwire Enterprise strongly preferred * · *Experience with SSL hardware encryption tools, such as F5 load balancers or HSMs, preferred * · *Candidate must be able to evaluate and recommend a new HIDS product or be able to fully utilize the current HIDS product in client environment. * · *Candidate must be able to evaluate and recommend a new Enterprise Security Management product and deploy solution into client’s environment. * · *Must have strong UNIX and Windows skills (be able knowledgeable in hardening and working in these environments). UNIX scripting skills are preferred. * · *Candidate must be able to present the strengths and weaknesses of each tool evaluated and make recommendations based on his/her research/experiences. * · *Candidate must build and document requirements, policies, standards, and operational procedures to make the program/tools operational * · *Candidate must be innovative with excellent communication skills * · *Candidate must have a sense of urgency and be able to work at a fast pace on a small, delivery-oriented team. * · *Candidate may be working directly with Vendor consultants, senior Information Security clients Engineer, or other external consultants * · *CISSP certification required.* 3. Information Security Engineer-End Point (consultant) · Candidate must have experience with DLP (Data Loss Prevention) tools such as Vontu (Symantec), centralized email encryption such as PGP Universal, and Secure file transfer solutions such as Tumbleweed Secure Transport · *Candidate must be able to work directly on the team for evaluation and recommend deployment for Vontu tool to be fully utilized in client environment. * · *Candidate must be able to work directly on the team for evaluation and recommend deployment for PGP Universal tool to be fully utilized in client environment. * · *Candidate must be able to work directly on the team for evaluation and recommend deployment for Tumbleweed Secure Transfer tool to be fully utilized in client environment. * · *Successful candidate must understand the user community and their functions * · *Experience with encryption tools such as Tumbleweed, PGP Universal, etc. is a must. * · *Must be farmilar with current Windows desktop operating systems. Mac experience preferred. * · *Candidate must build and document requirements, policies, standards, and operational procedures to make the program/tools operational * · *Candidate must be able to present the strengths and weaknesses of each tool evaluated and make recommendations based on his/her research/experiences. * · *Candidate must be able to create the appropriate communicates for these end-users and may be required to provide some end-user training. * · *Candidate must be innovative with excellent communication skills * · *Candidate must have a sense of urgency and be able to work at a fast pace on a small, delivery-oriented team. * --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "zilliontechnologies" group. To post to this group, send email to zilliontechnologies@googlegroups.com To unsubscribe from this group, send email to zilliontechnologies+unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/zilliontechnologies?hl=en -~----------~----~----~----~------~----~------~--~---