Send resumes to souja...@icynergyit.com

Delaware   6 months +



The focus on three key areas:

Description of Information Security Engineer Skill Set

Contractor candidate should have a focus on the network engineer skills, but
also be able to demonstrate and cover the host and end-point security
skills.

*1.       Information Security Engineer-Network (consultant)*

·         Ability to design and support network designs for perimeter and
internal environments

·         *Candidate must be able to evaluate and recommend an automated NAC
(Network Access Controls) solution and deploy solution into client’s
environment *

·         *Candidate must be able to evaluate and recommend firewall risk
assessment tool, such as algosec or firemon, and deploy solution into
client’s environment *

·         *Must be familiarity with designing and implementing internal
segmentation and hotel-ing environments *

·         *Must have strong Cisco and Checkpoint skills.  CCNA and/or
Checkpoint certifications are preferred. *

·         *Candidate must build and document requirements, policies,
standards, and operational procedures to make the program/tools operational
*

·         *Candidate must be able to present the strengths and weaknesses of
each tool evaluated and make recommendations based on his/her
research/experiences. *

·         *Candidate must be innovative with excellent communication skills
*

·         *Candidate must have a sense of urgency and be able to work at a
fast pace on a small, delivery-oriented team. *

·         *Candidate may be working directly with Vendor consultants, senior
Information Security Clients  Engineer, or other external consultants. *

·         *CISSP certification required.*

2.       Information Security Engineer-Host (consultant)

·         Experience with HIDS (Host Intrusion Detection Systems) products
including Tripwire, Symantec, etc.

·         *Hands-on experience with Tripwire Enterprise strongly preferred *

·         *Experience with SSL hardware encryption tools, such as F5 load
balancers or HSMs, preferred *

·         *Candidate must be able to evaluate and recommend a new HIDS
product or be able to fully utilize the current HIDS product in client
environment. *

·         *Candidate must be able to evaluate and recommend a new Enterprise
Security Management product and deploy solution into client’s environment. *

·         *Must have strong UNIX and Windows skills (be able knowledgeable
in hardening and working in these environments).  UNIX scripting skills are
preferred. *

·         *Candidate must be able to present the strengths and weaknesses of
each tool evaluated and make recommendations based on his/her
research/experiences. *

·         *Candidate must build and document requirements, policies,
standards, and operational procedures to make the program/tools operational
*

·         *Candidate must be innovative with excellent communication skills
*

·         *Candidate must have a sense of urgency and be able to work at a
fast pace on a small, delivery-oriented team. *

·         *Candidate may be working directly with Vendor consultants, senior
Information Security clients Engineer, or other external consultants *

·         *CISSP certification required.*

3.       Information Security Engineer-End Point (consultant)

·         Candidate must have experience with DLP (Data Loss Prevention)
tools such as Vontu (Symantec), centralized email encryption such as PGP
Universal, and Secure file transfer solutions such as Tumbleweed Secure
Transport

·         *Candidate must be able to work directly on the team for
evaluation and recommend deployment for Vontu tool to be fully utilized in
client environment. *

·         *Candidate must be able to work directly on the team for
evaluation and recommend deployment for PGP Universal tool to be fully
utilized in client environment. *

·         *Candidate must be able to work directly on the team for
evaluation and recommend deployment for Tumbleweed Secure Transfer tool to
be fully utilized in client environment. *

·         *Successful candidate must understand the user community and their
functions *

·         *Experience with encryption tools such as Tumbleweed, PGP
Universal, etc. is a must. *

·         *Must be farmilar with current Windows desktop operating systems.
Mac experience preferred. *

·         *Candidate must build and document requirements, policies,
standards, and operational procedures to make the program/tools operational
*

·         *Candidate must be able to present the strengths and weaknesses of
each tool evaluated and make recommendations based on his/her
research/experiences. *

·         *Candidate must be able to create the appropriate communicates for
these end-users and may be required to provide some end-user training. *

·         *Candidate must be innovative with excellent communication skills
*

·         *Candidate must have a sense of urgency and be able to work at a
fast pace on a small, delivery-oriented team. *

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"zilliontechnologies" group.
To post to this group, send email to zilliontechnologies@googlegroups.com
To unsubscribe from this group, send email to 
zilliontechnologies+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/zilliontechnologies?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to