View Job - 4052 - Security Technology Assurance (SC C) [4052]
Job ID:4052
Job Title:4052 - Security Technology Assurance (SC C)
Job Location:Parsippany, NJ
Position type:Cons.
No. of Pos.:1
Cand. Rate:$50-60ph c2c
Description:

Location: Parsippany, NJ

Summary:

The information security technology assurance team is charged with providing technical security consulting service and guidance to the Client’s enterprise.  The Information Security Technology Assurance team will serve as the primary resource in providing security architecture, security engineering, security implementation, and security research services to provide Client’s business units with a world class information security posture for enabling business.  The Information Security Technology Assurance team will work directly with the Chief Information Officers and Lead Business Security Architects in the design and delivery of technical security solutions.
The Analyst will work with directly the Manager of Technology Assurance and Senior Analysts to aid in various internal initiatives related to vulnerability identification and penetration testing to Client’s network.           
 

Essential Job Functions

  • Implementation, Testing, and Documentation of Vulnerability Management – 80%
    • Assist Technology Assurance Managers and Senior Analysts to provide subject matter advice, guidance, implementation of vulnerability identification
    • Provide hands-on configuration, scheduling and communication of vulnerability identification Client’s four business units
    • Be capable of performing a penetration test of Client’s internal and external assets as needed
    • Manage 3rd party penetration testing vendors as needed
  • Interface with Business Units & Compliance to maintain compliance status – 20%
    • Under manager’s supervision, interact with technical and business stakeholders to understand business requirements in the development of endpoint security solutions.
    • Assist in documenting compensating controls, false positives and supporting periodic compliance reviews of Client’s systems and infrastructure 

Minimum Requirements and Qualifications:

  • 3-5 years of experience in design, architecture, engineering or implementation of relevant Information Technology and Information Security solutions
  • 2-3 years of hands-on experience directly related to the in an Information Security, vulnerability identification and penetration testing
  • Excellent written and verbal communication skills
  • Self-starter with the energy level needed to meet this demanding role with a strong aptitude and desire to learn, and expand skill set to new technologies, and areas of information security
  • Aptitude to learn through research and hands-on experience.
  • Ability to adapt to changing technology environments and requirements.
  • An understanding of information security concepts, regulations, standards, and compliance as it relates to Client business.
  • A demonstrated commitment to the information security profession through advanced education, training, certification, or industry participation.
  • Ability to demonstrate aptitude, interest, and passion in keeping up with information security technical trends, research, and current development
  • Ability to respond effectively and be level-headed in crises
  • Strong personal and professional ethical values and impeccable integrity
  • Participate in security related committees, workgroups, and projects
  • Must be appropriately reactive, not over-reactive; outstanding business judgment

 Preferred Technologies:
 

·         Knowledge of network protocols, system internals, system security and hardening, and troubleshooting techniques

  • Knowledge of diverse systems/platforms such as:
    • Windows Server and Workstation products (Windows Server 2008, Windows 7)
    • Active Directory
    • Unix (e.g. Unix, Linux, Solaris)
    • Mac OS, Databases (e.g. Oracle, MS-SQL, MySQL, PostGreSQL)
    • Web Servers (e.g. IIS, Apache, Tomcat)
    • Mail Systems (such as, Microsoft Exchange, Postini)
    • Mobile and wireless device platforms (e.g. BES, Mobile Iron, Good, ActiveSync)
    • Virtualization technologies (e.g. VMware, Citrix, Hyper-V)
    • Encryption products and technologies (e.g. PGP, McAfee, SecureDoc)
    • Authentication and Access Control Systems
    • Data Loss Prevention Systems (DLP) (e.g. Symantec/Vontu, RSA, McAfee)
    • Digital certificates
    • Endpoint security such as, Anti-virus/Anti-malware
    • Personal Firewall
    • Host-based IDS (e.g. McAfee, Symantec Endpoint Protection)
    • Forward/Reverse Proxy servers (e.g. Bluecoat, Microsoft ISA, TMG, UAG)


Visa sponsorship is not available.

Powered by ApplicantStack