The following requirement is open with our client.
Title : Enterprise Information Security Analyst
Location : New York, NY
Duration : 5 Months
Rate : $Negotiable
Visa Status : Any Work Status
In-Person Interview : No
Experience (Years) 6-8 Years
Role Description
* Reducing risk through threat mitigation which in-volves supporting the following:
* Performing vulnerability scanning which includes analysis and coordinating remediation
* Performing anomaly detection analysis and coordi-nating remediation
* Performing intrusion detection analysis and coordi-nating remediation * Performing litigation support associated with Elec-tronic Stored Information which includes but is not limited to the following:
o Use approved applications to preserve cus-todial data required by preservation notices
o When required perform keyword searches against collected data o Use approved ticketing systems to properly resolve all litigation requests o Interact with divisional peers in order to sat-isfy inter-division preservation notices
o Maintain ongoing inventories of custodians and associated legal matters
o Participate in the vetting of new applications used to support the collection of ESI
o Ensure all systems or applications, used or managed by information security are availa-ble and functioning as required in order to comply with any legal requests
o Interact with various support teams in order to comply with any preservation notices or other internal investigations
· Participates as appropriate in the planning and im-plementation of any Viacom Information Security projects.
· Participates as appropriate in any MTS or Business unit project with information security implications
· Assist in performing security risk evaluations and penetration assessments with Senior Information Security staff members
Essential Skills
· 6-8 years' experience in Information Security Support role
· Good understanding of the following: a. TCP/IP and other related protocols. b. Vulnerability scanning, intrusion detection, anomaly detection and associated technologies c. Tools, techniques and standards used to conduct network penetration
testing of assets in a Windows, Unix and Linux platform d. Tools, techniques and standards used to conduct ap-plication penetration testing for applications that sup-port but not limited to Java, JBoss, PHP, WebDev e. Layer 2, 3 and 4 infrastructure
designs and function-ality f. UNIX, Linux and FreeBSD and associate hardening best practices g. The latest hacking techniques and appropriate countermeasures. h. Firewalls, rule base analysis, stateful inspection, en-cryption and associated algorithms i.
Common threat methodologies such as Sans and OWASP j. SQL, MySQL, Oracle and associated hardening best practices
· Able to read, understand and interpret at least two of the following: a. Packet captures b. Regex expressions c. Firewall Rules d. Access Control lists
· Applying forward strategic thinking to effect smooth day-to-day and long term project planning. Interpreting communi-cations requirements and executing effective documentation for the many projects being deployed with Information Se-curity.
· Technical certifications - CISSP ENCE, GCIH, GCIA, CISM, ITIL preferred
Desirable Skills
· Acts responsibly with sensitive and confidential in-formation
· Is creative and resourceful as a problem solver
· Consistently demonstrates the drive to be deliver successfully even under difficult timelines
· Has strong analytical, methodical, investigative and auditing skills · Knows when to make practical rational decisions that reduce risk to Viacom information and Information systems
· Is a critical logical thinker who is efficient and orderly
· Comfortable with being a project lead or a project resource
· Travel domestically and internationally if required and with short notice
· Must be reliable and available 24/7
Please respond with below following details: Please give us particular time for interview slots.
RESOURCE DETAILS
Full Name of the Candidate (First, Middle, Last)
Contact Number (123-456-7890)
Email ID
Skype ID
US based Photo ID copy is (MUST)
Best time to reach for a Tech-screen today (1) (NO 'Advance notices', NO 'Anytime'. Please specify a specific time slot and answer the calls.)
Best time to reach for a Tech-screen Next business day (2)
Best time to reach for a Tech-screen Next business day (3)
Availability (Immediate/x weeks/Specific date)
Undergrad Education
(Bachelors Degree)
Major In
University:
Attended
from: (mm/yy)
To: (mm/yy)
Work Experience (specify a number)
Relevant: years
Total: years
Current Location (City, State) e.g.: Jersey City, NJ
Willing to Relocate (yes/no)
Visa Status (USC, GC, H1B, L2, GC-EAD)
Hourly Rate (Terms: 1099 or CTC)
$
Employer's Particulars (if applicable):
Company Name
Contact person's name (Recruiter)
Email ID
Contact Number(s)
Thanks & regards,
Kumar
=======================================
ASCII Group, LLC
38345 W 10 Mile Rd, Suite 365, Farmington, MI 48335
Direct: (248) 247-8738
Email:
kumar@asciigroup.com
Website: www.asciigroup.com
====================================
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)