Job Search Results

879 listings were found that matched your search words: Keywords: Mechanical ( Please note: We assume that all U.S. jobs are "EOE/M/F/D/V" unless otherwise noted. ) ( Listing generated 2024/11/04 Monday 01:56PM Pacific Time by ContractJobHunter. )

Listings 701 - 701

Go To My Job Tracker

Expand all descriptions

THIS JOB IS NO LONGER AVAILABLE. THIS IS ARCHIVAL INFORMATION.
Security Architect (Cyber Threat Intelligence Analyst) Lvl 3 - KS

Description:
Occupation Description:
Information Technology consists of job families that develop, deploy, and maintain the information technology environment. It includes jobs applicable to application development and maintenance computing systems architecture, delivery systems/computing infrastructure, data management, networking and communications, mathematics and modeling, and advanced technology.


Job Family Description:
Designs, tests, and implements state-of-the-art security software and hardware (e.g., network and application firewalls, intrusion prevention systems, secure file transfer, web proxy, identity management systems, PKI, VPN,etc.) Assist with design, test and implementation of secure operating systems, networks, and database products using knowledge of information systems security concepts, theory, applications (e.g., secure architectures, secure electronic data communications, network security, protection of sensitive data, etc.), and information systems technology (e.g., computing platforms, systems integration, analysis, architecture, etc.). Applies knowledge of technical, analytical, project management, and negotiating skills to ensure the confidentiality, integrity, and availability of all information system assets and to ensure compliance with company policies, procedures, contractual, and regulatory requirements. Develops incident response policies, procedures and analysis using knowledge of security operations concepts. Conducts risk assessments and provides recommendations for system and application design. Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research. Manages relations with security vendors works closely with commercial computer product vendors and other information systems organizations to resolve relevant security issues.

Requirements:
Level 3
Ed / Exper
Bachelor's and 6 to 9 years' related work experience, a Master's degree and 4 to 7 years' related work experience or an equivalent combination of education and experience.
Must be a US born citizen
Duration: 3-12 month project
1st shift
SKILLS NEEDED:
Must have CISSP, CISM, CISA, CCSP, SANS, GIAC or comparable certification

Incident response plan

Read Security logs

ADDITIONAL SKILLS AND QUALIFICATIONS:

Broad experience in general security controls such as end point security, cryptography, PKI, directory services, IPSec, etc.

Knowledge in Incident Management best practices

Knowledge with the Software Development Life Cycle

Experience with security technologies and methods as they apply in a business environment

Qualifications:

Major certification such as: CISSP, CISM, CISA, CCSP, SANS, GIAC or comparable certification

Certified Ethical Hacker certification preferred

Experience working with IP based networking protocols, firewalls, IPS/IDS, SEIM, general application and database security, and operating system internals and security control mechanisms

Broad experience in information technologies, such as programming languages, computer hardware, testing methodologies, databases, and system design

Experience in cyber security with the ability to assess current vulnerabilities and threats and the development of controls, remediation & countermeasures

Experience in performing network vulnerability scanning, penetration testing, security event log collection, cyber threat analysis, and reporting

Experience in managing security risks related to third parties and vendors

Knowledge of commonly accepted industry standards and best practices relating to security, including ISO 27002/27005, ITIL, CMM, NIST publications and other best practices

Past experience designing, building and integrating security technologies such as Security Event Management, encryption products, data protection or data leakage, GRC tools, identity management, VPNs, etc.

Experience hardening operating systems (examples: NT, W2K, LINUX, UNIX)

Experience using Foundstone, Nessus, FireEye, Metasploit, WireShark, or Nmap
 
Job Number: FD-518193KS
Job Location: Wichita, KS
Rate: $ BOE/HR
Per Diem: Yes Possible
Overtime: Possible, no guarantee
Duration: 3-11 Months depending on need
Start Date: 07/07/2017
Input Date: 08/12/2024
Firm Name: FOSTER DESIGN INC
Attention: Recruiter
Address: 200 W DOUGLAS AVE STE 110
City, State: WICHITA, KS 67202
Phone: 316/832-9700
800 Phone: 800/345-3394
Fax Phone: 316/832-9357
Website: www.fosterdes.com

Back to Advanced Job Search