Cloud Analytics Technologies LLC
Security Engineer
Cloud Analytics Technologies LLC, Sterling, Virginia, United States, 22170
Work Authorization: US Citizen, Green Card, H-1B, GC-EAD, OPT-EAD, L2-EAD, TN Visa
Local Candidates Preferred. Non-local candidates must be willing to pay for your own interview travel expenses and relocation costs.Role: Security EngineerLocation: Sterling, VADuration: 6+ MonthsRate: $40/hr on C2C (Max)Job Description:Required Skills:Need a Security Engineer with at least 5 years experience. Candidate must have engineering experience with most of these tools (checkpoint firewall, log management, splunk, symantec, Cisco ASA, VPN).Job Description:Apex Systems is looking for an IT Security Administrator to support one of our clients in the Sterling, VA area. This position is in support of an endpoint security and data leakage prevention project.IT Security AdministratorThe Security Administrator serves as the expert in implementation and configuration of information security tools which are used as the primary defense to safeguard systems and data. Proactively monitors the threat landscape and current controls to evaluate the effectiveness of the security tools. Responsible for implementing upgrades, patches, and other modifications required to keep the tools up-to-date to guard against sophisticated Cyber-attacks. Monitor server logs, firewall logs, intrusion detection and prevention logs, and network traffic (wired wireless) for unusual or suspicious activity, interpret and make recommendations for resolution. The Security Administrator makes decisions on complex or ambiguous IT administration issues, coordinating with users to determine requirements, and ensuring system improvements are successfully implemented and monitored, finding ways to increase efficiency. The Security Administrator will work with the IT Security Architect to develop security strategy direction for enterprise security architecture and the implementation of appropriate safeguards and controls. Implement, support and problem solve infrastructure security solutions which include both technologies and processes. Assess current and planned applications and systems, identifying security protection issues and proactively identifying and modifying controls to protect against sophisticated cyber-attacks. The security administrator implements technologies and plans for a mature security program. Will collaboratively and proactively work across the organization and with external parties to remediate security gaps. Will proactively identify zero-day vulnerabilities, abnormal behavioral patterns, security trends, and sophisticated cyber-attack techniques to enhance the security program and safeguard the environment.JOB SPECIFICATIONSDescriptionPreferred / Desired ExperienceDemonstrated knowledge and experience implementing, monitoring, and upgrading security technology and administrative controls necessary to safeguard computer information data and systems. Detailed knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits as well as a strong background in troubleshooting of operational issues and incident handling. Responsible for ensuring Information technology meets financial and Meaningful Use audit mandates as well as Governance, Risk and Compliance (GRC) mandates. Responsible for administration of security tools to maintain security controls, including firewalls, intrusion detection systems, NAC, SIEM, and data loss prevention technologies.5+ years’ experience in security administration experience in a large, complex environment. Enterprise class security products such as web proxy, reverse proxy, load balancing, IDS/IPS, DLP, Firewall, IPsec/SSL VPN, WAN/LAN, DDOS prevention, wireless and remote connectivity. Infrastructure security, including windows, Unix/Linux, desktop/laptop, and mobile security, hands-on experience in packet capturing and analyzing log, as well as knowledge on cryptography and PKI. Compliance frameworks and requirements such as PCI, HIPAA, HITECH, SOX etc. Knowledge on threat landscape, security threat and vulnerability management, and security monitoring and analytics.7 years’ experience in security administration experience in a large, complex environment. Enterprise class security products such as web proxy, reverse proxy, load balancing, IDS/IPS, DLP, Firewall, IPsec/SSL VPN, WAN/LAN, DDOS prevention, wireless and remote connectivity. Infrastructure security, including windows, Unix/Linux, desktop/laptop, and mobile security, hands-on experience in packet capturing and analyzing log, as well as knowledge on cryptography and PKI. Compliance frameworks and requirements such as PCI, HIPAA, HITECH, SOX etc. Knowledge on threat landscape, security threat and vulnerability management, and security monitoring and analytics.Equal Opportunity Employer
Cloud Big Data Technologies is an equal opportunity employer inclusive of female, minority, disability and veterans, (M/F/D/V). Hiring, promotion, transfer, compensation, benefits, discipline, termination and all other employment decisions are made without regard to race, color, religion, sex, sexual orientation, gender identity, age, disability, national origin, citizenship/immigration status, veteran status or any other protected status. Cloud Big Data Technologies will not make any posting or employment decision that does not comply with applicable laws relating to labor and employment, equal opportunity, employment eligibility requirements or related matters. Nor will Cloud Big Data Technologies require in a posting or otherwise U.S. citizenship or lawful permanent residency in the U.S. as a condition of employment except as necessary to comply with law, regulation, executive order, or federal, state, or local government contract.
#J-18808-Ljbffr
Local Candidates Preferred. Non-local candidates must be willing to pay for your own interview travel expenses and relocation costs.Role: Security EngineerLocation: Sterling, VADuration: 6+ MonthsRate: $40/hr on C2C (Max)Job Description:Required Skills:Need a Security Engineer with at least 5 years experience. Candidate must have engineering experience with most of these tools (checkpoint firewall, log management, splunk, symantec, Cisco ASA, VPN).Job Description:Apex Systems is looking for an IT Security Administrator to support one of our clients in the Sterling, VA area. This position is in support of an endpoint security and data leakage prevention project.IT Security AdministratorThe Security Administrator serves as the expert in implementation and configuration of information security tools which are used as the primary defense to safeguard systems and data. Proactively monitors the threat landscape and current controls to evaluate the effectiveness of the security tools. Responsible for implementing upgrades, patches, and other modifications required to keep the tools up-to-date to guard against sophisticated Cyber-attacks. Monitor server logs, firewall logs, intrusion detection and prevention logs, and network traffic (wired wireless) for unusual or suspicious activity, interpret and make recommendations for resolution. The Security Administrator makes decisions on complex or ambiguous IT administration issues, coordinating with users to determine requirements, and ensuring system improvements are successfully implemented and monitored, finding ways to increase efficiency. The Security Administrator will work with the IT Security Architect to develop security strategy direction for enterprise security architecture and the implementation of appropriate safeguards and controls. Implement, support and problem solve infrastructure security solutions which include both technologies and processes. Assess current and planned applications and systems, identifying security protection issues and proactively identifying and modifying controls to protect against sophisticated cyber-attacks. The security administrator implements technologies and plans for a mature security program. Will collaboratively and proactively work across the organization and with external parties to remediate security gaps. Will proactively identify zero-day vulnerabilities, abnormal behavioral patterns, security trends, and sophisticated cyber-attack techniques to enhance the security program and safeguard the environment.JOB SPECIFICATIONSDescriptionPreferred / Desired ExperienceDemonstrated knowledge and experience implementing, monitoring, and upgrading security technology and administrative controls necessary to safeguard computer information data and systems. Detailed knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits as well as a strong background in troubleshooting of operational issues and incident handling. Responsible for ensuring Information technology meets financial and Meaningful Use audit mandates as well as Governance, Risk and Compliance (GRC) mandates. Responsible for administration of security tools to maintain security controls, including firewalls, intrusion detection systems, NAC, SIEM, and data loss prevention technologies.5+ years’ experience in security administration experience in a large, complex environment. Enterprise class security products such as web proxy, reverse proxy, load balancing, IDS/IPS, DLP, Firewall, IPsec/SSL VPN, WAN/LAN, DDOS prevention, wireless and remote connectivity. Infrastructure security, including windows, Unix/Linux, desktop/laptop, and mobile security, hands-on experience in packet capturing and analyzing log, as well as knowledge on cryptography and PKI. Compliance frameworks and requirements such as PCI, HIPAA, HITECH, SOX etc. Knowledge on threat landscape, security threat and vulnerability management, and security monitoring and analytics.7 years’ experience in security administration experience in a large, complex environment. Enterprise class security products such as web proxy, reverse proxy, load balancing, IDS/IPS, DLP, Firewall, IPsec/SSL VPN, WAN/LAN, DDOS prevention, wireless and remote connectivity. Infrastructure security, including windows, Unix/Linux, desktop/laptop, and mobile security, hands-on experience in packet capturing and analyzing log, as well as knowledge on cryptography and PKI. Compliance frameworks and requirements such as PCI, HIPAA, HITECH, SOX etc. Knowledge on threat landscape, security threat and vulnerability management, and security monitoring and analytics.Equal Opportunity Employer
Cloud Big Data Technologies is an equal opportunity employer inclusive of female, minority, disability and veterans, (M/F/D/V). Hiring, promotion, transfer, compensation, benefits, discipline, termination and all other employment decisions are made without regard to race, color, religion, sex, sexual orientation, gender identity, age, disability, national origin, citizenship/immigration status, veteran status or any other protected status. Cloud Big Data Technologies will not make any posting or employment decision that does not comply with applicable laws relating to labor and employment, equal opportunity, employment eligibility requirements or related matters. Nor will Cloud Big Data Technologies require in a posting or otherwise U.S. citizenship or lawful permanent residency in the U.S. as a condition of employment except as necessary to comply with law, regulation, executive order, or federal, state, or local government contract.
#J-18808-Ljbffr