job search mailing list home about quest career resources contact
line

Job Search Results
1-12 of 82 jobs shown.


CJ-ITsecD      
Senior IT Security Specialist      
Senior IT Security Specialist Prestigious Fortune 500 Company is currently seeking a Senior IT Security Specialist. Candidate will oversee security design and integration to ensure new security technology implementations result in high availability, quality, and secure solutions across the entire environment. Responsibilities: " Technical lead for evaluating, testing, recommending, developing, coordinating, monitoring and maintaining information security for operating systems, user authentication, and applications; driving strategic security architecture " Ensures IT security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IT standards and overall IT security " Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents " Develops techniques and procedures for conducting IT security risk assessments, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents " Mentor and educate teams with expert knowledge of information security event management, security forensics, network access controls and perimeter security, operations, implementations of new technologies " Up to 10% travel required Must Have: " Excellent communication capability; written, verbal " Success in collaborating and organizing with customers, partners, and co-workers across cultural boundaries " Able to identify, address or escalate potential dependencies and issues " Manage the effort within deferred and expense budget constraints (if project lead) " Effectively manage ambiguity, change and conflict " Ability to effectively prioritize in high pressure situations " Strong project leadership and support skills Key Competencies: " Expert knowledge of security solutions " Range of business and IT experiences " Ability to apply security solutions to business needs and requirements " Ability to bridge business and technology acumen " Have the capability to discuss supported technologies and new capabilities in simple terms and be able to articulate issues that drive standard decisions to all levels in the organization Basic Qualifications: " A Bachelors degree " 7+ years of applied experience with demonstrated skills in IT Security

CJ-ITsecK      
Senior IT Security Specialist      
Senior IT Security Specialist Prestigious Fortune 500 Company is currently seeking a Senior IT Security Specialist. Candidate will oversee security design and integration to ensure new security technology implementations result in high availability, quality, and secure solutions across the entire environment. Responsibilities: " Technical lead for evaluating, testing, recommending, developing, coordinating, monitoring and maintaining information security for operating systems, user authentication, and applications; driving strategic security architecture " Ensures IT security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IT standards and overall IT security " Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents " Develops techniques and procedures for conducting IT security risk assessments, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents " Mentor and educate teams with expert knowledge of information security event management, security forensics, network access controls and perimeter security, operations, implementations of new technologies " Up to 10% travel required Must Have: " Excellent communication capability; written, verbal " Success in collaborating and organizing with customers, partners, and co-workers across cultural boundaries " Able to identify, address or escalate potential dependencies and issues " Manage the effort within deferred and expense budget constraints (if project lead) " Effectively manage ambiguity, change and conflict " Ability to effectively prioritize in high pressure situations " Strong project leadership and support skills Key Competencies: " Expert knowledge of security solutions " Range of business and IT experiences " Ability to apply security solutions to business needs and requirements " Ability to bridge business and technology acumen " Have the capability to discuss supported technologies and new capabilities in simple terms and be able to articulate issues that drive standard decisions to all levels in the organization Basic Qualifications: " A Bachelors degree " 7+ years of applied experience with demonstrated skills in IT Security

CJ-ITsecA      
Senior IT Security Specialist      
Senior IT Security Specialist Prestigious Fortune 500 Company is currently seeking a Senior IT Security Specialist. Candidate will oversee security design and integration to ensure new security technology implementations result in high availability, quality, and secure solutions across the entire environment. Responsibilities: " Technical lead for evaluating, testing, recommending, developing, coordinating, monitoring and maintaining information security for operating systems, user authentication, and applications; driving strategic security architecture " Ensures IT security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IT standards and overall IT security " Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents " Develops techniques and procedures for conducting IT security risk assessments, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents " Mentor and educate teams with expert knowledge of information security event management, security forensics, network access controls and perimeter security, operations, implementations of new technologies " Up to 10% travel required Must Have: " Excellent communication capability; written, verbal " Success in collaborating and organizing with customers, partners, and co-workers across cultural boundaries " Able to identify, address or escalate potential dependencies and issues " Manage the effort within deferred and expense budget constraints (if project lead) " Effectively manage ambiguity, change and conflict " Ability to effectively prioritize in high pressure situations " Strong project leadership and support skills Key Competencies: " Expert knowledge of security solutions " Range of business and IT experiences " Ability to apply security solutions to business needs and requirements " Ability to bridge business and technology acumen " Have the capability to discuss supported technologies and new capabilities in simple terms and be able to articulate issues that drive standard decisions to all levels in the organization Basic Qualifications: " A Bachelors degree " 7+ years of applied experience with demonstrated skills in IT Security

CJ-ITsec      
Senior IT Security Specialist      
Senior IT Security Specialist Prestigious Fortune 500 Company is currently seeking a Senior IT Security Specialist. Candidate will oversee security design and integration to ensure new security technology implementations result in high availability, quality, and secure solutions across the entire environment. Responsibilities: " Technical lead for evaluating, testing, recommending, developing, coordinating, monitoring and maintaining information security for operating systems, user authentication, and applications; driving strategic security architecture " Ensures IT security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IT standards and overall IT security " Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents " Develops techniques and procedures for conducting IT security risk assessments, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents " Mentor and educate teams with expert knowledge of information security event management, security forensics, network access controls and perimeter security, operations, implementations of new technologies " Up to 10% travel required Must Have: " Excellent communication capability; written, verbal " Success in collaborating and organizing with customers, partners, and co-workers across cultural boundaries " Able to identify, address or escalate potential dependencies and issues " Manage the effort within deferred and expense budget constraints (if project lead) " Effectively manage ambiguity, change and conflict " Ability to effectively prioritize in high pressure situations " Strong project leadership and support skills Key Competencies: " Expert knowledge of security solutions " Range of business and IT experiences " Ability to apply security solutions to business needs and requirements " Ability to bridge business and technology acumen " Have the capability to discuss supported technologies and new capabilities in simple terms and be able to articulate issues that drive standard decisions to all levels in the organization Basic Qualifications: " A Bachelors degree " 7+ years of applied experience with demonstrated skills in IT Security

sb-sec-con      
Security Identity Management Consultant      
Prestigious Financial Firm seeks a Security Identity and Access Management Consultant. The Consultant will be responsible for engineering Identity & Access Management (lAM) solutions for Financial Services business. Experience with MicroSoft products, FIM, ADFS is desired.

IDMconsultantChinew      
Security Identity Management Consultant (Forefront      
**Minimum 6 month contract, possibly 1 year or longer** Responsible for engineering Identity & Access Management (lAM) solutions for Financial Services business. Works with lAM architects, application developers and vendors to build, configure, test and implement lAM solution that meet the business needs of the enterprise and are aligned and consistent with enterprise IT strategies and plans. Engineers lAM solutions, working closely with lAM architects, vendors and business managers to interpret and apply business requirements and lAM designs to lAM solution development. Engineers solutions to ensure that lAM services perform according to defined processes, meet defined policies and comply with applicable information security requirements. Integrates lAM systems with in-house and third party applications for provisioning, identity authentication and systems resources authorization. Leads activities to troubleshoot and resolve complex authentication, authorization and integration problems. Performs and/or leads lAM technical support, including but not limited to monitoring and res pending to server events, ensuring data replication, gathering lAM statistics, and performing general maintenance The scope of this position is to test for compliance with security policies and procedures. Assist in the creation, implementation, and/or management of security tools, infrastructure and applications tasked with protecting computers, networks, software, data, and/or information systems against viruses, worms, spyware, malware, intrusion detection, unauthorized access, denial-of-service attacks, and an ever-increasing list of attacks by hackers acting as individuals or as part of organized crime or foreign governments. QUALIACATIONS: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. EDUCATION and/or EXPERIENCE: " Knowledge and experience in the capabilities and use of the technologies in scope. " Understanding of cloud computing services, architecture and security concerns. " At least 3 - 5 years' experience in supporting and maintaining technologies in scope " Demonstrated effective decision making in regards to resolving risk and vulnerabilities in the environment. " Some experience in managing major vendor relationships in this technology area. " At least one-year experience in providing consulting to senior management on the use and selection of these technologies. " At least 1 to 2 year experience in demonstrating skills in developing a technology plan including technical strategy and direction as well as the related business case for the use of that technology " Strong background and understanding of the technical direction in this space and the prevailing standards " A proven history of being able to influence business and IT peers and management in the decision making process. " Ability to explain complex technical detail and tradeoffs to non-technical associates " Technical Vendor management and negotiating skills. " Excellent communication skills including the ability to present complex presentations to large audiences. " Crucial conversations as demonstrated by the ability to facilitate and conduct crucial conversations when stakes are high, emotions are strong and opinions vary that result in win/win solutions and while doing so fostering communication by encouraging open, honest two-way communication " Bachelor's degree in related field required, Master's degree preferred " Industry certifications: CISSP JOB-SPECIFIC TECHNICAL COMPETENCIES: " Familiarity with lAM solutions including Cyber Ark Privileged Identity Management Suit " Strong background with client server configurations, network protocols and software " Experience developing policies, procedures, and technical training materials " Experience with Internet technologies and security issues " Knowledge and understanding of security technologies including intrusion detection/prevention systems, firewalls, vulnerability scanning, and data protection/encryption systems " Experience with vulnerability assessments, risk analysis and compliance testing " Broad knowledge of full range of distributed, data & security hardware and software patterns, design standards and options. " Possesses strong knowledge of vendor community for full range of security architectures including but not limited to data & security technologies. TECHNOLOGIES IN SCOPE: Experience with security architecture, design, operational support & troubleshooting Microsoft Active Directory, DNS, WINS and DHCP, IP addressing, LDAP authentication, Checkpoint firewalls, IDP, IPS, proxy, content filtering, s pam filtering and encryption security technologies, 802.x Wi-Fi, wireless, Internet hosting, secure remote access technologies. " Knowledge in securing data, voice, video, internet/intranet, E-commerce and telecommunication network architectures (Cisco, Avaya, Microsoft, Juniper, IPC Turret) " Must have experience in securing transport protocol architecture, design, operations support & troubleshooting skills in regards to (TCP/IP, IPsec, NAT, SNMP, SMTP, HTTP, HTTPS, 802.x, MPLS, VPN, TOM private line, ISDN) Duties and Responsibilities " Security knowledge of switching technologies, firewaii/IPSEC technologies, WPN, MAN, LPN, Wi-Fi, TCP/IP, VOIP, converged data, voice and video infrastructures. " Knowledge of Windows and UNIX security- 2-5 years' experience with operations support & troubleshooting. " Understanding of virtualization technologies CERTIFICATES, LICENSES, REGISTRAT/ONS: Industry certifications: CISM, CISA CISSP, CCSE, MSCE ESSENTIAL DUTIES AND RESPONSIBILITIES: The following duties are generally representative of the nature and level of work assigned and are not necessarily all inclusive. " Interpret and apply lAM architecture and designs to build Identity and Access Management (lAM) solutions to support dispersed businesses, personnel and customers " Work with business unit (BU) and corporate function (CF) managers to understand business requirements , enterprise IT standards and other considerations that influence how lAM solutions and services should perform and operate " Engineer solutions to ensure that identity and access management solutions and services perform according to defined processes, meet defined policies and comply with information security requirements " Engineer technical lAM solutions, engaging during the lifecycle of solutions delivery, service owners, architects, project managers, global infrastructure teams, regional IT teams and key lAM product vendors " Integrates lAM systems with in-house and third party applications for provisioning, identity authentication and systems resources authorization, developing connectors between lAM tools and systems resource " Work with application developers and IT operations to develop, test, roll out and maintain enterprise-wide lAM solutions and services " Lead quality control and quality assurance activities, such as developing and executing test plans I scripts and resolving deviations or exceptions, for newly developed and/or enhanced lAM solution " Participate in defining architecture and process standards for the identity management platform: contribute to ongoing evolution and development lAM strategies, roadmaps and plans " Work with the broader IT security, risk and compliance teams to interpret policies and standards, ensuring policies and standards are properly followed by new and existing lAM solutions " Contribute to evaluation, selection and configuration of lAM products and Services from vendors " Troubleshoot and resolve complex authentication, authorization and integration problems " Identify opportunities and outline action plans to improve how existing lA solutions are implement " Lead and/or execute of daily, weekly and monthly support activities to maintain the overall global lAM environment, in coordination with IT operations and regional IT teams Develop dashboards, metrics and benchmarks for the technology " Ensure currency of the technology " Develop cradle to grave governance processes around the technology " Develop technology overviews and roadmaps in conjunction with technology vendors " Create and maintain the documentation & designs " Develop and document the service architecture

RobynSSENy      
Senior Security Engineer      
Looking for a Senior Security Engineer with networking, TCP/IP, Internet protocol, packet analysis, understanding of Unix, Windows, Linux, SIEM, IDS, Tripwire. Prefer Red Source Fire, Arcsight, Shark, Firewalls, NIPS, WIPS, VPN, DLP, Security tools, deploy, upgrade, tweek. We need true engineers. Will be a point of security solutions. Must understand all security risks.

RobynRSA      
Senior Application Security Architect      
Looking for a candidate to develop application security architecture and operate the encryption systems protecting the data. Defining security requirements, designing security systems, PCI, Standards such as NIST 800-531.

sb-mgr-sec      
Manager, Security Incident Response      
Fortune 500 Enterprise Firm seeks a Manager of Security Incident Response. The candidate will manage the Security Incident Response Team in detecting, responding to, and mitigating security incidents in the enterprise. Summary Provides leadership and knowledge to the team and utilize technologies such as Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), computer forensics, sniffers and malware detection and analysis tools. Collaborate with other IT teams, Employee Relations, Legal, Loss Prevention, and other leaders in the organization during Security incident handling situations and proactively for security related initiatives.

CJ-SecMan      
Incident Response Security Manager      
***We are unable to sponsor for this permanent full-time role*** Prestigious Fortune 500 Company is currently seeking a Incident Response Security Manager. Candidate will manage the Security Incident Response Team in detecting, responding to, and mitigating security incidents. Provides leadership and knowledge to the team and utilize technologies such as Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), computer forensics, sniffers and malware detection and analysis tools. Collaborate with other IT teams, Employee Relations, Legal, Loss Prevention, and other leaders in the organization during Security incident handling situations and proactively for security related initiatives. Responsibilities Lead the team in incident prevention, detection/analysis, containment, eradication activities including: developing detection rules and profiles, monitoring events, responding to incidents, conducting forensics investigations, summarizing and reporting on findings. Technologies may include: Network and Host-based Intrusion Detection/Prevention, Data leakage identification and prevention, Security Incident and Event Management, Forensics, Malware detection and analysis, threat detection, various other IT and security systems. Will provide leadership and oversight to determine if an adverse event is a security incident. Will lead incident reponse efforts to determine the criticality of an incident, appropriate containment, and mitigation activities. Will communicate across the organization and ensure proper reporting and documentation is produced outlining the details of the incident. Develops, maintains, and executes the incident response strategy. Evaluates existing and new Security technology, processes, skills, and resourcing to enhance current capabilities or address gaps. Develops and maintains incident response metrics and dashboards to drive security performance and effectiveness. Provides senior leadership with actionable data and trending to enhance security. Demonstrates knowledge of security technology, policies, processes and standards. Provides consistent, practical and relevant ideas and perspectives on improvements. Develops and maintains threat intelligence capabilities to provide defensive measures against future security threats. Manages staff, ensuring proper and timely feedback in accordance with performance management process, including performance evaluations and pay for performance. Handles all hiring, terminations, and constructive discipline as needed for area of responsibility. Manages relationship and oversees performance of external managed services vendors providing security incident response monitoring, forensic, and other security incident response related services. Collaboration with other IT teams, Employee Relations, Legal, Loss Prevention, and other leaders in the organization during security incident handling situations and proactively for security incident response initiatives. Proactively identifies opportunities to improve business focus as it relates to security monitoring capabilities. Qualifications: Bachelor's Degree and at least 7 years IT experience or High School Diploma/GED and 10 years of experience in IT or Information Security. At least 3 years of experience in information security designing, implementing or monitoring security event data on incident response technology such as Security Information & Event Management (SIEM), Intrusion Detection / Prevention Systems (IDS, IPS), Data Loss Prevention (DLP), Web Application Firewall (WAF), Malware analysis systems or conducting forensic investigations. At least 1 year of experience with host and network security technologies such as routers, switches, firewalls, Operating System administration (such as Unix/Linux, Microsoft Windows, mobile operating systems). Knowledge with reactive and proactive countermeasures to prevent or contain security incidents using industry best practices such as NIST 800 series (National Institute of Standards and Technology). Experience managing multiple tasks/projects simultaneously and meeting established deadlines. Experience communicating and translating conceptual and technical data into business impact information to both technical and non-technical audiences (such as intruder techniques, new vulnerabilities, attack vectors, exploits). Knowledge with: anti-virus, firewalls, Unix/Linux/Windows and mobile operating systems and network protocols (TCP/IP, SMTP, HTTP, HTTPS, FTP, DNS, DHCP, SSH, RDP, etc.). Available for on-call coverage during evenings, weekends, and holidays when required. Preferred Qualifications: At least 5 years of experience monitoring and responding to information security incidents. At least 2 years of experience analyzing network, system and application vulnerabilities. At least 2 years of experience writing logic to detect exploitation of vulnerabilities. Knowledge of data mining, log analysis and/or fraud detection logic. Knowledge and practice of developing code or scripting to automate processes or other methods to enhance capabilities. Experience leading or managing teams.

mgedSecureArch      
Managed Security Services Architect      
Prestigious Managed Security Services Firm is currently seeking a Managed Security Services Architect. This individual works closely with Managed Services operations, Strategic Services and Security customers to ensure high quality and profitable managed services products in line with customer demand. Responsibilities: " Field Internal and External customer requests for new products and product enhancements " Partner directly with customers on product change requests. " Design and implement MSS products. " Partner with Operations and Sales Team to determine product pricing and bundling. " Serve as a Managed Services Thought Leader by assisting with speaking engagements, whitepapers, blog postings, etc. " Perform other duties as assigned. Qualifications: " Bachelors Degree (B.A.) from four-year college or university; or one to two years related experience and/or training; or equivalent combination of education and experience required ." Six or more years Information Technology / IT Security experience required. " Strong leadership skills in a group oriented environment required. " Proficiency required with FNS supported services lines, have extensive desktop/networking experience, application software experience and be proficient with Microsoft and UNIX/Linux based operating systems. " Working knowledge of Internetworking, knowledge of I/P routing and configurations, experience with networking, network design, along with previous security systems experience is required. " Exposure to information security vulnerability concepts, issues and mitigation methods preferred ." Exposure to a range of security products such as Authentication, Firewalls, Intrusion Detection and Prevention Systems, and a variety of other related technologies preferred ." Experience in a large Managed Security Services organization preferred. " Experience with business and functional requirements collection preferred.

encryappsecurSEarchitect      
Senior Application Security Architect / encryption      
Prestigious Enterprise Organization is seeking a Senior Application Security Architect who can develop application security architecture, own and operate the encryption systems protecting High-Value Data. This includes defining security requirements for Architecture & Engineering, application standards and guidelines, and secure coding practices. This position is responsible for designing, implementing and supporting the enterprise encryption strategy and solutions for protecting information assets. Key Responsibilities: " Ownership and operational support of the enterprise encryption solution RSA Data Protection Manager (DPM). 24 x 7 support of production encryption systems. " Develop and drive enterprise application security strategy, security architecture, standards across the organization. " Support strategic data protection initiatives: enterprise encryption, tokenization, and EuroPay, MasterCard, VISA (EMV) implementations. Education and Technical Experience: " B.S. or equivalent experience in the Information Security or related field. " 10+ years of experience in designing secure systems, applications, databases, experience in integrating the solution with multiple other applications and systems. " Detailed knowledge of security standards, such as NIST 800-53, and have prior experience in defining security requirements that can satisfy relevant security and privacy regulation, standards and guidelines (PCI, HIPAA). " Advanced knowledge and experience designing, implementing and supporting Payment Card Industry (PCI) Encryption Key requirements. " Experience implementing and operational support of enterprise encryption solutions such as RSA Data Protection Manager (DPM), other centralized Key Management solutions. " Advanced knowledge and experience designing, planning and implementation Data Tokenization technologies. " Advanced knowledge and experience with data encryption solutions; including symmetric and asymmetric encryptions, including; Public Key Infrastructure (PKI), TLS, AES, java encryption libraries, Encrypting File System (EFS), storage encryption. " Proficient in demonstrating examples of application security components. " Experienced in software development experience in J2EE or Microsoft.Net (C#, Visual Studio.Net, etc.) " Knowledge of application secure design patterns and principles (Delegation, Impersonation, Brokered Authentication, IAM,SSO, PKI, etc.) " Must have 7+ experience supporting web application infrastructure including; Web Servers, Java application servers, JVMs, Virtualization, Databases, etc& " Proficiency with the Microsoft Office suite of products, (i.e., Visio, PowerPoint, Excel). Required Soft Skills and Competencies: " Highly ethical, analytical, team-oriented, flexible, inquisitive, and logical. " Must be effective working in conjunction with various levels of management and teams to accomplish agency goals. " Strong sense of urgency with ability to multi-task, take initiative, and follow-through. " Demonstrated ability to lead and manage security and projects. " Ability to use consensus building, negotiation, coalition building, and conflict resolution techniques sufficient to establish and maintain effective communication channels with multiple stakeholders and teams. " Effective at providing security services to multiple teams, and be able to interact appropriately in highly charged emotional situations. Must be able to justify and defend matters involving significant or sensitive issues. Skill in effectively working with personnel and managers with divergent educational and cultural backgrounds. " Extensive project experience of applying secure design methodologies and best practice, such as threat model driven secure design, to build secure applications and systems " Keen awareness of top application security vulnerabilities and mitigation methods " Must know how to integrate security into different SDLC processes, and be able to define insertion points, deliverable templates, and standards. " Skill in communicating orally and in writing with co-workers, technical and administrative personnel, and managers who are not security professionals.
Next Page