job search mailing list home about quest career resources contact
line

Job Search Results
1-12 of 88 jobs shown.


CJ-ITsecD      
Senior IT Security Specialist      
Senior IT Security Specialist Prestigious Fortune 500 Company is currently seeking a Senior IT Security Specialist. Candidate will oversee security design and integration to ensure new security technology implementations result in high availability, quality, and secure solutions across the entire environment. Responsibilities: " Technical lead for evaluating, testing, recommending, developing, coordinating, monitoring and maintaining information security for operating systems, user authentication, and applications; driving strategic security architecture " Ensures IT security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IT standards and overall IT security " Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents " Develops techniques and procedures for conducting IT security risk assessments, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents " Mentor and educate teams with expert knowledge of information security event management, security forensics, network access controls and perimeter security, operations, implementations of new technologies " Up to 10% travel required Must Have: " Excellent communication capability; written, verbal " Success in collaborating and organizing with customers, partners, and co-workers across cultural boundaries " Able to identify, address or escalate potential dependencies and issues " Manage the effort within deferred and expense budget constraints (if project lead) " Effectively manage ambiguity, change and conflict " Ability to effectively prioritize in high pressure situations " Strong project leadership and support skills Key Competencies: " Expert knowledge of security solutions " Range of business and IT experiences " Ability to apply security solutions to business needs and requirements " Ability to bridge business and technology acumen " Have the capability to discuss supported technologies and new capabilities in simple terms and be able to articulate issues that drive standard decisions to all levels in the organization Basic Qualifications: " A Bachelors degree " 7+ years of applied experience with demonstrated skills in IT Security

CJ-ITsecK      
Senior IT Security Specialist      
Senior IT Security Specialist Prestigious Fortune 500 Company is currently seeking a Senior IT Security Specialist. Candidate will oversee security design and integration to ensure new security technology implementations result in high availability, quality, and secure solutions across the entire environment. Responsibilities: " Technical lead for evaluating, testing, recommending, developing, coordinating, monitoring and maintaining information security for operating systems, user authentication, and applications; driving strategic security architecture " Ensures IT security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IT standards and overall IT security " Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents " Develops techniques and procedures for conducting IT security risk assessments, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents " Mentor and educate teams with expert knowledge of information security event management, security forensics, network access controls and perimeter security, operations, implementations of new technologies " Up to 10% travel required Must Have: " Excellent communication capability; written, verbal " Success in collaborating and organizing with customers, partners, and co-workers across cultural boundaries " Able to identify, address or escalate potential dependencies and issues " Manage the effort within deferred and expense budget constraints (if project lead) " Effectively manage ambiguity, change and conflict " Ability to effectively prioritize in high pressure situations " Strong project leadership and support skills Key Competencies: " Expert knowledge of security solutions " Range of business and IT experiences " Ability to apply security solutions to business needs and requirements " Ability to bridge business and technology acumen " Have the capability to discuss supported technologies and new capabilities in simple terms and be able to articulate issues that drive standard decisions to all levels in the organization Basic Qualifications: " A Bachelors degree " 7+ years of applied experience with demonstrated skills in IT Security

CJ-ITsecA      
Senior IT Security Specialist      
Senior IT Security Specialist Prestigious Fortune 500 Company is currently seeking a Senior IT Security Specialist. Candidate will oversee security design and integration to ensure new security technology implementations result in high availability, quality, and secure solutions across the entire environment. Responsibilities: " Technical lead for evaluating, testing, recommending, developing, coordinating, monitoring and maintaining information security for operating systems, user authentication, and applications; driving strategic security architecture " Ensures IT security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IT standards and overall IT security " Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents " Develops techniques and procedures for conducting IT security risk assessments, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents " Mentor and educate teams with expert knowledge of information security event management, security forensics, network access controls and perimeter security, operations, implementations of new technologies " Up to 10% travel required Must Have: " Excellent communication capability; written, verbal " Success in collaborating and organizing with customers, partners, and co-workers across cultural boundaries " Able to identify, address or escalate potential dependencies and issues " Manage the effort within deferred and expense budget constraints (if project lead) " Effectively manage ambiguity, change and conflict " Ability to effectively prioritize in high pressure situations " Strong project leadership and support skills Key Competencies: " Expert knowledge of security solutions " Range of business and IT experiences " Ability to apply security solutions to business needs and requirements " Ability to bridge business and technology acumen " Have the capability to discuss supported technologies and new capabilities in simple terms and be able to articulate issues that drive standard decisions to all levels in the organization Basic Qualifications: " A Bachelors degree " 7+ years of applied experience with demonstrated skills in IT Security

CJ-ITsec      
Senior IT Security Specialist      
Senior IT Security Specialist Prestigious Fortune 500 Company is currently seeking a Senior IT Security Specialist. Candidate will oversee security design and integration to ensure new security technology implementations result in high availability, quality, and secure solutions across the entire environment. Responsibilities: " Technical lead for evaluating, testing, recommending, developing, coordinating, monitoring and maintaining information security for operating systems, user authentication, and applications; driving strategic security architecture " Ensures IT security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IT standards and overall IT security " Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents " Develops techniques and procedures for conducting IT security risk assessments, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents " Mentor and educate teams with expert knowledge of information security event management, security forensics, network access controls and perimeter security, operations, implementations of new technologies " Up to 10% travel required Must Have: " Excellent communication capability; written, verbal " Success in collaborating and organizing with customers, partners, and co-workers across cultural boundaries " Able to identify, address or escalate potential dependencies and issues " Manage the effort within deferred and expense budget constraints (if project lead) " Effectively manage ambiguity, change and conflict " Ability to effectively prioritize in high pressure situations " Strong project leadership and support skills Key Competencies: " Expert knowledge of security solutions " Range of business and IT experiences " Ability to apply security solutions to business needs and requirements " Ability to bridge business and technology acumen " Have the capability to discuss supported technologies and new capabilities in simple terms and be able to articulate issues that drive standard decisions to all levels in the organization Basic Qualifications: " A Bachelors degree " 7+ years of applied experience with demonstrated skills in IT Security

CJ-FIM      
Microsoft Identity Management Consultant FIM      
Microsoft Identity Management Consultant FIM ***This is a 6+ month contract role, and we are unable to sponsor, or use any 3rd party consultants*** Prestigious Financial Investment Firm is currently seeking a Microsoft Identity Management Consultant with Forefront (FIM) experience. Candidate will be responsible for engineering Identity & Access Management (lAM) solutions. Works with lAM architects, application developers and vendors to build, configure, test and implement lAM solution that meet the business needs of the enterprise and are aligned and consistent with enterprise IT strategies and plans. Engineers lAM solutions, working closely with lAM architects, vendors and business managers to interpret and apply business requirements and lAM designs to lAM solution development. Engineers solutions to ensure that lAM services perform according to defined processes, meet defined policies and comply with applicable information security requirements. Integrates lAM systems with in-house and third party applications for provisioning, identity authentication and systems resources authorization. Leads activities to troubleshoot and resolve complex authentication, authorization and integration problems. Performs and/or leads lAM technical support, including but not limited to monitoring and res pending to server events, ensuring data replication, gathering lAM statistics, and performing general maintenance QUALIFICATIONS: Knowledge and experience in the capabilities and use of the technologies in scope. Understanding of cloud computing services, architecture and security concerns. At least 3 - 5 years' experience in supporting and maintaining technologies in scope Demonstrated effective decision making in regards to resolving risk and vulnerabilities in the environment. Some experience in managing major vendor relationships in this technology area. At least one-year experience in providing consulting to senior management on the use and selection of these technologies. At least 1 to 2 year experience in demonstrating skills in developing a technology plan including technical strategy and direction as well as the related business case for the use of that technology Strong background and understanding of the technical direction in this space and the prevailing standards A proven history of being able to influence business and IT peers and management in the decision making process. Ability to explain complex technical detail and tradeoffs to non-technical associates Technical Vendor management and negotiating skills. Excellent communication skills including the ability to present complex presentations to large audiences. Crucial conversations as demonstrated by the ability to facilitate and conduct crucial conversations when stakes are high, emotions are strong and opinions vary that result in win/win solutions and while doing so fostering communication by encouraging open, honest two-way communication Bachelor's degree in related field required, Master's degree preferred Industry certifications: CISSP Familiarity with lAM solutions including Cyber Ark Privileged Identity Management Suit Strong background with client server configurations, network protocols and software Experience developing policies, procedures, and technical training materials Experience with Internet technologies and security issues Knowledge and understanding of security technologies including intrusion detection/prevention systems, firewalls, vulnerability scanning, and data protection/encryption systems Experience with vulnerability assessments, risk analysis and compliance testing Broad knowledge of full range of distributed, data & security hardware and software patterns, design standards and options. Possesses strong knowledge of vendor community for full range of security architectures including but not limited to data & security technologies. TECHNOLOGIES: Experience with security architecture, design, operational support & troubleshooting Microsoft Active Directory, DNS, WINS and DHCP, IP addressing, LDAP authentication, Checkpoint firewalls, IDP, IPS, proxy, content filtering, s pam filtering and encryption security technologies, 802.x Wi-Fi, wireless, Internet hosting, secure remote access technologies. Knowledge in securing data, voice, video, internet/intranet, E-commerce and telecommunication network architectures (Cisco, Avaya, Microsoft, Juniper, IPC Turret) Must have experience in securing transport protocol architecture, design, operations support & troubleshooting skills in regards to (TCP/IP, IPsec, NAT, SNMP, SMTP, HTTP, HTTPS, 802.x, MPLS, VPN, TOM private line, ISDN) RESPONSIBILITIES: Interpret and apply lAM architecture and designs to build Identity and Access Management (lAM) solutions to support dispersed businesses, personnel and customers Work with business unit (BU) and corporate function (CF) managers to understand business requirements , enterprise IT standards and other considerations that influence how lAM solutions and services should perform and operate Engineer solutions to ensure that identity and access management solutions and services perform according to defined processes, meet defined policies and comply with information security requirements Engineer technical lAM solutions, engaging during the lifecycle of solutions delivery, service owners, architects, project managers, global infrastructure teams, regional IT teams and key lAM product vendors Integrates lAM systems with in-house and third party applications for provisioning, identity authentication and systems resources authorization, developing connectors between lAM tools and systems resource Work with application developers and IT operations to develop, test, roll out and maintain enterprise-wide lAM solutions and services Lead quality control and quality assurance activities, such as developing and executing test plans I scripts and resolving deviations or exceptions, for newly developed and/or enhanced lAM solution Participate in defining architecture and process standards for the identity management platform: contribute to ongoing evolution and development lAM strategies, roadmaps and plans Work with the broader IT security, risk and compliance teams to interpret policies and standards, ensuring policies and standards are properly followed by new and existing lAM solutions Contribute to evaluation, selection and configuration of lAM products and Services from vendors Troubleshoot and resolve complex authentication, authorization and integration problems Identify opportunities and outline action plans to improve how existing lA solutions are implement Lead and/or execute of daily, weekly and monthly support activities to maintain the overall global lAM environment, in coordination with IT operations and regional IT teams Develop dashboards, metrics and benchmarks for the technology Ensure currency of the technology Develop cradle to grave governance processes around the technology Develop technology overviews and roadmaps in conjunction with technology vendors Create and maintain the documentation & designs Develop and document the service architecture

sb-sec-con      
Security Identity Management Consultant      
Prestigious Financial Firm seeks a Security Identity and Access Management Consultant. The Consultant will be responsible for engineering Identity & Access Management (lAM) solutions for Financial Services business. Experience with MicroSoft products, FIM, ADFS is desired.

IDMconsultantChinew      
Security Identity Management Consultant (Forefront      
**Minimum 6 month contract, possibly 1 year or longer** Responsible for engineering Identity & Access Management (lAM) solutions for Financial Services business. Works with lAM architects, application developers and vendors to build, configure, test and implement lAM solution that meet the business needs of the enterprise and are aligned and consistent with enterprise IT strategies and plans. Engineers lAM solutions, working closely with lAM architects, vendors and business managers to interpret and apply business requirements and lAM designs to lAM solution development. Engineers solutions to ensure that lAM services perform according to defined processes, meet defined policies and comply with applicable information security requirements. Integrates lAM systems with in-house and third party applications for provisioning, identity authentication and systems resources authorization. Leads activities to troubleshoot and resolve complex authentication, authorization and integration problems. Performs and/or leads lAM technical support, including but not limited to monitoring and res pending to server events, ensuring data replication, gathering lAM statistics, and performing general maintenance The scope of this position is to test for compliance with security policies and procedures. Assist in the creation, implementation, and/or management of security tools, infrastructure and applications tasked with protecting computers, networks, software, data, and/or information systems against viruses, worms, spyware, malware, intrusion detection, unauthorized access, denial-of-service attacks, and an ever-increasing list of attacks by hackers acting as individuals or as part of organized crime or foreign governments. QUALIACATIONS: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. EDUCATION and/or EXPERIENCE: " Knowledge and experience in the capabilities and use of the technologies in scope. " Understanding of cloud computing services, architecture and security concerns. " At least 3 - 5 years' experience in supporting and maintaining technologies in scope " Demonstrated effective decision making in regards to resolving risk and vulnerabilities in the environment. " Some experience in managing major vendor relationships in this technology area. " At least one-year experience in providing consulting to senior management on the use and selection of these technologies. " At least 1 to 2 year experience in demonstrating skills in developing a technology plan including technical strategy and direction as well as the related business case for the use of that technology " Strong background and understanding of the technical direction in this space and the prevailing standards " A proven history of being able to influence business and IT peers and management in the decision making process. " Ability to explain complex technical detail and tradeoffs to non-technical associates " Technical Vendor management and negotiating skills. " Excellent communication skills including the ability to present complex presentations to large audiences. " Crucial conversations as demonstrated by the ability to facilitate and conduct crucial conversations when stakes are high, emotions are strong and opinions vary that result in win/win solutions and while doing so fostering communication by encouraging open, honest two-way communication " Bachelor's degree in related field required, Master's degree preferred " Industry certifications: CISSP JOB-SPECIFIC TECHNICAL COMPETENCIES: " Familiarity with lAM solutions including Cyber Ark Privileged Identity Management Suit " Strong background with client server configurations, network protocols and software " Experience developing policies, procedures, and technical training materials " Experience with Internet technologies and security issues " Knowledge and understanding of security technologies including intrusion detection/prevention systems, firewalls, vulnerability scanning, and data protection/encryption systems " Experience with vulnerability assessments, risk analysis and compliance testing " Broad knowledge of full range of distributed, data & security hardware and software patterns, design standards and options. " Possesses strong knowledge of vendor community for full range of security architectures including but not limited to data & security technologies. TECHNOLOGIES IN SCOPE: Experience with security architecture, design, operational support & troubleshooting Microsoft Active Directory, DNS, WINS and DHCP, IP addressing, LDAP authentication, Checkpoint firewalls, IDP, IPS, proxy, content filtering, s pam filtering and encryption security technologies, 802.x Wi-Fi, wireless, Internet hosting, secure remote access technologies. " Knowledge in securing data, voice, video, internet/intranet, E-commerce and telecommunication network architectures (Cisco, Avaya, Microsoft, Juniper, IPC Turret) " Must have experience in securing transport protocol architecture, design, operations support & troubleshooting skills in regards to (TCP/IP, IPsec, NAT, SNMP, SMTP, HTTP, HTTPS, 802.x, MPLS, VPN, TOM private line, ISDN) Duties and Responsibilities " Security knowledge of switching technologies, firewaii/IPSEC technologies, WPN, MAN, LPN, Wi-Fi, TCP/IP, VOIP, converged data, voice and video infrastructures. " Knowledge of Windows and UNIX security- 2-5 years' experience with operations support & troubleshooting. " Understanding of virtualization technologies CERTIFICATES, LICENSES, REGISTRAT/ONS: Industry certifications: CISM, CISA CISSP, CCSE, MSCE ESSENTIAL DUTIES AND RESPONSIBILITIES: The following duties are generally representative of the nature and level of work assigned and are not necessarily all inclusive. " Interpret and apply lAM architecture and designs to build Identity and Access Management (lAM) solutions to support dispersed businesses, personnel and customers " Work with business unit (BU) and corporate function (CF) managers to understand business requirements , enterprise IT standards and other considerations that influence how lAM solutions and services should perform and operate " Engineer solutions to ensure that identity and access management solutions and services perform according to defined processes, meet defined policies and comply with information security requirements " Engineer technical lAM solutions, engaging during the lifecycle of solutions delivery, service owners, architects, project managers, global infrastructure teams, regional IT teams and key lAM product vendors " Integrates lAM systems with in-house and third party applications for provisioning, identity authentication and systems resources authorization, developing connectors between lAM tools and systems resource " Work with application developers and IT operations to develop, test, roll out and maintain enterprise-wide lAM solutions and services " Lead quality control and quality assurance activities, such as developing and executing test plans I scripts and resolving deviations or exceptions, for newly developed and/or enhanced lAM solution " Participate in defining architecture and process standards for the identity management platform: contribute to ongoing evolution and development lAM strategies, roadmaps and plans " Work with the broader IT security, risk and compliance teams to interpret policies and standards, ensuring policies and standards are properly followed by new and existing lAM solutions " Contribute to evaluation, selection and configuration of lAM products and Services from vendors " Troubleshoot and resolve complex authentication, authorization and integration problems " Identify opportunities and outline action plans to improve how existing lA solutions are implement " Lead and/or execute of daily, weekly and monthly support activities to maintain the overall global lAM environment, in coordination with IT operations and regional IT teams Develop dashboards, metrics and benchmarks for the technology " Ensure currency of the technology " Develop cradle to grave governance processes around the technology " Develop technology overviews and roadmaps in conjunction with technology vendors " Create and maintain the documentation & designs " Develop and document the service architecture

RobynSSENy      
Senior Security Engineer      
Looking for a Senior Security Engineer with networking, TCP/IP, Internet protocol, packet analysis, understanding of Unix, Windows, Linux, SIEM, IDS, Tripwire. Prefer Red Source Fire, Arcsight, Shark, Firewalls, NIPS, WIPS, VPN, DLP, Security tools, deploy, upgrade, tweek. We need true engineers. Will be a point of security solutions. Must understand all security risks.

RobynMSSA      
MSS (Managed Security Services) Architect      
Managed Security Services- MSS Architect Looking for a MSS (Managed Security Services) architect to work closely with customers to make sure services are in line helping with product selecting pricing and bundling IT security networking. Prefer from a consulting background or managed security provider host, etc. outsourcer MSS Architect

RobynRSA      
Senior Application Security Architect      
Looking for a candidate to develop application security architecture and operate the encryption systems protecting the data. Defining security requirements, designing security systems, PCI, Standards such as NIST 800-531.

sb-mgr-sec      
Manager, Security Incident Response      
Fortune 500 Enterprise Firm seeks a Manager of Security Incident Response. The candidate will manage the Security Incident Response Team in detecting, responding to, and mitigating security incidents in the enterprise. Summary Provides leadership and knowledge to the team and utilize technologies such as Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), computer forensics, sniffers and malware detection and analysis tools. Collaborate with other IT teams, Employee Relations, Legal, Loss Prevention, and other leaders in the organization during Security incident handling situations and proactively for security related initiatives.

CJ-SecMan      
Incident Response Security Manager      
***We are unable to sponsor for this permanent full-time role*** Prestigious Fortune 500 Company is currently seeking a Incident Response Security Manager. Candidate will manage the Security Incident Response Team in detecting, responding to, and mitigating security incidents. Provides leadership and knowledge to the team and utilize technologies such as Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), computer forensics, sniffers and malware detection and analysis tools. Collaborate with other IT teams, Employee Relations, Legal, Loss Prevention, and other leaders in the organization during Security incident handling situations and proactively for security related initiatives. Responsibilities Lead the team in incident prevention, detection/analysis, containment, eradication activities including: developing detection rules and profiles, monitoring events, responding to incidents, conducting forensics investigations, summarizing and reporting on findings. Technologies may include: Network and Host-based Intrusion Detection/Prevention, Data leakage identification and prevention, Security Incident and Event Management, Forensics, Malware detection and analysis, threat detection, various other IT and security systems. Will provide leadership and oversight to determine if an adverse event is a security incident. Will lead incident reponse efforts to determine the criticality of an incident, appropriate containment, and mitigation activities. Will communicate across the organization and ensure proper reporting and documentation is produced outlining the details of the incident. Develops, maintains, and executes the incident response strategy. Evaluates existing and new Security technology, processes, skills, and resourcing to enhance current capabilities or address gaps. Develops and maintains incident response metrics and dashboards to drive security performance and effectiveness. Provides senior leadership with actionable data and trending to enhance security. Demonstrates knowledge of security technology, policies, processes and standards. Provides consistent, practical and relevant ideas and perspectives on improvements. Develops and maintains threat intelligence capabilities to provide defensive measures against future security threats. Manages staff, ensuring proper and timely feedback in accordance with performance management process, including performance evaluations and pay for performance. Handles all hiring, terminations, and constructive discipline as needed for area of responsibility. Manages relationship and oversees performance of external managed services vendors providing security incident response monitoring, forensic, and other security incident response related services. Collaboration with other IT teams, Employee Relations, Legal, Loss Prevention, and other leaders in the organization during security incident handling situations and proactively for security incident response initiatives. Proactively identifies opportunities to improve business focus as it relates to security monitoring capabilities. Qualifications: Bachelor's Degree and at least 7 years IT experience or High School Diploma/GED and 10 years of experience in IT or Information Security. At least 3 years of experience in information security designing, implementing or monitoring security event data on incident response technology such as Security Information & Event Management (SIEM), Intrusion Detection / Prevention Systems (IDS, IPS), Data Loss Prevention (DLP), Web Application Firewall (WAF), Malware analysis systems or conducting forensic investigations. At least 1 year of experience with host and network security technologies such as routers, switches, firewalls, Operating System administration (such as Unix/Linux, Microsoft Windows, mobile operating systems). Knowledge with reactive and proactive countermeasures to prevent or contain security incidents using industry best practices such as NIST 800 series (National Institute of Standards and Technology). Experience managing multiple tasks/projects simultaneously and meeting established deadlines. Experience communicating and translating conceptual and technical data into business impact information to both technical and non-technical audiences (such as intruder techniques, new vulnerabilities, attack vectors, exploits). Knowledge with: anti-virus, firewalls, Unix/Linux/Windows and mobile operating systems and network protocols (TCP/IP, SMTP, HTTP, HTTPS, FTP, DNS, DHCP, SSH, RDP, etc.). Available for on-call coverage during evenings, weekends, and holidays when required. Preferred Qualifications: At least 5 years of experience monitoring and responding to information security incidents. At least 2 years of experience analyzing network, system and application vulnerabilities. At least 2 years of experience writing logic to detect exploitation of vulnerabilities. Knowledge of data mining, log analysis and/or fraud detection logic. Knowledge and practice of developing code or scripting to automate processes or other methods to enhance capabilities. Experience leading or managing teams.
Next Page