[ALE-jobs] Fwd: Cyber Security Engineer - multiple locations. No Corp to Corp. This is a contract for up to 18 months / possible to convert FTE.

Jim Kinney jim.kinney at gmail.com
Fri Jun 28 19:54:52 EDT 2013


---------- Forwarded message ----------
From: "Clifton Jadoo" <clifton.jadoo at axelon.com>
Date: Jun 28, 2013 5:40 PM
Subject: Cyber Security Engineer - multiple locations. No Corp to Corp.
This is a contract for up to 18 months / possible to convert FTE.
To: <jim.kinney at gmail.com>
Cc:

06/28/13 5:26 PM****

Hello,

      My name is Clifton and I'm a recruiter at Axelon Services Corporation.
We have your resume on file and I thought you may be interested in an
opportunity we currently have available for a *Cyber Security Engineer *with
a major financial company located in *multiple locations. No Corp to Corp.
This is a contract for up to 18 months / possible to convert FTE.

If too far, must be willing to relocate at own expense. We will provide
only for the interview expenses.

Can work from any of the following locations:
Charlotte,NC , Dallas, TX , NYC and Chicago, IL..  *****

Please review the job description below.  If you are qualified and
interested in pursuing this opportunity, please call me at (212) 384-6508ASAP.
 You may also send me an e-mail, if you do respond via e-mail please
include a daytime phone number so I can reach you.  In considering
candidates, time is of the essence, so please respond ASAP.  ****

*If** *you *do not *feel like you are a good fit, *but* you know someone,
perhaps junior to you, who is looking for a temporary assignment without a
heavy skill set required, please feel free to forward this email onto them.
I also encourage you to visit our website at www.axelon.com for all of our
job openings.  ****

Cyber Security Engineer (mid to Senior level)

Candidate will be performing forensic analysis of fraud cases - will need
Java development skills with an empasis on secure coding - ideal candidate
will have CISSP experience.

Responsibilities: Looking for a person with passion for cyber security with
attention to details and drive to improve. The person’s responsibilities
would include to perform forensic analysis of potential fraudulent
activities, identify weaknesses in existing application and process, come
up with solutions to enhance existing products. Ability to work
independently with minimal supervision. Act as a security adviser to
architecture and development teams. Ability to develop data structures and
identify patterns that can be used to detect fraudulent activity.

Required Skills: -
Proficient in understanding and writing complex regular expressions.
- Development skills including shell and Perl scripting, ability to write
SQL, java/j2ee development with emphasis on secure coding, systems
programming.
- Good understanding of concepts such as authentication, authorization and
access control models.
- Excellent knowledge of TCP/IP and encryption (SSL) protocols and
understanding DDOS type attacks and remediation.
- Perform cyber fraud detection tasks, analyze fraud cases and develop new
detection strategies on emerging fraud techniques.
- Research, identify and offer suggestions to address and resolve issues
with a focus on cyber fraud detection and prevention.
- Provide expertise on the coordination, development, improvement and
implementation of the IT security risk management program and on risk
mitigation strategies
- Participate on and lead threat risk assessment projects, and new
initiatives
- Formulates architectural design, functional specifications, interfaces
and documentation of hardware or software systems considering system
interrelationships, operating modes and software or equipment
configurations.

Desired Skills:
Experience with using Splunk to write complex queries and alerts.
- Provide expertise and advice on threat risk assessments and business
impact assessments
- Highly versed in emerging threat methods and mitigation strategies.
- Versed in secure internetworking technologies, such as firewalls,
intrusion detection systems, intrusion prevention systems and VPNs as they
relate to the external security posture of a client organization.
- Ability to implement and adapt to change and prepared to learn new
processes
- Provides leadership in the investigation and remediation of complex and
technical security threats and the development of information security
guidelines, and controls.
- Provides leadership in the technical design, selection, and application
of the information systems resources to satisfy the security requirements
of the systems.
- CISSP is a plus

Experience:
Mid to Sr level. (5 - 10 years).
- Bachelor's degree and 5+ years of professional IT experience or
information security experience

Note: Please allow me to reiterate that I chose to contact you either
because your resume had been posted to one of the internet job sites to
which we subscribe, or you had previously submitted your resume to Axelon.
I assumed that you are either looking for a new employment opportunity, or
you are interested in investigating the current job market.****

If you are not currently seeking employment, or if you would prefer I
contact you at some later date, please indicate your date of availability
so that I may honor your request. In any event, I respectfully recommend
you continue to avail yourself to the employment options and job market
information we provide with our e-mail notices.****

Thank you,****

Clifton Jadoo


Axelon Services Corporation
44 Wall Street 18th Floor

New York, NY 10005
Phone: (212) 384-6508 or (877) 711-8700
Fax  : (212) 306-0191
clifton.jadoo at axelon.com

For more job opportunities: www.axelon.com****


If you would like to unsubscribe, please click
here<http://jobs.axelon.com/jobseekers/myjobs/emailmerge_optout.jsp?d=315f323239393133363636393436345f3934303939355f3130343932305f315f436c6966746f6e2b4a61646f6f&e=1ec&t11=1372455368111>
.



Lookup Candidate<http://jobs.axelon.com/employers/open_candidate.jsp?canid=981113729422991366694644656394789&teamid=0&docids=-1&enc=1>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.ale.org/pipermail/ale-jobs/attachments/20130628/5ed76d7c/attachment-0001.html>


More information about the Ale-jobs mailing list