[ALE-jobs] Fwd: Cyber Security Engineer - Chicago, IL, Dallas, TX and Charlotte, NC. No Corp to Corp.

Jim Kinney jim.kinney at gmail.com
Wed May 29 22:04:12 EDT 2013


---------- Forwarded message ----------
From: "Clifton Jadoo" <clifton.jadoo at axelon.com>
Date: May 29, 2013 8:44 PM
Subject: Cyber Security Engineer - Chicago, IL, Dallas, TX and Charlotte,
NC. No Corp to Corp.
To: <jim.kinney at gmail.com>
Cc:

05/29/13 5:36 PM****

Hello,

      My name is Clifton and I'm a recruiter at Axelon Services Corporation.
We have your resume on file and I thought you may be interested in an
opportunity we currently have available for a *Cyber Security Engineer *with
a major Financial and Banking company. *This is an hourly W2 contract to
hire opportunity requiring the candidate to work on site in Chicago, IL,
Dallas, TX and Charlotte, NC. No Corp to Corp.*

*Please review the job description below. If you are qualified and
interested in pursuing this opportunity, please send me an e-mail with an
updated resume, if you do respond via e-mail please include a daytime phone
number so I can reach you.  *****

Please review the job description below.  If you are qualified and
interested in pursuing this opportunity, please call me at (212) 384-6508ASAP.
 You may also send me an e-mail, if you do respond via e-mail please
include a daytime phone number so I can reach you.  In considering
candidates, time is of the essence, so please respond ASAP.  ****

*If** *you *do not *feel like you are a good fit, *but* you know someone,
perhaps junior to you, who is looking for a temporary assignment without a
heavy skill set required, please feel free to forward this email onto them.
I also encourage you to visit our website at www.axelon.com for all of our
job openings.  ****

*Cyber Security Engineer*

*Responsibilities: *Looking for a person with passion for cyber security
with attention to details and drive to improve. The person’s
responsibilities would include to perform forensic analysis of potential
fraudulent activities, identify weaknesses in existing application and
process, come up with solutions to enhance existing products. Ability to
work independently with minimal supervision. Act as a security adviser to
architecture and development teams. Ability to develop data structures and
identify patterns that can be used to detect fraudulent activity.

*Required Skills: *
- Proficient in understanding and writing complex regular expressions.
- Development skills including shell and Perl scripting, ability to write
SQL, Java/J2EE development with emphasis on secure coding, systems
programming.
- Good understanding of concepts such as authentication, authorization and
access control models.
- Excellent knowledge of TCP/IP and encryption (SSL) protocols and
understanding DDOS type attacks and remediation.
- Perform cyber fraud detection tasks, analyze fraud cases and develop new
detection strategies on emerging fraud techniques.
- Research, identify and offer suggestions to address and resolve issues
with a focus on cyber fraud detection and prevention.
- Provide expertise on the coordination, development, improvement and
implementation of the IT security risk management program and on risk
mitigation strategies
- Participate on and lead threat risk assessment projects, and new
initiatives
- Formulates architectural design, functional specifications, interfaces
and documentation of hardware or software systems considering system
interrelationships, operating modes and software or equipment
configurations.

*Desired Skills:*
Experience with using Splunk to write complex queries and alerts.
- Provide expertise and advice on threat risk assessments and business
impact assessments
- Highly versed in emerging threat methods and mitigation strategies.
- Versed in secure internetworking technologies, such as firewalls,
intrusion detection systems, intrusion prevention systems and VPNs as they
relate to the external security posture of a client organization.
- Ability to implement and adapt to change and prepared to learn new
processes
- Provides leadership in the investigation and remediation of complex and
technical security threats and the development of information security
guidelines, and controls.
- Provides leadership in the technical design, selection, and application
of the information systems resources to satisfy the security requirements
of the systems.
- CISSP is a plus

*Experience:*
Mid to Sr level. (5 - 10 years).
- Bachelor's degree and 5+ years of professional IT experience or
information security experience

Note: Please allow me to reiterate that I chose to contact you either
because your resume had been posted to one of the internet job sites to
which we subscribe, or you had previously submitted your resume to Axelon.
I assumed that you are either looking for a new employment opportunity, or
you are interested in investigating the current job market.****

If you are not currently seeking employment, or if you would prefer I
contact you at some later date, please indicate your date of availability
so that I may honor your request. In any event, I respectfully recommend
you continue to avail yourself to the employment options and job market
information we provide with our e-mail notices.****

Thank you,****

Clifton Jadoo


Axelon Services Corporation
44 Wall Street 18th Floor

New York, NY 10005
Phone: (212) 384-6508 or (877) 711-8700
Fax  : (212) 306-0191
clifton.jadoo at axelon.com

For more job opportunities: www.axelon.com****


If you would like to unsubscribe, please click
here<http://jobs.axelon.com/jobseekers/myjobs/emailmerge_optout.jsp?d=315f323239393133363636393436345f3932333533395f3130343932305f315f436c6966746f6e2b4a61646f6f&e=1e7&t11=1369867538209>
.



Lookup Candidate<http://jobs.axelon.com/employers/open_candidate.jsp?canid=841782533422991366694647324467709&teamid=0&docids=-1&enc=1>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.ale.org/pipermail/ale-jobs/attachments/20130529/1c6aeb83/attachment.html>


More information about the Ale-jobs mailing list