OT: security/unix position

JARiley at dstsystems.com JARiley at dstsystems.com
Wed Jun 22 12:19:42 CDT 2005

 I received this via email today.

This position is estimated to be approximately 5 months in duration with a 
possible extension of upwards of 18 months.  
The position description is as follows:  Please review and let me know if 
you are interested in pursuing this further, or if you should know of 
anyone who might be interested.  Thanks!  Danielle 
Security Engineer/Analyst.  The primary responsibilities of the position 
will be to evaluate and implement security solutions and processes for an 
enterprise network and to contribute security expertise to ensure the 
successful implementation of the solutions.
 Organize and research solutions for security projects.
Coordinate communication and collaboration across organizational 
Implement, configure and evaluate proposed vendor solutions in a test 
Provide documentation for successful production implementation and 
configuration of solutions. 
Develop processes and documentation for monitoring and management of 
intrusion detection systems, security event correlation and wireless 
Provide subject matter expertise to the security team in the areas of 
Intrusion detection, Unix, Linux, Solaris, AIX and Event Correlation. 
Assist with resolution of Security vulnerabilities and process gaps as 
Assist with migration of security tasks in the Unix and Wireless to the 
Information Security Team.
Requires a minimum of 3 years of technical security experience. 
Requires proficiency setting up and evaluating systems in a test 
Requires proficiency with Unix operating systems 
Requires analytical skills for troubleshooting and resolving issues. 
Requires written and oral communication skills to effectively coordinate 
cross organizational projects and report results. 
Requires experience and proficiency with technical security solutions, 
firewall, IDS and Anti-virus.
    Work hours not expected to exceed 40 hours per week.  Primary hours 
within normal 8:00 a.m. – 5:00 p.m. with flexibility as determined by 
project needs and approval of Information Security manager.
Project Plan for evaluation of the following technologies
Security Event Correlation
Complete vendor comparison and testing on schedule. 
Documented test results and comparisons of solutions. 
Operational documentation detailing down to specific configuration 
parameters how the selected systems would be configured in a  production 
Project documentation including status reports as requested by Information 
Security manager.  
I'll look forward to hearing back from you soon-
Danielle David
Ajilon Consulting
danielle.david at ajilon.com
(o) 816.756.2800 x211
(c) 816.665.4235
"Not just IT.  Your IT."

James Riley, CISSP 

This e-mail and any attachments are intended only for the individual or
company to which it is addressed and may contain information which is
privileged, confidential and prohibited from disclosure or unauthorized use
under applicable law.  If you are not the intended recipient of this
e-mail, you are hereby notified that any use, dissemination, or copying of
this e-mail or the information contained in this e-mail is strictly
prohibited by the sender.  If you have received this transmission in error,
please return the material received to the sender and delete all copies
from your system.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://kclug.org/pipermail/kclug/attachments/20050622/1943e86e/attachment.htm

More information about the Kclug mailing list