I received this via email today.

This position is estimated to be approximately 5 months in duration with a possible extension of upwards of 18 months. 
 
The position description is as follows:  Please review and let me know if you are interested in pursuing this further, or if you should know of anyone who might be interested.  Thanks!  Danielle
 

 
BACKGROUND
Security Engineer/Analyst.  The primary responsibilities of the position will be to evaluate and implement security solutions and processes for an enterprise network and to contribute security expertise to ensure the successful implementation of the solutions.
 
 
SCOPE 
  •  Organize and research solutions for security projects.
  • Coordinate communication and collaboration across organizational boundaries.
  • Implement, configure and evaluate proposed vendor solutions in a test environment.
  • Provide documentation for successful production implementation and configuration of solutions.
  • Develop processes and documentation for monitoring and management of intrusion detection systems, security event correlation and wireless security.
  • Provide subject matter expertise to the security team in the areas of Intrusion detection, Unix, Linux, Solaris, AIX and Event Correlation.
  • Assist with resolution of Security vulnerabilities and process gaps as identified.
  • Assist with migration of security tasks in the Unix and Wireless to the Information Security Team.
 Qualifications
  • Requires a minimum of 3 years of technical security experience.
  • Requires proficiency setting up and evaluating systems in a test environment.
  • Requires proficiency with Unix operating systems
  • Requires analytical skills for troubleshooting and resolving issues.
  • Requires written and oral communication skills to effectively coordinate cross organizational projects and report results.
  • Requires experience and proficiency with technical security solutions, firewall, IDS and Anti-virus.
 
SCHEDULE
    Work hours not expected to exceed 40 hours per week.  Primary hours within normal 8:00 a.m. – 5:00 p.m. with flexibility as determined by project needs and approval of Information Security manager.
 
DELIVERABLES
  • Project Plan for evaluation of the following technologies
Security Event Correlation
  • Complete vendor comparison and testing on schedule.
  • Documented test results and comparisons of solutions.
  • Operational documentation detailing down to specific configuration parameters how the selected systems would be configured in a  production environment.
  • Project documentation including status reports as requested by Information Security manager. 
Thanks-
I'll look forward to hearing back from you soon-
Danielle  

 
Danielle David
Ajilon Consulting
danielle.david@ajilon.com
(o) 816.756.2800 x211
(c) 816.665.4235
"Not just IT.  Your IT."
www.ajilonconsulting.com 





James Riley, CISSP
ECC
816.737.6951


This e-mail and any attachments are intended only for the individual or company to which it is addressed and may contain information which is privileged, confidential and prohibited from disclosure or unauthorized use under applicable law. If you are not the intended recipient of this e-mail, you are hereby notified that any use, dissemination, or copying of this e-mail or the information contained in this e-mail is strictly prohibited by the sender. If you have received this transmission in error, please return the material received to the sender and delete all copies from your system.