OT: security/unix position
JARiley at dstsystems.com
JARiley at dstsystems.com
Wed Jun 22 12:19:42 CDT 2005
I received this via email today.
This position is estimated to be approximately 5 months in duration with a
possible extension of upwards of 18 months.
The position description is as follows: Please review and let me know if
you are interested in pursuing this further, or if you should know of
anyone who might be interested. Thanks! Danielle
Security Engineer/Analyst. The primary responsibilities of the position
will be to evaluate and implement security solutions and processes for an
enterprise network and to contribute security expertise to ensure the
successful implementation of the solutions.
Organize and research solutions for security projects.
Coordinate communication and collaboration across organizational
Implement, configure and evaluate proposed vendor solutions in a test
Provide documentation for successful production implementation and
configuration of solutions.
Develop processes and documentation for monitoring and management of
intrusion detection systems, security event correlation and wireless
Provide subject matter expertise to the security team in the areas of
Intrusion detection, Unix, Linux, Solaris, AIX and Event Correlation.
Assist with resolution of Security vulnerabilities and process gaps as
Assist with migration of security tasks in the Unix and Wireless to the
Information Security Team.
Requires a minimum of 3 years of technical security experience.
Requires proficiency setting up and evaluating systems in a test
Requires proficiency with Unix operating systems
Requires analytical skills for troubleshooting and resolving issues.
Requires written and oral communication skills to effectively coordinate
cross organizational projects and report results.
Requires experience and proficiency with technical security solutions,
firewall, IDS and Anti-virus.
Work hours not expected to exceed 40 hours per week. Primary hours
within normal 8:00 a.m. – 5:00 p.m. with flexibility as determined by
project needs and approval of Information Security manager.
Project Plan for evaluation of the following technologies
Security Event Correlation
Complete vendor comparison and testing on schedule.
Documented test results and comparisons of solutions.
Operational documentation detailing down to specific configuration
parameters how the selected systems would be configured in a production
Project documentation including status reports as requested by Information
I'll look forward to hearing back from you soon-
danielle.david at ajilon.com
(o) 816.756.2800 x211
"Not just IT. Your IT."
James Riley, CISSP
This e-mail and any attachments are intended only for the individual or
company to which it is addressed and may contain information which is
privileged, confidential and prohibited from disclosure or unauthorized use
under applicable law. If you are not the intended recipient of this
e-mail, you are hereby notified that any use, dissemination, or copying of
this e-mail or the information contained in this e-mail is strictly
prohibited by the sender. If you have received this transmission in error,
please return the material received to the sender and delete all copies
from your system.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Kclug