PLEASE SHARE PROFILES AT *[email protected]*
<[email protected]>

Dear Recruiter,

Hope you are doing fine. We have an urgent requirement for *"Cyber Threat
Engineer" || Allen TX *for a *6+ months Contract* role. Please go through
the same and let us know if you have anyone matching the below role. Please
send your responses to [email protected] with your candidate
resume and contact details.



*Position: **Cyber Threat Engineer*

*Location: **Allen TX*

*Duration: **6+ months Contract *

*EXPERIENCE REQUIRED : MIN 9 YEARS *

*Job Requirements *

·         *Extensive knowledge of VM scanning tools - Qualys *

·         *Knowledge of automation using Service Now *

·         *4+ years in offensive security (penetration
testing/vulnerability scanning) *

·         4+ years network engineer and architectural design

·         2+ years' experience in one of the following:

·         Firewall management and operations

·         Network operations or security engineering

·         System administration on Unix, Linux, or Windows

·         Advanced cyber threat intelligence

·         Scripting and automation

*Educational Requirements*

·         Bachelor’s degree in a Computer Science, related technical
discipline or equivalent experience.

·         Minimum of 4 years related experience with security in operating
systems, firewalls or networks

·         *One or more technical certification such as CEH, CISSP, CISM are
also optimal *

*Qualifications*

·         Understanding in, or working within one or more regulatory areas
including, but not limited to ISO 17799 and/or 27001, GLBA, HIPPA, FISMA,
FedRAMP, etc.

·         Knowledge and working understanding of security technology such
as *Firewalls, IDS/IPS Systems, vulnerability management systems,
enterprise level network architecture*, perimeter protection strategies,
security policy structure, penetration testing, and application development
methodologies

·         Demonstrates a solid understanding of *vulnerability management
solutions* from a strategic architecture perspective and how VM solutions
operate effectively in a global distributed enterprise

·         Able to interpret architectural, dataflow and technical diagrams

·         Able to create and recommend remediation for components of
information security policies, processes and procedures

·         Knowledgeable of information security programs, security policy
creation and review

·         Able to complete a security risk assessment on various technology
implementations

·         Ability to create detailed, professional documentation to be
delivered to clients and/or management

·         Excellent verbal and written skills and must be able to
communicate effectively with a variety of clients with varying degrees of
technical expertise

·         Good presentation skills for presenting security information and
for discussions with auditors, assessors, and clients.

·         Self-starter with the ability to perform tasks with little or no
supervision





Thanks and Regards,

Varun Jain

Diverse Lynx LLC



Note : If I missed your call then drop me a mail . ( best way to reach me
is via mail  )

Phone: 732-452-1006  ext 288

Fax: 732-452-0684

Email – *[email protected]* <[email protected]>

*LinkedIn -  *https://www.linkedin.com/in/varun-jain-928487b9/\
<https://www.linkedin.com/in/varun-jain-928487b9/>

Gtalk – [email protected]





Diverse Lynx LLC |300 Alexander Park| Suite #200|Princeton , NJ 08540



“For our open jobs please visit Diverselynx Jobs
<http://jobs.diverselynx.com/candidates/myjobs/searchjobsdone.jsp?a=9xjdnw687b7a7nvvdyut936kpjlgy0023blrozaecads0pdnwppcswnaaku8ji2g>
”





Note: Diverse Lynx LLC is an Equal Employment Opportunity employer. All
qualified applicants will receive consideration for employment without any
discrimination. All applicants will be evaluated solely on the basis of
their ability, competence, and performance of the essential functions of
their positions. We promote and support a diverse workforce at all levels
in the company. This is not an unsolicited mail and if it is not intended
for you or you are not interested in receiving our e-mails please reply
with a "remove" in the subject line and mention all the e-mail addresses to
be removed with any e-mail addresses, which might be diverting the e-mails
to you. We are extremely sorry if our email has caused any inconvenience to
you.

-- 
You received this message because you are subscribed to the Google Groups 
"Android Developers" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at https://groups.google.com/group/android-developers.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/android-developers/CAAGkmiy%3DYnPqbqhnJLLAr%2B5%2B4K9t4Q3cxMx-5tC_uM%3DA466m4Q%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to