[Close] 

Information Security Consultant

Company Name:
CyberSearch, LTD
Information Security Consultant
Location : Buffalo Grove, IL
Rate: $60-65/hr - all inclusive
Start: ASAP
Interview: phone
Length: 6 months

What type of Security architecture / frameworks have they worked on before
What type of Intrusion detection tools/processes have they used before
Knowing the difference between 'Authentication' and 'Authorization'
Most importantly "Have they worked with the Application teams to Enforce security", as the resumes we are seeing are mostly working on Security aspects with the clients and business
Well versed with different layers/aspects of Data Security
Network (Lan/DMZ) level
Application level
Unix level
User Access level (ex: User Provisioning, Role Codes)
Finally, knowledge on Risk management tools such as Archer etc.,

Required Qualifications
-Development background - within java-based applications, or IT application support
-Application Security background
-7-10 years in computer security
-Experience with compliance and audit regulations - PII, PHI, SOX, PCI, HIPPA
-Vulnerability tracking and experience doing server scans and qualys scans
-Understands ITIL, service management and quality management practices
-Must have background and understanding of networking and network security technologies such as Firewalls, IDS/IPS, Proxies, Content Filtering, Application security, monitoring/management, Vulnerability management, risk and compliance.
-Intermediate TCP/IP networking knowledge (including networking architecture, firewall configuration, and DMZ layout).
-Advanced Web technology knowledge (i.e., HTTP, HTML, SQL)
-Advanced knowledge of the detection, exploit, and prevention of software vulnerabilities (i.e., SQL Injection, XSS, buffer overflows)
-Demonstrated proficiency working on all phases of the SDLC

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Information Security Analyst - Cyber Security
Des Plaines, IL Red Sky Consulting
Splunk Business Consultant
Scott Air Force Base, IL ARRAY Information Technology
Supplier Management Consultant
Northbrook, IL Computer Resource Solutions
Senior Analyst, Technology Data & Information ...
Chicago, IL Jones Lange Lasalle Inc.
Senior Analyst, Technology Data & Information ...
Chicago, IL JLL
Senior Analyst, Technology Data & Information ...
Chicago, IL JLL