[Close] 

Security Engineer

Company Name:
Ebit Information Systems
We are not accepting resumes from third parties and sponsorships are not provided for this role. This position also requires the employee to be on-site.
This is a 2-month contract opportunity.

Ebit connects IT professionals with the best career opportunities at the most sought after companies. Ebit has 30+ years of combined recruiting expertise and can help you "Get your Career in Gear".

Why work with us?
Our employees are paid weekly.
We invest in our people, because we care. Benefits are EXCELLENT, Subsidized and affordable! Healthcare (we pay 60% of the premium), dental, vision and life insurance, 12 days PTO/year, paid holidays, etc.
Find a friend, colleague, or family member with an IT background and we?ll pay you $599 for each referral we hire!
Our Client Offers:

Excellent healthcare insurance.
Ability to telecommute 2-3 days a week.
NO PTO, take what you need policy.
Big training budget.
Cutting edge technology.
Summary:

Our client is seeking to add a Security Operations Engineer to their Louisville team. This individual will oversee procurement, implementation, administration, monitoring and examination of security management tools needed to discover vulnerabilities and correlate incidents. This person will also be responsible for incident detection, investigation, mitigation, documentation, logging, and reporting. This is a 2-month contract opportunity.

Information Security Monitoring:
Perform scans on computer systems, perform analysis of the results to determine all security vulnerabilities and then initiate appropriate remediation steps.
Provide implementation recommendations after reviewing security testing results.
Monitoring and testing compliance of security controls.
Monitor and respond to network threats and vulnerabilities across the network.
Document all suspected information security events and provide recommendations for corrective actions.
Report performance against established security metrics by monitoring, measuring, testing, and reporting on the effectiveness and efficiency of IS controls.
Provide 24x7 support.
Implement and manage intrusion detection/prevention systems for proactive monitoring of security threats.
Conduct reviews to measure compliance with policy, assist in audits for VISA CISP and MasterCard SDP requirements.
Implement security tools for Windows AD, Exchange, Sun Solaris, and UNIX.
Project Responsibilities:
Coordinate with IT and business units to assess, implement, and monitor IT related security risks.
Assist in design and implementation of Information Security services
Review the development, testing and implementation of security plans.
Provide technical experience and support to client and IT management in risk assessments and implementation of appropriate IS procedures and products.
Educate staff on security compliance and promote a culture of security awareness.

Requirements:
Bachelor's degree in Computer Science or related field.
5 + years of experience in Information Security.
5+ years' experience managing Security Information Event Management (SIEM) deployment.
Proficient managing an encryption program.
5+ years' experience with application/network/OS and DB vulnerability scanning.
Detailed understanding of proxy and stateful firewalls, web application firewalls, file level encryption, DLP, RSA, LDAP, Email Gateways, IDS, and IDM.
At least one of the following (more certainly desired):
CCNA, MCSE, Cisco Security Specialist, CISSP.
Experience with Intrusion Detection and Prevention, Enterprise Anti-Virus, Threat management, vulnerability management.
UNIX and Windows experience.
Excellent written communication skills: ability to write reports, provide recommendations, analyze summaries and project roadmaps.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.