Wednesday, April 4, 2012

[Outsource:60909] Security Analyst in Lansing, MI

Hi Partner,

Revert back resume at fkhan@infinite-usa.com

Client : DTMB / State of MI
Location : Lansing, MI
Duration : 12 months + ( with 2 One year extension option )
Rate : DOE on C2C / 1099

Due Date : 04-06-2012 / 12 noon

The State of Michigan Department of Technology Management and Budget
(DTMB Telecom) has ongoing firewall security projects to support
telecom security firewall operations. This position is a Staff
Augmentation engagement in the Design Services Section. The position
will provide subject matter expertise to support these security
projects.
The primary function of this position will include, but is not limited
to:

• Reverse engineer data communications issues
• Design portions of the infrastructure for redundancy and
standardization
• Assist operational staff with complex installs and advanced
troubleshooting
• Assist the state with the latest firewall strategy and
implementation strategy
• Insure configuration consistency of enforcement points and
management standards

A. Background on the work requested
Skill sets and Technology experience includes, but is not limited to
the following:
• Check Point (PSO and Secure Platforms)
• VPN
• Cisco Pix, ASA, and CSM
• RSA
• Session Border Control (SIP and H.323)
• Strong Layer 2 and 3 back ground
• Juniper Firewalls
• Network Analysis

Security Analyst
• Plans and assesses the security of an agency's system and
platform(s).
• Plans and executes the steps to determine the security requirements
of a project for an agency's platform(s).
• Assesses the risk of a program area based on likelihood of threat
and impact of security breach.
• Analyzes and recommends plans to test the effectiveness of a
security implementation.
• Evaluates an agency's security plan/implementation against all
Michigan security standards and recommends steps to align the agency
with these standards.
• Maintains application platform security standards.
• Implements upgrades and modifications to existing information
security hardware and software.
• Disaster recovery and business continuation planning.
• Troubleshoots network security access problems and implements
network security policies and procedures.
• Ensures network (LAN/WAN, telecommunications, and voice) security
access and protects against unauthorized access, modification, or
destruction.
• Manages all network security systems for LAN/WAN,
telecommunications, and voice system.
• Candidate should have knowledge of commonly used concepts,
practices, and procedures within information technology.

Thanks,
Firoz K
Infinite Computing Systems
319-892-3186 x 229
Cedar Rapids, IA
fkhan@infinite-usa.com

--
Introduce business in 3800 cities. How?
=====================================================
Thanks for using group.
Moderator

1) This group is managed by www.BRCIndex.blogspot.com
2) Post your message with your linkedin Profile (Visit linkedin.com) to confirm your identity and refer business.
3) Visit www.BRCIndex.blogspot.com (3800 Business Referral Club)
4) Reply to two message before posting new one.
5) Donot post same message in all 3800 business Referral Club.

You received this message because you are subscribed to the Google Groups "Outsource" group.
To post to this group, send email to Outsource@googlegroups.com
To unsubscribe from this group, send email to Outsource-unsubscribe@googlegroups.com
For more options, visit this group at http://groups.google.com/group/Outsource

No comments:

Post a Comment

PAID CONTENT