Security Consultants

Company Name:
Request Technology-Craig Johnson
Security Consultants Must have a Bachelors Degree and 50% Travel is Required There is no sponsorship for this permanent role Prestigious Professional
Firm is currently seeking Security Consultants. Candidate identifies areas of IT risk in the client environment and opportunities to help them to improve information security, and business processes. Qualifications:- Prior project management and supervisory skills ideal. - Ability to work in a team environment and foster client relationships. - Understanding of the importance of business ethics. - Sound job administration skills. - Above-average written and verbal communication skills, including documentation of findings and recommendations. - Analytical skills. - Ability to handle highly confidential information in a strictly professional manner. - Ability to maintain professional demeanor in times of high stress. - Develop and apply proficiency with policies and methodologies. - Apply understanding of business processes and technical skills to successful completion of projects. - Develop understanding of project requirements and client's business. Technical Knowledge and Skills- Proficiency in utilization of information security tools such as Nessus, Kismet, Airsnort, NMAP, Ethereal, WebInspect and Nikto, and manual techniques to exploit vulnerabilities in the OWASP top 10 including but not limited to cross-site Scripting, SQL injections, session hi-jacking and buffer overflows to obtain controlled access to target systems. - Ability to perform network traffic forensic analysis, utilizing packet capturing software, to isolate malicious network behavior, inappropriate network use or identification of insecure network protocols. - 3 years hands on experience in one or more of the following Operating Systems: Windows Server 2003/2000/NT, Linux and UNIX. - 3 years practical experience in TCP/IP Networking. - A diverse skill base in both Information Systems and Information Security which address organizational structure and administration practices, system development and maintenance procedures, system software and hardware controls, security and access controls,
operations, environmental protection and detection, and backup and recovery procedures. - Attack and Penetration experience in testing of Internet infrastructure and Web-based applications utilizing manual and automated tools. - Knowledge of information system architecture and security controls (ie Firewall and border Router configurations, operating systems configurations, wireless architectures, databases, specialized appliances and information security policies and procedures). Education and Professional Credentials- Bachelor's degree in a relevant discipline (Computer Information Systems, Information System Technologies, Management Information Systems). - Minimum GPA 3.0. - 3 years in a related field, preferably in professional services and/or industry. Professional Certification such as CISSP, CISM, GSEC, GIAC, CEH, CPT are strongly preferred. MYK62683JR

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.