Senior Info Security Analyst - Princeton, New Jersey

From: Paul Rohmeyer (prohmeyerat_private)
Date: Tue May 08 2001 - 07:22:49 PDT

  • Next message: Fab Siciliano: "Looking for work in the Philadelphia/NJ area"

    Senior Information Security Analyst
    
    Location:  Princeton, NJ
    
    Description:
    
    Icons Inc., a growing Information Security firm based 
    in Princeton, NJ is seeking an experienced Senior 
    Information Security Analyst to join our professional 
    services organization.  Security Analysts are 
    responsible for performing information security 
    assessments and audits following the Icons 
    methodology. The Security Analyst will work closely 
    with other team members as well as members of a 
    client's information security team to not only design 
    solutions, but to ensure the solution can be 
    implemented with the current and available 
    technology.  Analysts also provide oversight and 
    assistance in the implementation of network and 
    security solutions for clients.  Based in our Princeton 
    headquarters, the position will require travel to our 
    clients' sites as needed.
    
    
    Requirements:
    
    The position requires a minimum of 3 years of related 
    experience, preferably as part of a professional 
    services team.  The candidate should have 
    completed a four-year degree or equivalent work 
    experience, graduate degree preferred.  Excellent 
    communications and interpersonal skills are a must.  
    The candidate should have experience in the 
    following:
    
    ** Enterprise security assessment and auditing 
    procedures, from both technical and business 
    perspectives
    
    ** Secured messaging
    
    ** Security auditing tools such as nmap, dig, sniffit, 
    ethereal, cybercop, and ISS Scanner
    
    ** Commercial VPN technology and IPSEC
    
    Additionally, the candidate should have interest in and 
    be familiar with the following:
    
    ** COTS network and host-based IDS technologies 
    and products such as ISS RealSecure and Cisco
    
    ** Current firewall technologies including packet 
    filtering, statefull inspection, application level proxies, 
    and the large commercial firewall products, such as 
    Checkpoint or Axent
    
    ** Authentication systems including network based, 
    token-based, public-key based, and symmetric key 
    systems, such as Kerberos
    
    ** Unix systems and Windows NT security
    
    ** IP network design and deployment including 
    installation of routing and switching equipment and 
    familiarity with dynamic routing protocols
    
    Please send all inquiries to prohmeyerat_private
    
    Paul Rohmeyer
    Icons, Inc.
    



    This archive was generated by hypermail 2b30 : Tue May 08 2001 - 07:41:30 PDT