Sr. Information Security Scientist, Risk Assessments - Chicago, IL - up to $120,000 - Greythorn

From: Ben Weber (ben.weberat_private)
Date: Wed Oct 23 2002 - 16:30:00 PDT

  • Next message: anon moose: "VP of Marketing for Security Startup - Silicon Valley"

    Information security professionals,
    
    A very large and stable client of mine in Chicago is once again looking
    for a senior risk assessment/vulnerability research professional.  This
    is a full time role and we are looking for the right individual to start
    before the end of the 2002 calendar year. The req. follows: 
    
    Responsibilities:
    
    Implement and fine-tune enterprise wide risk assessment, vulnerability
    research, and incident response services (develop process/methodology,
    infrastructure/technology tools, skills, knowledge base, documentation,
    resources, etc.).
    
    Execute the risk assessment process for new IT infrastructure
    development projects and existing production systems and applications on
    a continuous basis (Includes penetration testing and vulnerability
    assessment versions of the risk assessment process).
    
    Execute the vulnerability research process on a continuous basis.
    
    Assist with the development and execution of the incident response
    (CIRT) process.
    
    Qualifications:
    
    In depth hands-on experience in as many of the following technologies as
    possible:
    
    *	Built-in operating system security services & functions: NOKIA
    IPSO, Sun Solaris, MS Windows NT and Windows 2000, IBM AIX, IBM AS/400,
    S/390, Cisco IOS, Foundry OS or others.
    *	Built-in application security services & functions: Oracle,
    DB/2, MS Active Directory, iPlanet LDAP, MS IIS, MS Integration Server,
    MS Exchange, IBM WebSphere, SAP R/3, MS BizTalk Server or others.
    *	Application development & execution framework security
    functions: Sun J2EE, MS COM+, MS .NET, OMG's CORBA, or others.
    *	Vulnerability assessment tools: ISS Internet Scanner, ISS Host
    Scanner, Nessus, McAfee CyberCop, or others.
    *	Computer & electronic equipment forensics tools.
    
    Core-Competencies:
    
    ·	IPC - Inter-Process Communications
    ·	Kernel Concepts (Exception Handling on NT vs. Unix, Interrupt
    Schemes, etc...)
    ·	Low-Level Network Programming (Raw Sockets, libpcap, winpcap,
    etc...)
    ·	Strong Debugging Skills
    ·	Strong Reversing Skills 
    ·	Strong Web Programming Skills
    
    Minimum of 5 years experience in information security solution
    engineering and security service delivery. 
    BS in Computer Science or equivalent technical degree required.
    Experience in leading penetration testing, risk and/or vulnerability
    assessment engagements required.
    Consulting industry background and experience a strong plus.  
    Stellar technical writing, documentation development, and visual
    communication skills.
    Excellent interpersonal and verbal communication skills.
    
    For details and a confidential conversation about this role, please
    contact me via the following and thank you all for your time.
    
    Ben Weber
    Manager, Information Security Recruitment Practice
    Greythorn
    Phone:  + 1 425 635 0300
    mailto:ben.weberat_private
    http://www.greythorn.com/
    
    London  Sydney  Melbourne  Seattle  Canberra
    
    
    ************************************************************************
    **********
    
    This email is confidential and intended only for the stated
    addressee(s).
    If you receive this in error, please inform us immediately and delete it
    and
    all copies from your system. Any unauthorized disclosure, use, or
    dissemination, either whole or partial, is prohibited. Any views or
    opinions
    contained in this email are those of the author and are not necessarily
    endorsed by Greythorn, and the company cannot be held responsible for
    any
    misuse. This email and its attachments are believed to be free of any
    virus,
    or defect, but it is the responsibility of the recipient to ensure this.
    Greythorn do not accept responsibility or liability for any loss or
    damage
    arising in any way from its receipt or use or for any errors or
    omissions in
    its contents which may arise as a result of its transmission.  This
    email is
    covered by Greythorn's Terms and Conditions of Business, a copy of which
    can be viewed on our website, or on request.
    
    ************************************************************************
    ***********
    
    
    
    
    **********************************************************************
    This email and any files transmitted with it are confidential and
    intended solely for the use of the individual or entity to whom they
    are addressed. If you have received this email in error please notify
    the system manager.
    
    This footnote also confirms that this email message has been swept by
    MIMEsweeper for the presence of computer viruses.
    
    www.mimesweeper.com
    **********************************************************************
    



    This archive was generated by hypermail 2b30 : Thu Oct 24 2002 - 15:34:07 PDT