blog trackingRealtime Web Statistics LEAD Archives - Page 3 of 3 - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘LEAD’

Lead Developer/Programmer / Confidential / San Francisco, CA

Confidential/San Francisco, CA (Soma)

We are a new startup, with ample funding and a legendary new product that needs help being built. You will be responsible for being on the founding team that codes thousands of lines of code to get the platform up and running through beta into a scalable viral must-have product in the web 2.0 industry. You will be a founding member, so you will have the opportunity for real equity, and a chance to be proud of a product that you created.

Candidate must be familiar with systems architecture, backend, frontend, and being a hacking/coding fiend to create a clean, useable, working product that you are proud of.
Salary is competitive and based on experience or if you can show up our pretty epic chief product architect in coding. Please submit your resume in the first email in either pdf or word format and outline why you are the best person for the job.

Please note, we are aware of the various backgrounds of an amazing programmer/systems architect, so don't feel dissuaded by the posted career level. If you've been coding as long as you can remember, know you're the best of the best, and can prove it, we want you. Our offices are centrally located in San Francisco, near South Beach.

REQUIREMENTS

Front end

Been playing with HTML/JS/CSS since high school or before

Fluent at Javascript

Thinks they can write apps that rival native in a modern browser

An eye for detail, no trouble quickly matching a photoshop mock pixel for pixel in HTML/CSS

Written or contributed to several sophisticated web apps with a server component

Understands the challenges facing modern web apps

A BS level understanding of computer science.

Strong knowledge of a backend language: Java, PHP, Python, etc…

An internship from a legit tech company…Google, Facebook, Microsoft, Yahoo, Amazon, etc…

Backend

A beast at PHP (or good enough to talk me out of using PHP), Java, and C++

Knows MySQL and understands databases in theory

Understands the backends of modern web apps

A BS in Comp Sci

Job experience from a legit tech company…Google, Facebook, Microsoft, Yahoo, Amazon, etc…

Experience with machine learning algorithms

Ready to build a website from scratch

Apply To Job

View full post on Wired Jobs

View full post on National Cyber Security

SI teen suicide may lead to cyber bullying law

Bronx Senator Jeff Klein is introducing a bill that would revise the state’s harassment laws to cover electronic bullying.

View full post on cyber stalking – Yahoo! News Search Results

View full post on National Cyber Security

WiFi, DDoS Vulnerabilities, Cyber-Attacks Lead Week’s Security News

Software security flaws dominated news headlines this week, as security experts discussed the implications of a vulnerability that was found in several Web application frameworks.

View full post on germany cyber attack – Yahoo! News Search Results

View full post on National Cyber Security

Cellphone-related fatal wrecks lead families to push for change

Take a look around the next time you’re at a stoplight. Chances are, you’ll see someone on a cellphone. These families are trying to convince drivers to put their phones away. The deaths of loved ones have turned them into advocates.

View full post on cellphone security – Yahoo! News Search Results

View full post on National Cyber Security

Principal Software Development Engineer, Lead

Location: Redmond, WA, US
Job ID: 747704-36268
Division: Corporate Research Development

The Technical Strategy and Incubation team is seeking a high achieving Principal Software Development Engineer Lead to lead the team in building a next generation UI/Graphics platform. This incubation team is chartered with pursuing strategic opportunities which are difficult to address incrementally with existing systems, such as UI responsiveness and security, rich applications that span devices, new web-centric programming models, and effective use of GPUs and many core.

The successful candidate is a Principal Software Development Engineer who is passionate about building next-generation technologies, enjoys startup environments, and loves to code. The candidate should have 5+ years’ management experience and 10+ years’ software engineering experience, ideally with experience in areas such as operating system or browser development.

Our team is a small hand-picked team of developers passionate about building real systems that extend the current thinking in Operating Systems and Platform technology. The Technical Strategy and Incubation team has the unique aspect of being outside of existing product groups, allowing us to pursue experimental ideas and solutions that may be impractical for existing products due to legacy demands and business commitments. This is a high visibility position with impact in the incubation, in the company, and in the overall market.

Because this is an incubation group, a candidate must have a high tolerance for uncertainty and changes in direction. Comfort with low-level systems development and expert proficiency in a C-like language are required. Additional desirable, but not mandatory, skills include familiarity with GPU programming and rendering techniques, numerical algorithms and geometry, asynchronous programming models, data parallelism, concurrency, data synchronization, data-driven UI frameworks, and real-time collaboration.

CR:CorpRD

TO APPLY

Click here to apply
-
Please mention that you saw the job on Wired

Article source: http://jobs.wired.com/job/principal-software-development-engineer-lead-redmond-wa-microsoft-a942e8a4b4/?d=1&source=rss_page

View full post on National Cyber Security

SAP SECURITY LEAD VIRSA GRC SOD SOX FIREFIGHTER

SAP SECURITY LEAD  VIRSA  GRC  SOD  SOX  FIREFIGHTER 

Major firm in Montvale, New Jersey is seeking a SAP Security Lead for a long term contract to hire opportunity. The ideal candidate will be responsible for planning and executing security tasks related to maintenance of SAP systems that the firm manages for various divisions that include ECC, Business Warehouse (BW), Supply Chain Planning (SCM), Enhanced Warehouse Management (EWM), eCommerce and Solution Manager. The selected candidate will be lead the Security team that includes on-site and off-shore personnel and support both Production Environments and Project Initiatives.

The candidate may be required to work flexible hours, including weekends and holidays to perform tasks off-hours if required, and willing to participate in 24/7 duty coverage.

Specific responsibilities will include:

Create, maintain and enforce Security standards and procedures

Supervise work of and provide guidance to on- and off-shore SAP Security Analysts

Administer SAP GRC tools (formerly known as Virsa)

Perform SOD analysis on user ID’s and roles

Maintain Risks, Rules and Mitigating Controls

Interact with off-shore and near shore support teams: Basis, development, application production support, business liaison.

Organize and manage security tasks for on-going projects

Debug security authorization issues

Provide regular status reports to various levels of management

Required Skills for this position will include:

Minimum 5-7 years of experience administering SAP Security various modules, including JAVA

Knowledge of SAP GRC tools

Has participated in a minimum three full life cycle SAP implementations

Excellent verbal and written communication skills

Experience in estimating and managing projects

Experience in production support

Preferred Skills/Qualifications:

Knowledge of Sarbanes-Oxley best practices

Working knowledge of SharePoint, experience in creating complex presentations and advanced spreadsheets

Bill.Stevens@PRITechnology.com

www.PriTechnology.com

Article source: http://jobview.monster.com/SAP-SECURITY-LEAD-VIRSA-GRC-SOD-SOX-FIREFIGHTER-Job-Montvale-NJ-US-103811533.aspx

View full post on National Cyber Security

Mac Malware, DoS Tools, Cyber-War Lead Week’s Security News

Mac malware dominated the news this week, as security researchers uncovered a new Trojan capable of hijacking Mac OS X systems and launching denial-of-service attacks on another server, downloading additional malware on the infected system and providing attackers with remote access on to the computer.
The Tsunami Trojan was a version of an older backdoor Trojan for the Linux operating system. While Windows Trojans have been re-packaged for the Mac before, Tsunami is likely the first to come over from the Linux world. The malware has already been mutating, with hackers adding new capabilities. There are versions attacking both 64-bit and 32-bit Intel x86 and PowerPC Mac computers.

A new denial of service attack tool targeting SSL servers was released this week. The THC-SSL-DOS tool exploits known issues with how SSL connections work to make it possible to launch denial-of-service attacks against a server over a plain residential DSL connection and a laptop.

As a general rule, for a denial of service attack to be effective, attackers either needed a lot of bandwidth, typically more than would be available on a DSL line, or a lot of computers to make up for the narrow network pipe. Since the THS-SSL-DOS tool attempts to establish a large number of SSL connections with the target server, it winds up eventually consuming all the system resources and making it unavailable, according to the developers, a German hacking outfit called The Hackers Choice (THC).

Brian Krebs, a security writer and principal analyst for Krebs on Security, said the type of malware used to attack RSA Security earlier in the year may have also hit more than 700 other organizations. These organizations weren’t attacked with technology stolen from RSA Security, but rather faced malware attacks using similar command-and-control infrastructure used by the malicious Excel spreadsheet that penetrated RSA’s systems.

Affected organizations included technology and non-technology companies. Even though internet service providers were included in the list posted on Krebs on Security, it was more likely that one of the subscribers had been hit and not the provider’s networks, according to Krebs.

Mitsubishi Heavy Industries has acknowledged there was a possibility that when cyber-attackers had infected more than 80 computers and servers, breached its networks, and copied data from one server to another, that some of that data may have left the company. Japan’s largest defense contractor remained mum about what may have been leaked.

The Japanese government had other cyber-worries to deal with, as reports emerged of systems belonging to members of Parliament and dozens of Japanese embassies abroad being infected with unknown malware over the summer.
Security experts warn that cyber-attackers can target United States critical infrastructure and cause a lot of damage. Department of Homeland Security Janet Napolitano said attackers were already attacking critical financial systems, transportation and other sensitive areas at an event in Washington, D.C. this week. It was important that Congressional lawmakers pass cyber-security legislation, she said.

Napolitano’s speech came a few days after BusinessWeek revealed the contents of a draft report by a Congressional commission which claimed that malicious perpetrators had interfered with two United States satellites four times over the past few years. While the U.S. China Economic and Security Review Commission report fell just short of directly accusing the Chinese government for backing the attackers, the commission said the tactics were consistent with strategies outlined in published Chinese military writings.


Article source: http://www.eweek.com/c/a/Security/Mac-Malware-DoS-Tools-CyberWar-Lead-Weeks-Security-News-260078/

View full post on National Cyber Security » Virus/Malware/Worms

How fast fingerprinting of OLE2 files can lead to efficient malware detection

SophosLabs experts present research describing how heuristics can help anti-virus products discern between benign and malicious OLE2 files.How fast fingerprinting of OLE2 files can lead to efficient malware detection, Blog, malware, LEAD, files, Fast, Fingerprinting, OLE2, efficient, detection

View full post on Naked Security – Sophos

View full post on National Cyber Security

ProtectMyID: RT @healthinfosec: RT @healthinfosec Verizon: Lax Credit Card Security Will Lead to More Breaches http://t.co/rDpEB8WD

ProtectMyID: RT @healthinfosec: RT @healthinfosec Verizon: Lax Credit Card Security Will Lead to More Breaches http://t.co/rDpEB8WD

View full post on Twitter / ProtectMyID

View full post on National Cyber Security

LEAD ENGINEER-NETWORK SECURITY

This level of engineer serves as the security design authority on customer-requested programs. He/she collaborates with the Network Engineering and Project Management to create and implement custom solutions that adhere as closely as possible to existing Design Standards.This role determines business requirements, proposes changes, and develops migration and implementation plans as needed.

This position provides expert level research and analysis for planning, organizing, and managing corporate-wide security functions.
This engineer will be required to give presentations via training sessions, web pages, or 1-to-1 training to the floor engineers on designs that are being implemented.
Under minimal supervision, this Engineer will be responsible for translating functional business requirements into a technical solution that conform to global design standards.
This role must also understand and effectively articulate the implications and impact that proposed architectural changes will have on the business (to technical and non-technical audiences).
Focus on interpreting, operating, and troubleshooting firewalls, load balancers, remote access, and application proxies as the primary design and vendor interface for Problem Management.
Develop lab scenarios to mock user environments and test compnonents of proposed solutions.
This role provides input into the security technology plan for the organization, and ensures that plans for their assigned technology discipline integrate effectively with other aspects of the technical infrastructure.
This Engineer will also be expected to deliver detailed project documentation to both the customer and operations that fully describes new implementations and is used as the primary reference for day-to-day management.
This individual will be capable of installing, troubleshooting and configuring all vendor provided tools and to be able to provide training on the offering to junior engineers.

Qualifications:

Computer Science Degree or equivalent and 7 to 9 years of relelated experience including security design and implementation.
Must have experience designing, implementing, and supporting environments that include two or more of the following: Enterprise Gateway architectures including:

Firewalls (Check Point, Netscreen, ASA, Fortinet);
Proxy and AV solutions (Bluecoat, Trendmicro);
Global and Local load balancing (F5, Cisco ACE);
SSL RAS (Netscreen SA, Array SPX, Aventail);
Enterprise Management tools (Provider-1, NSM, BC Director, and/or F5 Ent Manager)
Ideal candidate will have strong understanding of industry trends in all areas of Information Security.
Experience working in 24 x 7 centers with complex, high transaction, high availability environments.
In depth understanding of networking technologies, eg. Cisco routers and switches.
Extensive and hands on experience with both physical and network/host level security.
Must have excellent written and verbal skills
Must be able to team within and outside of the operations group
Ideal candidate will have a strong,. multi-diiscipline, operations and implementations background with emphasis on supporting business critical environments
System knowledge including ESP, ETMS, SMARTS and Concord a plus
Successful candidates will be expected to have an in depth knowledge of external services envrionements including SSL certificate exchange, Remote access solutions, and Business to Business interconnects.

Additional Qualifications: F5 Essential/Advance Certications
CCSP
BCCPA, BCCPP
CCSA/CCSE
ITIL – Version 2/3
CISSP
GIAC
Linux/Unix skils scripting

Article source: http://jobview.monster.com/LEAD-ENGINEER-NETWORK-SECURITY-Job-Glen-Allen-or-Richmond-VA-US-101819463.aspx

View full post on National Cyber Security

Gergory Evans

Page 3 of 3«123

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?
$15.95

Find Out More, Click Here!