Navigacija
Lista poslednjih: 16, 32, 64, 128 poruka.

Info Management d.o.o. – U najavi potrebni IT security seniori za rad na Bliskom Istoku

[es] :: IT berza poslova :: Arhiva IT berze poslova :: Info Management d.o.o. – U najavi potrebni IT security seniori za rad na Bliskom Istoku
(Zaključana tema (lock))

[ Pregleda: 1345 | Odgovora: 0 ] > FB > Twit

Postavi temu

Autor

Pretraga teme: Traži
Markiranje Štampanje RSS

Info Management
Igor Grgur
Info management
Novi Sad

Član broj: 303722
Poruke: 11
*.dynamic.isp.telekom.rs.

Sajt: www.infomanagement.co.rs


Profil

icon Info Management d.o.o. – U najavi potrebni IT security seniori za rad na Bliskom Istoku09.07.2012. u 19:23 - pre 143 meseci
Potrebni profili:
• IT Security Specialist
• Threat Specialist
• Vulnerability & Malware Specialist
• Forensics Analyst

CV aplikacije slati na:
[email protected]
Tel: 063 652 725 Igor Grgur
www.infomanagement.co.rs

• IT Security Specialist
IT Security Specialist typically recommends, designs, and implement appropriate security policies, procedures, and technologies for computing environments. In addition to knowledge of threat/risk analysis procedures, they should also have knowledge of emerging IT security trends and directions.
1. Providing specialized security support;
2. Establishing secure environments in different platforms, operating systems/ environments, database technologies, communications protocols;
3. Planning, organizing, implementing and testing security on varied hardware and operating systems;
4. Implementing security on complex and distributed systems;
5. All phases of the Systems Development Life Cycle and applying security to each phase;
6. Using automated security testing tools;

• Threat specialist
1. DOS & DDOS attacks Analysis.
2. Websites needs to be malware free. Ensure malware should identify before it spreads over the du internal network.
3. Monitor the policy violation based log collection.
4. Monitor traffics based on telecom regulatory.
5. Monitoring Anti-phishing sites.
6. Coordinate with multiple ISPs to take down the phishing sites.
7. Monitor the data theft attempts based on log source.
8. Provide the RCA on incidents which may lead to damage business.
9. File System and Data Layer Examination.
10. Metadata and File Name Layer Examination.
11. File Sorting and Hash Comparisons.
12. Discovering Unknown Malware on a Host.
13. Recovering Key Windows Files.
14. Application Footprinting and Software Forensics.
15. File System and Data Layer Examination.
16. Metadata and File Name Layer Examination.
17. File Sorting and Hash Comparisons.
18. Discovering Unknown Malware on a Host.
19. Recovering Key Windows Files.
20. Application Foot printing and Software Forensics.

• Malware Analysis
1. Determine the most appropriate method of protecting original evidence and recovering deleted, erased, hidden and encrypted data.
2. To discover & catalogue indicators of compromise that will reveal other machines that has been affected by same malwares or intruders.
3. To identify the intruders or insider that is responsible for installing the malware.
4. REVERSE ENGINEERING WORK-FLOW.
5. Setup of an Isolated Analysis Environment.
6. Execution and Initial Analysis.
7. Deobfuscation
8. Disassembly
9. Identify and analyze relevant portions

• Digital Forensic Analysis
1. Conduct examinations of computers, system logs, applications and networks to locate evidence as an expert in the specialty area of forensics.
2. Demonstrate proficiency in computer crime investigation, forensic data analysis, application fraud, etc.
 
0

[es] :: IT berza poslova :: Arhiva IT berze poslova :: Info Management d.o.o. – U najavi potrebni IT security seniori za rad na Bliskom Istoku
(Zaključana tema (lock))

[ Pregleda: 1345 | Odgovora: 0 ] > FB > Twit

Postavi temu

Navigacija
Lista poslednjih: 16, 32, 64, 128 poruka.