Monday, October 28, 2019

interview wednesday

Bryan,

 

Thanks so much for your interest in USE Federal Credit Union.  Our address is 4301 S. Interstate 44 Service Rd, Oklahoma City, OK  73119.

 

See you Wednesday at 2:00.

 

Linda Thomas

Sr. Vice President/Chief Operating Officer

USE Federal Credit Union

405-685-6200 ext.143

“To provide service that goes above and beyond expectations to our members and to each other”

 

 

 

Friday, May 11, 2018

Improvements to our Privacy Policy and Privacy Controls

Google
Updating Our Privacy Policy
This month, we're updating our Privacy Policy to make it easier for you to understand what information we collect and why we collect it. We've also taken steps to improve our Privacy Checkup and other controls we provide to safeguard your data and protect your privacy.
Nothing is changing about your current settings or how your information is processed. Rather, we've improved the way we describe our practices and how we explain the options you have to update, manage, export, and delete your data.
We're making these updates as new data protection regulations come into effect in the European Union, and we're taking the opportunity to make improvements for Google users around the world.
Making our Privacy Policy easier to understand
Simpler structure & clearer language
Simpler structure & clearer language
We've improved the navigation and organization of the policy to make it easier to find what you're looking for. We've also explained our practices in more detail and with clearer language.
New descriptive videos & illustrations
New descriptive videos & illustrations
Often a visual description is easier to understand than text alone, so we've added short videos and illustrations throughout the policy.
Embedded privacy controls
Embedded privacy controls
We've made it easier to jump to key settings directly from the policy, helping you make choices about your privacy.
The revised policy is available here and will take effect on May 25, 2018.
Improving your privacy controls
Within the past year, we updated My Activity so that you can better access and manage the data in your Google Account. We also launched a redesigned Dashboard, which allows you to easily see an overview of products you're using and your data associated with them.
This month, we've updated our Privacy Checkup with new illustrations and examples to help you make more informed choices about your key privacy controls. And since we understand that your preferences may change over time, the new Privacy Checkup enables you to sign up for regular reminders to check your privacy settings.
To learn more about these and other controls to manage your privacy, visit your Google Account.

Tuesday, August 15, 2017

Change Wireless Number is Complete | Confirmation Number VZB213400908

Dear KATIE HAMLIN,

Your confirmation number is: VZB213400908.

Your request to change the wireless number(s) below has been completed.

Line: 1
Mobile Number:5043450653
Old Number: 5043450653
New Number: 540-940-7652
Status: SUCCESS

To complete the activation of your new number:

3G Voice or Voice & Data Device

1. Dial *228, and follow the prompts, selecting Option 1 when announced. This is a free call that will ensure you have the correct information programmed into your phone.
2. Once the programming is complete, place a call to ensure your phone is functioning.

4G Voice or Voice & Data Device

1. Refer to the activation guide in the shipping box for required set up.
2. Snap out the 4G SIM card from the holder (retain the holder to retain SIM card information).
3. Ensure the device is powered off.
4. Insert the 4G SIM card into the SIM card slot. Refer the device manual if you have questions on the location of the SIM card slot.
5. Power on your device. It may take a few moments for the 4G SIM card to register on the network (*228 is not required to activate the SIM card).
6. Device is ready for use.

Data Only Device:

1. Ensure that the PC card / USB modem is inserted into the computer (If using a notebook with an embedded module ensure the wireless radio is powered on).
2. Open VZAccess Manager
1. From the Windows desktop navigate: Start > Programs (All Programs) > VZAccess Manager
2. From the Macintosh desktop navigate: Finder > Applications > VZAccess Manager
3. From the Linux desktop navigate: Applications > Internet > VZAccess Manager
3. From the VZAccess Manager top menu, navigate Options > Activation.

Thank you for choosing Verizon Wireless.

Monday, August 24, 2015

Security Operations Center Analyst Opportunity Knocking!

Hello! My name is Melissa Kaye with Kforce Consulting.  I hope you are having a wonderful morning. I came across your resume and wanted to reach out to you in regards to an exciting job opportunity as a Lead Security Analyst in Louisville, Kentucky.  I have attached the job description below. Please contact me at your earliest convenience if interested as this position interviews immediately.  If you know anyone else who may be interested it would be greatly appreciated if you could pass this information along to them as well (we also offer a referral bonus for successful placements).  Thanks!
 
**If you are interested, please reply with an updated version of your resume, as the one I have seems to be a bit outdated.
 
 
Duration: Contract to Perm
Bill Rate: Competitive
 
 
Interview Process: phone interview – onsite interview
 
The Lead Security Operations Engineer will analyze security processes and procedures, manage security awareness, and play a hands-on role in vulnerability scanning and intrusion detection and prevention.  They will follow a comprehensive suite of information security protocols to address risks that are deemed unacceptable, and ensure the information security controls continue to meet the organization's needs on an ongoing basis. 
 
Responsibilities
·           Administration of information security protocols and products, including; approved security information event management (SIEM) application, encryption software, ensures antivirus software is installed on company equipment per security policies, security patches have been applied, etc.
·           This position will perform analysis on SIEM data and generate automated policies to identify abnormal traffic and possible malware events.
·           Ensure compliance with policies and procedures, payment card industry (PCI) standards, and international organization for standardization (ISO27001) standards; assesses local (LAN) and wide area network (WAN) environments security posture and topology, reviews security relevant documentation, and preparing papers discussing results of analysis to help protect and secure data, infrastructure, and systems and educate stakeholders on possible threats.
·           Coordinate with Information Security and business groups to assess, implement, monitor and communicate IS related security risk and hazards
·           Review the development, testing and implementation of security plans, products and controls by providing state-of-the-art technical experience and support to in-house developers to apply appropriate information security protocols and products.
·           Conduct internal reviews on a periodic basis to measure compliance with policy, assist in external audits and assessments, specifically PCI requirements.
 
Education, Work Experience and Other Work Requirements
·           3 to 5 years of experience, 5+ years preferred.
·           Bachelor’s degree or equivalent experience, in Computer Science or related field preferred.
·           3 years managing a SIEM deployment intrusion platforms, and managing encryption software
·           Experience managing encryption software
·           2 years of experience with application/network/OS and DB vulnerability scanning program
·           Detailed understanding of proxy and firewalls, web application firewalls, file level encryption, DLP, RSA, LDAP, Email Gateways, IDS, IDM and load balancers
·           Unix and Windows Server experience
·           One of the following certifications required - CCNA, MCSE, Cisco Security Specialist, CISSP, CISA or CISM.
Specific Knowledge and Skills
 
·           Hands on experience in multiple security areas such as: intrusion detection\prevention, enterprise anti-virus, threat management, vulnerability management. 
·           Ability to write understandable reports including process or product improvement recommendations, root cause analysis, security summary analysis, and project roadmaps.
·           Unix and Windows Server experience; detailed understanding of proxy and next generation firewalls, and web application firewalls.
·           A basic understanding of file level encryption, DLP, RSA, LDAP, and Email Gateways. 
·           Strong verbal and written communication skills and ability to work with all levels of the organization.  This position must be comfortable working collaboratively within the team, and across departments to answer questions, give instructions, and resolve security problems.
·           Relies on judgment and experience to solve complex information security problems in a constantly changing environment.  Must be able to stay abreast of new security vulnerabilities, understand how they impact products and systems, and recommend remediation to reduce risk.
 

Thanks!

 

Melissa Kaye

Talent Representative

Kforce Professional Staffing

12011 Sunset Hills Road, Suite 450

Reston, VA 20190

Work: 703-464-6647

Cell: 757-641-9737

mkaye@kforce.com

www.kforce.com

  

Great People = Great ResultsSM

 





To be removed from the email list Click Here