Monday, August 24, 2015

Security Operations Center Analyst Opportunity Knocking!

Hello! My name is Melissa Kaye with Kforce Consulting.  I hope you are having a wonderful morning. I came across your resume and wanted to reach out to you in regards to an exciting job opportunity as a Lead Security Analyst in Louisville, Kentucky.  I have attached the job description below. Please contact me at your earliest convenience if interested as this position interviews immediately.  If you know anyone else who may be interested it would be greatly appreciated if you could pass this information along to them as well (we also offer a referral bonus for successful placements).  Thanks!
 
**If you are interested, please reply with an updated version of your resume, as the one I have seems to be a bit outdated.
 
 
Duration: Contract to Perm
Bill Rate: Competitive
 
 
Interview Process: phone interview – onsite interview
 
The Lead Security Operations Engineer will analyze security processes and procedures, manage security awareness, and play a hands-on role in vulnerability scanning and intrusion detection and prevention.  They will follow a comprehensive suite of information security protocols to address risks that are deemed unacceptable, and ensure the information security controls continue to meet the organization's needs on an ongoing basis. 
 
Responsibilities
·           Administration of information security protocols and products, including; approved security information event management (SIEM) application, encryption software, ensures antivirus software is installed on company equipment per security policies, security patches have been applied, etc.
·           This position will perform analysis on SIEM data and generate automated policies to identify abnormal traffic and possible malware events.
·           Ensure compliance with policies and procedures, payment card industry (PCI) standards, and international organization for standardization (ISO27001) standards; assesses local (LAN) and wide area network (WAN) environments security posture and topology, reviews security relevant documentation, and preparing papers discussing results of analysis to help protect and secure data, infrastructure, and systems and educate stakeholders on possible threats.
·           Coordinate with Information Security and business groups to assess, implement, monitor and communicate IS related security risk and hazards
·           Review the development, testing and implementation of security plans, products and controls by providing state-of-the-art technical experience and support to in-house developers to apply appropriate information security protocols and products.
·           Conduct internal reviews on a periodic basis to measure compliance with policy, assist in external audits and assessments, specifically PCI requirements.
 
Education, Work Experience and Other Work Requirements
·           3 to 5 years of experience, 5+ years preferred.
·           Bachelor’s degree or equivalent experience, in Computer Science or related field preferred.
·           3 years managing a SIEM deployment intrusion platforms, and managing encryption software
·           Experience managing encryption software
·           2 years of experience with application/network/OS and DB vulnerability scanning program
·           Detailed understanding of proxy and firewalls, web application firewalls, file level encryption, DLP, RSA, LDAP, Email Gateways, IDS, IDM and load balancers
·           Unix and Windows Server experience
·           One of the following certifications required - CCNA, MCSE, Cisco Security Specialist, CISSP, CISA or CISM.
Specific Knowledge and Skills
 
·           Hands on experience in multiple security areas such as: intrusion detection\prevention, enterprise anti-virus, threat management, vulnerability management. 
·           Ability to write understandable reports including process or product improvement recommendations, root cause analysis, security summary analysis, and project roadmaps.
·           Unix and Windows Server experience; detailed understanding of proxy and next generation firewalls, and web application firewalls.
·           A basic understanding of file level encryption, DLP, RSA, LDAP, and Email Gateways. 
·           Strong verbal and written communication skills and ability to work with all levels of the organization.  This position must be comfortable working collaboratively within the team, and across departments to answer questions, give instructions, and resolve security problems.
·           Relies on judgment and experience to solve complex information security problems in a constantly changing environment.  Must be able to stay abreast of new security vulnerabilities, understand how they impact products and systems, and recommend remediation to reduce risk.
 

Thanks!

 

Melissa Kaye

Talent Representative

Kforce Professional Staffing

12011 Sunset Hills Road, Suite 450

Reston, VA 20190

Work: 703-464-6647

Cell: 757-641-9737

mkaye@kforce.com

www.kforce.com

  

Great People = Great ResultsSM

 





To be removed from the email list Click Here

Thursday, October 9, 2014

Follow Up

Hi Bryan,

 

Thank you for taking the time out of your day to speak with me.  Just for future reference if you could send me an updated resume that would be great.  Please feel free to reach out at any time.

 

Happy Friday Eve!

 

Marissa Clevenger | Technology Recruiter

KFORCE Technology

10200 Forest Green Blvd. | Suite 304 | Louisville, KY | 40223

502.327.3754 p

Great People = Great Results®

Opportunities with Kforce - Louisville!

 

Thursday, January 26, 2012

Changes to Google Privacy Policy and Terms of Service

Is this email not displaying properly?
View it in your browser.

Dear Google user,

We're getting rid of over 60 different privacy policies across Google and replacing them with one that's a lot shorter and easier to read. Our new policy covers multiple products and features, reflecting our desire to create one beautifully simple and intuitive experience across Google.

We believe this stuff matters, so please take a few minutes to read our updated Privacy Policy and Terms of Service at http://www.google.com/policies. These changes will take effect on March 1, 2012.


One policy, one Google experience
Easy to work across Google Tailored for you Easy to share and collaborate
Easy to work across Google

Our new policy reflects a single product experience that does what you need, when you want it to. Whether reading an email that reminds you to schedule a family get-together or finding a favorite video that you want to share, we want to ensure you can move across Gmail, Calendar, Search, YouTube, or whatever your life calls for with ease.

Tailored for you

If you're signed into Google, we can do things like suggest search queries – or tailor your search results – based on the interests you've expressed in Google+, Gmail, and YouTube. We'll better understand which version of Pink or Jaguar you're searching for and get you those results faster.

Easy to share and collaborate

When you post or create a document online, you often want others to see and contribute. By remembering the contact information of the people you want to share with, we make it easy for you to share in any Google product or service with minimal clicks and errors.


Protecting your privacy hasn't changed

Our goal is to provide you with as much transparency and choice as possible, through products like Google Dashboard and Ads Preferences Manager, alongside other tools. Our privacy principles remain unchanged. And we'll never sell your personal information or share it without your permission (other than rare circumstances like valid legal requests).

Understand how Google uses your data

If you want to learn more about your data on Google and across the web, including tips and advice for staying safe online, check out http://www.google.com/goodtoknow

Got questions?
We got answers.

Visit our FAQ at http://www.google.com/policies/faq to read more about the changes. (We figured our users might have a question or twenty-two.)


Notice of Change

March 1, 2012 is when the new Privacy Policy and Terms will come into effect. If you choose to keep using Google once the change occurs, you will be doing so under the new Privacy Policy and Terms of Service.

Please do not reply to this email. Mail sent to this address cannot be answered. Also, never enter your Google Account password after following a link in an email or chat to an untrusted site. Instead, go directly to the site, such as mail.google.com or www.google.com/accounts. Google will never email you to ask for your password or other sensitive information.

Thursday, January 22, 2009

Mesothelioma and Radiation Treatment

Mesothelioma treatment options are not all that varied considering that most cases of mesothelioma are diagnosed well into the latter stages of the disease when surgical removal of the cancer is no longer possible. Radiation treatments, external radiation treatments, and brachytherapy are generally considered relatively productive at improving patient life and extending longevity.

Brachytherapy is the internal placement of radiation. A small device delivers a pinpointed stream of radiation to the sight of active cancer. Brachytherapy has been proven more effective than other forms of radiation therapy since it is more controlled and able to be placed in the center of cancerous cells. The accuracy of brachytherapy has improved patient chances by about 8% in some cases.

Mesothelioma treatments are not easy on the body, and brachytherapy is no exception. External radiation treatments can often be effective in cases where brachytherapy can not be accurately or safely placed. In either case this form of mesothelioma treatment is just one option. There are surgical mesothelioma options, and some patients prefer that as much cancer as possible be removed from the body. While this does not always remove enough cancer to salvage life, it can make the patient more comfortable, especially when added to other mesothelioma treatments.

Brachytherapy is considerably new in comparison to external radiation, and some patients feel more inclined to opt for treatment options that are time tested, although brachytherapy has had few complications since its inception. Brachytherapy has had about the same number of complications as external radiation, mainly a risk of infection or a risk of a required secondary placement.

This is no more complicated than the ill effects of external radiation treatments. External radiation treatments require the patient to go to a cancer center or hospital for their mesothelioma treatments. Brachytherapy treatments do not require chronic radiation treatments, although they do require regular monitoring.

When determining a mesothelioma treatment program, it is always best to try to make decisions regarding treatment options based on what is best for the patient, rather than what can the patient or the patient's insurance afford. Unfortunately, mesothelioma treatments are quite costly, and patient decisions can often be ruled by the expense rather than the preference. This is an unfortunate flip side to improvements in mesothelioma treatments, the more technologically advanced the mesothelioma treatment is likely to be, the more expensive it often is. While this is not true in every case, it has become closer to the norm.

Because mesothelioma treatments are costly, not all mesothelioma victims are able to receive the mesothelioma treatments that they need or that would work best for them. External radiation, brachytherapy, surgical removals, and chemotherapy are only moderately expensive in comparison to other mesothelioma treatments, but when multiple treatment options are proposed, the expense naturally climbs.

Often multiple treatment options are too expensive for most mesothelioma victims, even with health insurance.
Those who have experienced the ease of brachytherapy report a 78% preference over external radiation treatments. Those who prefer the external radiation treatments cite their discomfort with the chronic release of radiation left inside their body. Naturally, medical science has tested the theory that the radiation delivered is exacting and precise and there isn't the likelihood of radiation being randomly released throughout the body.

Some patients are still more comfortable with external radiation therapies knowing that the radiation is controlled from the outside of their body and once the treatment is over, the radiation is complete.

Choosing the best mesothelioma treatment involves making decisions based on financial viability, the stress and toll it is likely to take on the body, the percentage of effectiveness, and the patient's ability to emotionally withstand the proposed treatment. Choosing between brachytherapy and external radiation treatment is a decision that only the mesothelioma victim and their family can ultimately make. The advice of doctors and other professionals may factor in, but a mesothelioma victim needs to be able to take into account what happens to their own body.

Despite the success of brachytherapy and patient comfort with external radiation, mesothelioma treatments are not typically a cure. Prolonging life and making patients as comfortable as possible is the aim of mesothelioma treatment.

This is an unfortunate fact regarding mesothelioma. The success rate of survival despite mesothelioma treatment is dramatically low. While medical research is still attempting to up the ante when it comes to mesothelioma treatments, without early detection, mesothelioma victims have an unbearably low survival rate. With new medications and new mesothelioma treatments, it is possible that one day the survival rate will eventually climb.