Security Job Posting – Urgent Position -90k Network Security Specialist position in Alexandria VA

Please contact:

Mansoor Razaque

Senior Technology Recruiter
Kforce Professional Staffing
12010 Sunset Hills Rd Suite 200
Reston, VA 20190
703-464-6669 direct
703.481.3866 Fax
mrazaque@kforce.com
http://www.kforce.com

Our Client  has an immediate need for a Network Security Specialist to support a true (24x7x365) NOC in Alexandria,VA for the USPTO (US Patent Trade Office) on the EUS contract. This is a perm requirement.

Immediate need

Multiple shift times open.

They really want someone with an active secret but will accept interim secret or clearable US citizen if they really fit the bill.

Description:
Under the direction of Evolver Subject Matter Specialist provides the following support:
Providing daily analysis reports to the customer Task Manager and have them available for display in the Enterprise Operations Center.
Providing technical assistance in the area of security management of the customers AIS*s. Identify events and nodes that should be monitored and modify security tools as necessary to successfully monitor and analyze the events and nodes.
Collect and analyze data obtained by the customers* Security tools. Tools include, IDS/IPS, Firewall, SIM, scanning software etc.
Centralized Audit Logging Solution Administration and Maintenance Support, supporting customers efforts to maintain the existing centralized audit logging solution (Log Logic) capability that logs significant events for system operating systems (OSs) and databases.
Internet Content Management System Maintenance and Administrative Support work with customer to effectively configure and maintain customers* Web cache (Bluecoat) and content filtering capability to manage Internet content.

Previous large enterprise wide security monitoring and management experience is a must. Candidate must be a self-starter able to provide expert security monitoring and management with little or no direct supervision. Experience with QRadar is a plus.
Bachelor*s degree in Network Security preferred but is not a must for a person with sufficient network security experience. Current Cisco CCSP Certification is desired.

Shall follow established Operating Procedures and update the procedures when necessary with the prior approval of customer.

A secret clearance is required for this position. This requirement may be waived to start, but secret clearance must be obtained to continue in the position.

Mansoor Razaque
Senior Technology Recruiter
Kforce Professional Staffing
12010 Sunset Hills Rd Suite 200
Reston, VA 20190
703-464-6669 direct
703.481.3866 Fax
mrazaque@kforce.com
http://www.kforce.com

Great People = Great ResultsSM

Internet Safety: Content Filtering Software for Kids

Parents do not allow their kids access to adult content while reading a magazine or watching TV, so the same should be taken into consideration when it comes to using the computer and mobile phone.   Yes, mobile phones too.  Ideally, parents would like to shoulder surf while their kids are on the Internet, but the reality is that’s not always possible.  Teaching kids to use the Internet properly and not to disclose personal information as describe in a recent article is a very important step in keeping them safe, but adding a bit of insurance with an Internet content filtering software geared towards protecting kids can also compliment a potential dangerous situation.

Internet content filtering can best be described as a software that filters and/or deny access to any unwanted or unauthorized material on the web.  Some of the content that can be blocked are advertising material, sexual and adult content, file transfer sessions and malware.  When a request for an unauthorized website or page is made, the Internet filtering software keeps the request from being completed by either blocking it completely or redirects the child to a safe landing page and a report is created of the violation.

A reviewed a five Internet content filtering software targeted to aid parents protect their kids was conducted and here is what I found:

1. Net Nanny – www.netnanny.com

PC, Mac and Mobile (BlackBerry, Windows Mobile 6. Android, Symbian)

$39.00 (PC & Mac) / $29.00 (Mobile Phones)

I found Net Nanny to be a very complete tool that runs on Windows, Mac OS X and mobile phones.  Parents have the capability to schedule when the child can have Internet access, Block access to social networking sites such as  MySpace and Facebook.  The ability to stop inappropriate chat session and stop illegal file sharing is some additional key features parent can employ.  Net Nanny provides the parent with the capability to monitor where their children are going online and to receive email and mobile alerts when violations occur.

2. CYBERsitter – www.cybersitter.com

Windows XP, Vista and Windows 7 (all 32/64-bit versions)

$24.95

CYBERsitter has many interesting features.  Off the top, I was impressed on the layout and its ease of use without having to know in detail what I wanted to do.  Some interesting features are the per user content filtering controls and strictness controls.  A very intuitive user definable time schedule for all users.  One of the best feature is the ability to record Facebook, Twitter and newsgroup activities.

3. CyberPatrol – www.cyberpatrol.com

Windows-Based

1 User License. Yearly – $39.95

CyberPatrol has the ability to block inappropriate web sites and images from predefined categories such as Adult, Chat, Drugs and Gambling. Restricted access to social networking site such as Facebook, YouTube and MySpace as well as blocking programs are all built-in functionality.  An interest aspect of CyberPatrol is parents can also create their own pre-approved list of sites that kids may access.

4. McAfee Family Protection – us.mcafee.com

Windows-Based

$39.99

McAfee Family Protection has a very good website blocking feature that consist of 35 categories of objectionable websites.  It also blocks unknown email addresses so children cannot communicate with strangers.  The software also allows for the monitoring and recording of postings, YouTube access and instant message conversations as well as allows parents to manage the amount of time their kids spend accessing the Internet

5. Safe Eyes – www.internetsafety.com

PC, Mac & iPhone/iPad/iPod

$49.95 (PC & Mac) / $39.95 (iPhone/iPad/iPod)

Very nice product that allow parents to implement category blocking, and have costumed allowed and not allowed list for website access.  A nice feature is the Safe-Search that allows the rules to be implemented on all search engines such as Google, Yahoo and Bing access as well.  Parents are able to receive instant alerts when banned sites are accessed and receive daily reports through email.  The one draw back, even thought Safe Eyes run on both PC and Mac, the features on both versions are not the same, so please read up on both versions before making a decision.

Internet content filtering software by far is not the answer to protecting our kids on the Internet.  Talking to them, education, monitoring and more talking are the best solutions.  Internet content filtering, does add a layer of protection and assurance that is essential in the total protect plan.  The five tools mentioned above are just a small subset of software in the market, so please do your research.

Apple Mac Security Update Plugs 13 Vulnerabilities

eWeek.com article stated, “Apple released a security update for Mac OS X that patches 13 vulnerabilities.”

The release fixes issues in several components, including CoreGraphics and Apple Type Services. Several of the vulnerabilities are buffer overflows, and can be exploited to execute arbitrary code.

To read more click here.

Recorded Wireshark Certification Webinar Available Now

The Wireshark Certified Network Analyst webinar recording is available at www.wiresharktraining.com/certification. The Exam Information Pack is available at the same location.

In addition, the Examp Prep Guide released earlier than expected. The Exam Prep Guide contains 300+ sample exam questions and both timed and untimed quizzes on the accompanying CD. Order your copy at Amazon.com. (ISBN 1893939987)

The recorded webinar covers:

– Certification Process (Study, Exam, Maintenance, Recertification)
– Certification Maintenance (CPE requirements)
– Online Portal (free training portal)
– Registering for the Exam
– Sample Exam Questions
= How to Contact Us

Please send your questions about the Wireshark Certified Network Analyst Exam to info@wiresharktraining.com.

Laura Chappell
This message was sent by: Protocol Analysis Institute, 5339 Prospect Road, Suite 343, San Jose, CA 95129

Forward to a friend:

Child Safety on the Internet

The Internet has made it possible for people to communicate with anyone anywhere in the world. That is a scary thought when it comes to thinking about child safety on the Internet. On a daily basis, kids are on line communicating on chat rooms without adult supervision not really knowing the person on the end is who they claim to be.

In the real world, we tell kids not to talk to strangers; the same idea needs be enforced when it comes to using the Internet if not more so… The numbers of predators and the anonymity they are able to obtain make the matter just that much more dangerous.

Some of the difficulties parents are facing deals with education and technology. When it comes to technology, kids are usually ahead of their parents in the computing knowledge. Many of their activities such as chatting and online video conferences are easily hidden from the parents. Then you have the parents that do apply some form of security or privacy controls such as content filters for protection to only have them bypassed the kids.

It is a well-known fact that kids talk about way to bypass the controls put in place to protect them.

Of the most victimized group of Internet

Teenage girls are most often victimization of all the groups. Some of the techniques used by an online predators are to:

1. Use seduction techniques
2. Try to win their confidence
3. Go after problem kids
4. Go after kids with low self-esteem
5. Go after kid with very little friends

The Internet predator will play with their emotions so the child will think this person understands them and be more open to further a relationship.

To report any suspicious activities, one of the best resources I can recommend is:
“The National Center for Missing and Exploited Children” at www.missingkids.com.

They have law enforcement, state and federal agencies that can assist with these matters.

Some tips that should help in protecting our kids:

1. Tell them to never give any personal information of any kind, make a list of questions that should not divulge.

2. Educate yourself and monitor what your kids are doing.

3. Pay attention to their Internet usage, if they are spending more time on the Internet than eating, playing or talking to friends, then something may be going on.

FISMA NextGen – Continuous Monitoring, Near Real-Time Risk Management

Ran across this interesting presentation on FISMA and Continuos Monitoring…