endpoint cybersecurity consultant (sacramento, ca)

my course: http://securitycompliance.thinkific.com

THE JOB

contact # 510-722-8503 Ext- 509.

Job Title End-Point Cybersecurity Consultant
Location Sacramento CA
Duration 6 months /Contract

JOB DESCRIPTION

We are looking for an End-Point Cybersecurity Consultant – Sacramento California

The ideal candidate will have 5 or more years of perimeter Cybersecurity experience, with a focus on designing and deploying end-point security solutions.

Mandatory Qualifications (MQ’s):

A minimum of five (5) years’ experience, of which three (3) must be in a lead capacity, in designing and developing an endpoint security infrastructure and developing procedures defining their use to meet business requirements

A minimum of three (3) years’ combined experience in designing and integrating device vulnerability scanning, securing systems, software, certificate authority, two-factor authentication, Patching, Security Information and/or Event Management.
A minimum of three (3) years’ combined experience related to Antivirus, Mobile Device Management, Encryption (In Transit/At Rest), Data Loss Prevention and/or Mobile Device Management.
Desired Qualifications:
Six (6) years’ experience, of which three (3) must be in a lead capacity, in designing and developing an endpoint security infrastructure and developing procedures defining their use to meet business requirements.
Four (4) years’ combined experience in designing and integrating device vulnerability scanning, securing systems, software, certificate authority, two-factor authentication, Patching, Security Information and/or Event Management.
Three or more (3+) years’ combined experience related to email hybrid integration and operational support of cloud Cisco e-mail Security services including hygiene/SPAM, Antivirus, Malware, Encryption, Data Loss Prevention and premise-based SMTP relays, VMWare AirWatch Mobile Device Management/ Workspace 1 and/or Active Directory (AD) authentication utilizing AD Federation Services
Three or more (3+) years’ experience utilizing Palo Alto web filtering technologies and developing automated reporting procedures for their use.
Possess SANS certifications, which may include Advanced Security Essentials, Enterprise Defender Certificate or other applicable SANS certification.
Three (3) years’ demonstrated experience in Malware/endpoint protection for incident response using McAfee and FireEye.
Three (3) years’ combined experience integrating border Router/Switches, Layer 3/ Application/Micro-Segmentation Firewall Policy/Administration, Load Balancer, Cloud Security for IaaS/PaaS/SaaS, DoS, Log/Monitoring correlation and/or Data Packet Inspection.
Three or more (3+) years’ combined experience related to Hypervisor, DNS, Identity/RBAC and Directory Services, MFA, IDS/IPS, Virtual Private Network, DMZ and/or Encryption (At Rest/In Transit).
Desired Soft Skills:

Excellent written and verbal communication and presentation skills with the ability to explain complex concepts
Highly self-motivated and directed with an attention to detail
Ability to take initiative and exercise judgment
Possess a flexible, proactive, can-do attitude
Job Responsibilities

Essential Security Endpoint and Operations Duties
Essential Security, SIEM, Vulnerability and Incident Duties
Security Compliance
Security Leadership/Mentor/Guidance
Closure, Transition, Training and Knowledge Transfer
Unanticipated Tasks
Other Requirements

Fully fluent in English for both written and verbal
Pass a Background check
Finalists must provide three references to verify skills and experience

Regards,
Abhishek Mishra
Technical Resource Specialist
Talent Anytime Inc.
41041 Trimboli way suite 1398 Fremont CA 94538
Contact# : 510-722-8503 x 509
Direct : 510-722-8835

file encryption

file encryption

For file and folder encryption, there are many tools that will do the job.  File encryption can be saved to a thumb drive, hard drive or SD Card.  One free, open-source and useful method of encrypting data is TrueCrypt.

TrueCrypt is freeware that creates a virtual encrypted disk on a file, partition or entire disk drive.  It works on Windows, OS and Linux.

What TrueCrypt does is to create an encrypted area of storage (and encrypted volume) where you can drag unencrypted data for encryption.  This is known as one-the-fly encryption (OTFE aka real time encryption).

To install TrueCrypt go to http://www.truecrypt.org/downloads

 

Once you Double Click the TrueCrypt icon, you will see this:

 

Click the “Create Volume” button for creating the encrypted volume.  This volume will allow file encryption (or folder encryption).

You will see the “TrueCrypt Volume Creation Wizard”.  Since we want file encryption and/or folder encryption, we will select “Create an encrypted file container”.  Note that TrueCrypt also allows full partition and full system drive encryption.

We will choose “Standard TrueCrypt volume” and select next on the TrueCrypt Volume Creation Wizard.

note: The TrueCrypt Volume Creation Wizard allows you to hide the data or just encrypt with a password.  With a higher need for privacy, you may need to hide the fact that there is file encryption at all so no one even questions you about why its encrypted.  If its not hidden, others will see a file that cannot be opened with any application they know of.  And even if they do know that it must be decrypted to view the contents, they must have the password.

Scientists launch new, ‘unbreakable’ encryption system

A new encryption system, which its creators say is unbreakable, got its first test run Wednesday in Vienna, scientists from the European Union project SECOQC announced.

digg user kinthiri explains:
Quantum cryptography is unbreakable because if any 3rd party views it that does not have the credentials and is not the intended recipient, the simple viewing of the encrypted data by that third party changes that data such that even the intended recipient can’t decrypt it. Thus they know that there is a 3rd party viewing the stream. Effectively the data self destructs if anyone attempts to intercept it or decrypt it. This is not a new phenomenon.

What is new is that its being used commercially. It had previously been used experimentally by the military in association with researchers, but this is the first time its been brought to life outside test environments and is available commercially.

The nature of quantum mechanics makes this truly unbreakable. You couldn’t even factor this using your own quantum computer, if you could even get one with enough qbits.

read more | digg story