je.st
news
Tag: security
Queens University gets an in-kind security grant
2014-05-27 19:45:00| American School & University
The grant is a year-long $250,000 in-kind grant whereby the school will receive Video Insight Video Management Software (VMS) licenses; 16 IP video surveillance cameras; 1 video encoder that includes VMS software licenses; 10 years of software upgrades read more
Tags: security
university
grant
queens
Senior Cyber Defence and Security Operations Specialist
2014-05-27 12:38:18| Space-careers.com Jobs RSS
RHEA is currently recruiting a Senior Cyber Defence and Security Operations Specialist to support RHEA clients by providing cyber security services supporting Information and Communications Technology ICT solutions. Please note that this position is based at our clients premises in Frascati, Italy. Tasks and Activities Your primary tasks and activities may include Provisioning of best practice advice and guidance in the areas of cyber defence and security operations supporting incident detection, analysis and response including operations policy and procedure development, operational scenario definition, operations centre technology selection and implementation, network and host based sensor technology selection and implementation Provisioning of best practice advice and guidance in the areas of vulnerability and patch management, intrusion detection and prevention, network and host security, network and host fingerprinting, advanced persistent threat APT and data leakage protection, firewall and virtual private network VPN technologies, data centre and cloud computing security Provisioning of cyber defence and security operations advice and guidance to technical development teams in the areas of cyber defence situation awareness concepts and requirements incident detection, analysis and response management visualization requirements collaborative information sharing and relevance of security metrics Cyber defence and security operations system research, definition, planning, installation, configuration, operations and maintenance Independent verification validation and system acceptance testing of installed cyber defence and cyber security operations solutions Cyber security training and awareness Cyber security program and project management. Skills and Experience You must possess the following skills and experience A post secondary degree, diploma or certificate in a relevant field obtained from a university located in a country having signed and entered into force The Lisbon ConventionMinimum 5 years working experience in definition or delivery of cyber defence and security operations products, services or solutions Minimum 3 years as a Project Manager, Operations Manager or Technical Support Manager for delivery of cyber defence or security operations solutions or services Demonstrated cyber defence and security operations qualities including Curiosity Ability to find answers to difficult problems or situations Abstract thinking Ability to identify correlations of events from multiple sensor sources Business perspective Ability to deal with lowlevel incident details while being mindful of business operations requirements Communications Ability to communicate to various groups that have very different requirements and experience in cyber security with a strong capacity in preparation of written studies. In depth knowledge of Information Security concepts involving incident detection, analysis, decision support and response Network Local Area Networking LAN, Metropolitan Area Networking MAN or Wide Area Networking WAN technologies Internet Prototocols such as TCPIP, UDP, RIP, OSPF, BGP, SIP, SNMP, IPSec, SSL, TLS End system architectures and operating systems such as Windows, Linux, Unix. Experience in delivery of operations services or specification of solutions for cyber defence or security operations that should include a minimum of eight of the following ISO 27000 series standards Information Security policies, standards, and procedures Information Security concepts involving confidentiality, integrity and availability Information Security concepts involving threat, vulnerability and risk analysis Cloud Computing or virtual machine security Service Oriented Architectures Cyber Defence or Continuous Monitoring Solutions Trusted Product Evaluation standards such as Common Criteria or FIPS 140 Secure technology standards such as Trusted Platform Module, Trusted Execution Environment Certification and Accreditation concepts and processes Networking technologies such as Netflow, Sflow, PCap Cryptography and Public Key Infrastructure PKI Identity Management systems Technical vulnerability assessment VA and penetration testing PenTest Vulnerability and patch management solutions Host or network based Intrusion Detection and Prevention Systems IDSIPS Firewalls or Unified Threat Management UTM systems Virtual Private Networking VPN Network Management NM systems Security Information and Event Management SIEM systems Data Leakage Protection Application White Listing Deep Packet Inspection DPI technologies. The following skills would be highly desirable. A professional qualification or certification in a relevant field. Example qualifications include holding a national professional engineering qualification e.g., Chartered Engineer in the UK or holding the European wide qualification of European Engineer EUR ING. Example certifications include Certified Information System Security Professional CISSP certificate, Certified ISO 27001 Auditor or similar A member in good standing recognized as being an Associate Member or a Member in Training for a professional certification in a relevant field. Example certifications include Certified Information System Security Professional CISSP Associate Member or similar Experience in security product operations certifications e.g., Checkpoint firewall certification Experience in product, system or software research and development RD Qualification for a NATO Security Clearance Experience in cyber security for space, defense, critical infrastructure, finance or government systems. How to Apply Looking to take your career to the next level? Interested applicants should submit their CV and Cover Letter to RHEAs Recruitment team at careersrheagroup.com no later than 130614. We look forward to hearing from you!
Tags: security
senior
operations
specialist
Nokia ramps up network security ops
2014-05-27 02:00:00| Total Telecom industry news
Vendor aims to encourage greater knowledge sharing in bid to tackle cyber threats.
Tags: network
security
nokia
network security
Asia readies food security defences against El Nino threat
2014-05-26 19:00:00| Climate Ark Climate Change & Global Warming Newsfeed
Reuters: Asia's governments are scrambling to head off the potential impact of a weather phenomenon that in the past has driven food prices to levels that sparked social unrest. With lessons learned, Indonesia's government is handing out calendars to farmers setting out early planting dates. Malaysia and the Philippines are working to manage water supplies and India has bolstered its food stockpiles. They are aiming to reduce the impact of the so-called El Nino, a weather pattern that can bring drought...
Tags: food
security
asia
threat
Russia's gas deal with China underlines risks Europe's energy security
2014-05-26 10:24:00| Climate Ark Climate Change & Global Warming Newsfeed
Guardian: The gas deal announced last week saw agreement between Russia and China after 10 years of negotiation. The implications of Russia's turn eastward to seek a new energy partner should raise concerns in Europe over its own gas supply and wider energy security. Gazprom's share of Europe's gas market reached approximately 30% in 2013. As the Ukraine crisis has soured relations between Russia and Europe, both sides are looking to diversify. Europe's need to diversify away from Russian gas is hardly...
Tags: china
security
energy
deal
Sites : [533] [534] [535] [536] [537] [538] [539] [540] [541] [542] [543] [544] [545] [546] [547] [548] [549] [550] [551] [552] next »