Cybersecurity Employment SecureNinja

Size: px
Start display at page:

Download "Cybersecurity Employment SecureNinja"

Transcription

1 Cybersecurity Employment SecureNinja CyberSecurity, Technical Engineer Responsible for security measures for networks & information. Senior Software Security Consultant Location: Alexandria, VA Type: Contracted Min. Experience: Experienced Job Description SecureNinja Security Services has an opportunity to help our customers build, manage, and deploy their HP Fortify/WebInspect Software applications more securely across the entire application lifecycle - - free of vulnerabilities that can be exploited by cyber attackers. Responsibilities The responsibilities of a Software Security Consultant are broad and may vary depending on your level of experience and skills. Responsibilities include but are not limited to: Scanning customer source code, auditing results with development and/or security teams and offering plans for remediation of vulnerabilities. Installing and configuring HP Fortify products onsite for customers Communicating technical application security concepts to customer staff including developers, architects, and managers. Training customer staff on application security and products. Assessing and scoping of customer's application security needs. Contributing to project planning and other project deliverables. Customizing the implementation of HP Fortify's production and test products. Collaborating with Product Management and Engineering to enhance products. Represent technical, business, and professional values to customers, partners, and peers. Work is conducted mostly at customer sites; extensive travel is required. Technical Qualifications The ideal candidate should have: A Technical Bachelor's degree or 6-8 years relative work experience. Prior consulting experience desired. 5+ years experience in role of software or security consulting. 5+ years experience in software development using Java, Microsoft.NET (C# or VB), or C/C++. Experience using build tools (e.g. ant, make, maven, msbuild, nant, etc.). Experience in developing and/or deploying web applications is strongly desired. Experience with multiple operating systems is strongly desired. Fundamental understanding of software, computer, and network architectures. Page 1/5

2 Experience in the enterprise security or application security is a plus. CISSP, CSSLP, CISA, CEH, MCSE/MCITP and SANS certifications are a plus. Characteristics The ideal candidate will have: Prior experience working with Federal government organizations (DoD, Civilian agencies) Be highly motivated, competitive, entrepreneurial and attracted to challenging opportunities. Have demonstrated the ability to work in a fast-paced environment where organizational skills are essential and will have strong problem solving, analytical, interpersonal, and ownership skills. Possess excellent collaboration skills with a wide variety of internal team members. Be an intelligent, self-starting, self-confident individual with integrity and accountability. Possess strong written and verbal communication skills as well as presentation skills. Multiple job opportunities are available some that require you to currently hold or ability to obtain Federal DoD security clearance. (SECRET or better) and some which do not require clearance. Test Center Administrator Job Description The Test Center Administrator works in a fast paced professional Test Center setting to ensure the integrity of our testing services by proctoring and controlling the computer based test center environment. This will include greeting candidates, verifying candidate identification, monitoring the examination process and maintaining test vendor policies and guidelines. The Test Center Administrator will uphold our standard for integrity by providing clients with a secure and clean testing location that enables our clients to pursue their testing needs in a controlled and comfortable environment. Responsibilities Controlling test area by maintaining a working knowledge of policies, practices and procedures Greet examinees and verify identification Register candidates for testing Monitor candidates as they complete their exam Resolve candidate issues or report them to the appropriate supervisor Protect security of all computer software in Test Center environment Reboot computer servers and reset passwords when necessary Report any occurrences which fall outside company guidelines to corporate management Authorities Manage incidents of unacceptable identification or authorization on behalf of clients Manage misconduct such as security breaches or inappropriate conduct of candidates Ensure test center environment is maintained to ensure a safe and comfortable testing experience. Page 2/5

3 Education, Experience and Skills Work Hours: High School Diploma required, college experience preferred One to two years customer service related experience required Communicate effectively with the public from a position of authority Ability to read and interpret documents such as operational and maintenance instructions Ability to write detailed reports and correspondence Ability to multitask and handle small tools, pack equipment for shipping or unpack for installation Capable of lifting 25 pounds Exposure to Microsoft windows based computer applications Visual requirements include the ability to adjust or focus computer screens and view testing room while proctoring This is an 8 hour/day, 40 hour/week position. Must be flexible during days and evenings on various days and times subject to change according to demand of testing SecureNinja, was founded in 2003 in Alexandria, Virginia by a highly experienced management group averaging over 20 years in the IT training and consulting fields. SecureNinja is an Equal Opportunity Employer Application Procedure: Please reply this posting with resume to Mehr Khan, Director of Operations info@secureninja.com If you are selected for an interview, you will be contacted via an invitation. No phone calls please. Application deadline: January 31, 2013 IT Instructors needed immediately Instructors needed immediately to deliver IT and IT Security training courses. Teach Evenings, Weekends, Weekdays & Live Online. Please reply to info@secureninja.com with your resume with cover letter identifying areas of competence and interests to the attention of Mehr Khan. Director of Operations - Secure Ninja N. Pitt Street Suite 105 Alexandria, VA Instructors Needed to teach: A+ Technician Agile Awareness Training CAP (Certified Authorization Professional) CAPM (Certified Associate in Project Management) CCNA (Cisco Certified Network Associate) CCNA Security CCNP(Cisco Certified Network Professional) CCSP (Cisco Certified Security Professional) CCVP (Cisco Certified Voice Professional) CEH v7 (Certified Ethical Hacker) Certified Scrum Coaching Certified Scrum Developer Certified Scrum Product Owner Page 3/5

4 Certified ScrumMaster CGEIT CHFI (Computer Hacking Forensics Investigator) CISA (Certified Information Systems Auditor) CISM (Certified Information Security Manager) CISSP (Certified Information Systems Security Professional) Cloud Security CRISC CSSLP (Certified Secure Software Lifecycle Professional) CWNA (Certified Wireless Network Administrator) CWSP (Certified Wireless Security Professional) DIACAP Digital Mobile Forensics ECHI -- (Certified Incident Handler) ECSA ECSA (EC Council Certified Security Analyst) ECSP (Certified Secure Programmer) ECSU Security Awareness EDRP (Disaster Recovery Professional) ETA Fiber Optics Installer HIPAA ISSAP (Information Systems Security Architecture Professional) ISSEP (Information Systems Security Engineering Professional) ISSMP (Information Systems Security Management Professional) ITIL v3 Foundations Linux+ Malware Analysis MCITP: 2008 Enterprise & Server Administrator MCITP: 2008 Server Administrator MCITP: Exchange Server 2007 MCSD (Microsoft Certified Solution Developer) MCSE 2003 (Microsoft Certified Systems Engineer) MCTS and MCITP: Windows 7 Configuration and Desktop Support Technician MCTS:.NET Framework 4, Web Applications MCTS:.NET Framework 4, Windows Applications Development MCTS: Active Directory (Server 2008) MCTS: Applications (Server 2008) MCTS: Exchange Server 2007 MCTS: Microsoft Exchange Server 2010 MCTS: Microsoft SQL Server 2008 Database Development MCTS: Share Point 2010 MCTS: SQL Server 2005 MCTS: SQL Server 2008 Business Intelligence Development and Maintenance MCTS: SQL Server 2008 Implementation and Maintenance Microsoft Project Professional 2003/2007 Network+ Oracle 10G DBA Project+ PMP (Project Management Professional) Reverse Engineering Page 4/5

5 Powered by TCPDF ( Web: SCNA SCNP Scrum Team Workshop Security+ Social Media Security Software Security SSCP (Systems Security Certified Practitioner) Web App Penetration Testing Please reply to with your resume with cover letter identifying areas of competence and interests to the attention of Mehr Khan. Director of Operations Secure Ninja N. Pitt Street Suite 105 Alexandria, VA Page 5/5

Unlocking Potential Through Learning

Unlocking Potential Through Learning Unlocking Potential Through Learning CORPORATE HEAD OFFICE: 6, Babatola Drive, Off Obafemi Awolowo way, Behind Awolowo Glass house, Ikeja, Lagos. 08 Training Calender @ Newhorizonsnige @ new horizon solution

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

DIABLO VALLEY COLLEGE CATALOG

DIABLO VALLEY COLLEGE CATALOG COMPUTER NETWORK TECHNOLOGY CNT Despina Prapavessi, Dean Math and Computer Sciences Division Math Building, Room 267 Possible career opportunities These CNT-courses prepare students for a career path in

More information

Career Paths In Cybersecurity

Career Paths In Cybersecurity Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double

More information

CERTIFICATION TRAINING - ISC2

CERTIFICATION TRAINING - ISC2 MERIT CLASSES The Michigan Cyber Range features a cybersecurity education experience based upon the National Institute of Standards and Technology National Initiative for Cybersecurity Education (NICE).

More information

What is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE)

What is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE) What is the CISSP? (ISC)2 s Certified Information Systems Security Professional (CISSP ) is the gold standard professional certification for experienced information security and related professionals worldwide.

More information

Business Skills Learning Sessions* SINGLE COURSE TITLES

Business Skills Learning Sessions* SINGLE COURSE TITLES Business Skills Learning Sessions* ACCOUNTING TITLES Introduction to Business Accounting Bookkeeping and Payroll LEGAL TITLES Introduction to Legal Concepts Legal Office Administration HUMAN RESOURCES

More information

itsm003 v.3.0 NISTCSF.COM NICE Training Curriculum & Workforce Planning Program

itsm003 v.3.0 NISTCSF.COM NICE Training Curriculum & Workforce Planning Program itsm003 v.3.0 NICE Training Curriculum & Workforce Planning Program Agenda and Objectives NICE Cybersecurity Curriculum Consortium IT & Cybersecurity Frameworks & Methodologies NICE Curriculum Catalog

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

CyberVista Certify cybervista.net

CyberVista Certify cybervista.net ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify ONLINE CYBERSECURITY CERTIFICATION TRAINING CyberVista Certify CyberVista offers the industry s most comprehensive cybersecurity training

More information

There is a slight chance of up to 10% domestic travel to locations where the system is hosted if issues arise.

There is a slight chance of up to 10% domestic travel to locations where the system is hosted if issues arise. Any questions contact Chris Grindle via LinkedIn.com Information Systems Security Officer 510 Travel: 10% Clearable to Top Secret The ISSO is the principal point of contact for information assurance activities

More information

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training

More information

VMEdu. 94 (Out of 100) D&B Rating. A+ BBB Rating. VMEdu Training. VMEdu Platform

VMEdu. 94 (Out of 100) D&B Rating. A+ BBB Rating. VMEdu Training. VMEdu Platform VMEdu VMEdu provides organizations with corporate training and training solutions to manage their learning and development needs efficiently. VMEdu Training VMEdu Inc. is a leading global training service

More information

College of Information Technology

College of Information Technology College of Information Technology Undergraduate Transfer Evaluation Guidelines Bachelor of Science in Computer Science A transcript evaluation is completed once official transcripts from all previously

More information

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH 1 SECURITY+ VS GIAC GSEC Where does GSEC fit? 3 CompTIA Security+ and GIAC Security Essentials (GSEC) Feature CompTIA Security+

More information

Application for Certification

Application for Certification Application for Certification Requirements to Become a Certified Information Security Manager To become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade on the

More information

Title A User's Manual to the PMBOK Guide Access 2007 Programming by Example with VBA. XML. and ASP Adobe Photoshop CS5 for Photographers: The

Title A User's Manual to the PMBOK Guide Access 2007 Programming by Example with VBA. XML. and ASP Adobe Photoshop CS5 for Photographers: The Title A User's Manual to the PMBOK Guide Access 2007 Programming by Example with VBA. XML. and ASP Adobe Photoshop CS5 for Photographers: The Ultimate Workshop Advanced Android 4 Games Advanced Database

More information

Playing Security Poker I match your degree and raise you by a certification or 2 Grumpy Old Security Men What s up Cert?

Playing Security Poker I match your degree and raise you by a certification or 2 Grumpy Old Security Men What s up Cert? Playing Security Poker I match your degree and raise you by a certification or 2 Grumpy Old Security Men What s up Cert? Presented by: Curtis Coats, CISSP, CAP Kelley P. Archer, CISSR MN ISSA Agenda Types

More information

Building the Cybersecurity Workforce. November 2017

Building the Cybersecurity Workforce. November 2017 Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries

More information

Advanced Knowledge & Learning

Advanced Knowledge & Learning Advanced Knowledge & Learning All Covered engineers participate in courses to extended their technical knowledge by obtaining several well-known industry certifications including Microsoft, Cisco, ITIL,

More information

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC

More information

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst WORKFORCE COLLABORATIVE: CYBERSECURITY BUILDING THE TALENT PIPELINE SECURITY ANALYST CAREER PATHWAY UPDATED: 10/17/16 CYBERSECURITY SECURITY ANALYST CAREER PATHWAY Senior Level Senior Specialty Threat,

More information

IT Technician Pathways Course Guide

IT Technician Pathways Course Guide IT Technician Pathways Course Guide Stage Computer Retail Sales and Support Course Name or Topic Introduction to Retail or Business Fundamentals Related 3 rd Party Certifications C-ID IT-MC C-ID BUS 100

More information

Course Schedule January December 2019

Course Schedule January December 2019 Course Schedule January December 2019 Freewater Technologies Service Disabled Veteran Owned Small Business 816 Greenbrier Circle, Suite 201 Chesapeake, VA 23320 (757) 499-6150 www.freewatertech.com Microsoft

More information

NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST

NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST TERMS OF REFERENCE February 2017 1 TERMS OF REFERENCE FOR

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

Developing Career-Relevant Academic Programs

Developing Career-Relevant Academic Programs 2016 USENIX Summit for Educators in System Administration Developing Career-Relevant Academic Programs A Case Study: UMUC s B.S. Program in Computer Networks & Cybersecurity S. K. Bhaskar (S.Bhaskar@umuc.edu)

More information

Mohammad Shahadat Hossain

Mohammad Shahadat Hossain Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network

More information

College of Information Technology

College of Information Technology College of Information Technology Undergraduate Transfer Evaluation Guidelines Bachelor of Science in Information Technology A transcript evaluation is completed once official transcripts from all previously

More information

TECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months

TECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months TECHNICAL Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months The Technical Club Membership provides the ultimate in flexibility and value. Take as many classes as

More information

Idaho's Premiere Learning Center. Voted Best of Idaho Length. 5 Days Days 16. 2hrs. 1 day. Length. Length. 2 Days. 1 Day.

Idaho's Premiere Learning Center. Voted Best of Idaho Length. 5 Days Days 16. 2hrs. 1 day. Length. Length. 2 Days. 1 Day. 10051 W. Emerald Street, Suite 120 Boise, Idaho 83704 PHONE: (208) 327-0768 Idaho's Premiere Learning Center Voted Best of Idaho 2017 http://www.etidaho.com Trending Now 20740 Installation, Storage and

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

COURSE BROCHURE CISA TRAINING

COURSE BROCHURE CISA TRAINING COURSE BROCHURE CISA TRAINING What is CISA? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual within

More information

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Digital Transformation (Dx) Enterprise Training Curriculum Agenda and Objectives The Digital Transformation (Dx) Problem NISTCSF.COM Cybersecurity Curriculum

More information

You Can Click at the enclosed Link to check out AATP Authorization:

You Can Click at the enclosed Link to check out AATP Authorization: Apple Education App Development Training Introduction to Swift 4 Introduction to the ios 11 SDK App Development with Swift 4 macos and OS X Training macos Support Essentials 10.12 (Sierra 101) macos Server

More information

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized. Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting

More information

DoD Directive (DoDD) 8570 & GIAC Certification

DoD Directive (DoDD) 8570 & GIAC Certification DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: October 2010 What is DoDD 8570? Department of Defense Directive 8570 provides guidance and procedures for the training, certification, and management

More information

CITY OF MONTEBELLO SYSTEMS MANAGER

CITY OF MONTEBELLO SYSTEMS MANAGER CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

Clock hour to semester credit hour conversions are made based on current academic standards as outlined in the academic policy of the University.

Clock hour to semester credit hour conversions are made based on current academic standards as outlined in the academic policy of the University. - Prior Learning Assessment - Corporate Articulation ROUGHTON INVESTMENTS Credit Recommendation Guide (CRG) The following courses have been evaluated by Corporate Articulation to potentially fulfill General

More information

Federal Virtual Training Environment (Fed/VTE) Pre-Approved for CompTIA CEUs

Federal Virtual Training Environment (Fed/VTE) Pre-Approved for CompTIA CEUs Federal Virtual Training Environment (Fed/VTE) Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Indicate whether the statement is true or false.

Indicate whether the statement is true or false. Indicate whether the statement is true or false. 1. In most cases, organizations look for a technically qualified information security generalist who has a solid understanding of how an organization operates.

More information

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs You can earn 1 CEU for each hour of training. Follow these requirements to earn and receive CEUs. All training must be at least

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

Technical Classes. Cisco. Cisco Authorized Courses CISSP. Coding & Programming. CCNA Certification Bootcamp ( exam) 2/6/2015 9am-4:30pm

Technical Classes. Cisco. Cisco Authorized Courses CISSP. Coding & Programming. CCNA Certification Bootcamp ( exam) 2/6/2015 9am-4:30pm Technical Classes Cisco CCNA Certification Bootcamp (200-120 exam) 2/9/2015 2/13/2015 9am-5pm 4/20/2015 4/24/2015 9am-5pm Cisco Authorized Courses CCNP: ROUTE 4/13/2015 4/17/2015 9am-5pm CCNP: SWITCH CCNP:

More information

Job Specification & Recruiting Profile of Vacancy

Job Specification & Recruiting Profile of Vacancy Job Specification & Recruiting Profile of Vacancy 26 March 2019 The following vacancy exists at NSFAS in Cape Town. Position Information Security Analyst Type & Grade Permanent, Grade 11 Vacancy No 76

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

CISA Training.

CISA Training. CISA Training www.austech.edu.au WHAT IS CISA TRAINING? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual

More information

NetCom Learning Training Courses Pre-Approved for CompTIA CEUs

NetCom Learning Training Courses Pre-Approved for CompTIA CEUs NetCom Learning Training Courses Pre-Approved for CompTIA CEUs CE System Activity Name: Completed a Training Course Max CEUs Earned Per CE Cycle: CompTIA A+ - 16 CEUs CompTIA Network+ - 24 CEUs CompTIA

More information

Information & Communication Technologies. Certification & Professional Qualification Training Programs

Information & Communication Technologies. Certification & Professional Qualification Training Programs Information & Communication Technologies Certification & Professional Qualification Training Programs Etisalat Academy We are the largest single-source training solutions provider in the Middle East. We

More information

Systems Administrator / Systems Analyst

Systems Administrator / Systems Analyst Systems Administrator / Systems Analyst Closing date: august 17, 2018 Full time position Job Summary CSE is currently looking to fill several systems administrators and systems analysts positions. These

More information

CACI USSOCOM IT EOM REQUIREMENTS

CACI USSOCOM IT EOM REQUIREMENTS Labor Category Certifications Experience Asset Manager ITIL Foundations Five years of experience in an IT and asset management role. Prior experience with Microsoft Enterprise Licensing is highly valued.

More information

College of Information Technology

College of Information Technology College of Information Technology Undergraduate Transfer Evaluation Guidelines Bachelor of Science in Cloud and Systems Administration A transcript evaluation is completed once official transcripts from

More information

CYBER APPRENTICESHIP. Dr. Leigh Armistead, President

CYBER APPRENTICESHIP. Dr. Leigh Armistead, President CYBER APPRENTICESHIP Dr. Leigh Armistead, President 1 OVERVIEW Peregrine Technical Solutions, LLC. (Peregrine) is a SBA certified 8(a) business with core competencies in IT security, IA and cyber warfare.

More information

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and

More information

Knowlogy Class Schedule

Knowlogy Class Schedule Knowlogy Class Schedule 2017 Table of Contents KNOWLOGY SCHEDULE OF COURSES... 3 OFFICE 2016... 3 OFFICE 2013... 4 OFFICE 2010... CISCO... COMPTIA... 6 EXCHANGE SERVER... 6 WINDOWS SERVER... 6 OFFICE36...

More information

CYBER APPRENTICESHIP. Dr Leigh Armistead, President

CYBER APPRENTICESHIP. Dr Leigh Armistead, President CYBER APPRENTICESHIP Dr Leigh Armistead, President 1 EVERYBODY HAS THE SAME ISSUE 2 OVERVIEW Peregrine Technical Solutions, LLC. (Peregrine) is a SBA certified 8(a), SB with core competencies in IT security,

More information

Why MyITstudy is the best solution for your IT training needs

Why MyITstudy is the best solution for your IT training needs MyITstudy - The most trusted and effective partner for your IT training needs MyITstudy is a brand of, a leading global education training provider with offices in the US, UK, Australia, Germany, Canada,

More information

About Us. We re now the world s largest independent IT training company, and we continue to lead

About Us. We re now the world s largest independent IT training company, and we continue to lead About Us As changes in technology have accelerated, it s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions and

More information

TERIBITE TECHNOLOGIES ACADEMY

TERIBITE TECHNOLOGIES ACADEMY Phone: 09080699264, 08088649 CISCO COURSES CCNA-DC - CCNA Data Center DCNXK - Implementing the Cisco Nexus 000 and 2000 v2.0 DCNX7K - Configuring Cisco Nexus 7000 Switches v.0 DCUCI - Data Center Unified

More information

TECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months

TECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months TECHNICAL Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months The Technical Club Membership provides the ultimate in flexibility and value. Take as many classes as

More information

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

EC-Council - EC-Council Certified Security Analyst (ECSA) v8 EC-Council - EC-Council Certified Security Analyst (ECSA) v8 Code: 3402 Lengt h: URL: 5 days View Online The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals

More information

Hidden Figures: Women in Cybersecurity

Hidden Figures: Women in Cybersecurity Hidden Figures: Women in Cybersecurity This is not a webinar. This is a topic relevant to the community and our initiatives. What is a virtual community meeting? We want to hear from you! Join into the

More information

CALENDAR FOR THE YEAR 2018

CALENDAR FOR THE YEAR 2018 27 Dubai 08-12 Jan 1 Advance Budgeting Workshop 386 Istanbul 11-1 Mar 396 London 13-17 May 2 Advance Business Writing 296 Abu Dhabi 1-19 Jan 3 Contract Management 396 London 22-26 Jan 27 Dubai 18-22 Mar

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

Ingram Micro Cyber Security Portfolio

Ingram Micro Cyber Security Portfolio Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Workforce Development Training Curriculum & Management Program

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Workforce Development Training Curriculum & Management Program itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Workforce Development Training Curriculum & Management Program Agenda and Objectives The Digital Transformation (Dx) Problem NISTCSF.COM Cybersecurity Curriculum

More information

Cyber Security Occupations. in San Diego County

Cyber Security Occupations. in San Diego County Cyber Security s in San Diego County February 2017 Prepared by Center of Excellence for Labor Market Research San Diego & Imperial Counties Region Labor Market Demand & Wages Currently, there is only one

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

DIS10.1 Ethical Hacking and Countermeasures

DIS10.1 Ethical Hacking and Countermeasures DIS10.1 Ethical Hacking and Countermeasures ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for

More information

TECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months

TECHNICAL. Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months TECHNICAL Unlimited Access to Over 200 Live, Virtual Instructor-Led Technical Classes for 12 Months The Technical Club Membership provides the ultimate in flexibility and value. Take as many classes as

More information

CIPP/G (Certified Information Privacy Professional US Government)

CIPP/G (Certified Information Privacy Professional US Government) CIPP/G (Certified Information Privacy Professional US Government) Course Description (image) The Certified Information Privacy Professional/Government (CIPP/G) is the first publicly available privacy certification

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion

More information

A United States Cyber Academy Program

A United States Cyber Academy Program The GIAC certifications I earned in the Academy really helped open doors for me as a cybersecurity professional. Justin Sappington, Information Security Analyst at Umpqua Bank A United States Cyber Academy

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we

More information

Application Training Application Courses

Application Training Application Courses Office Adobe Microsoft Office 2013 (Word/Excel/Pow erpoint/outlook) Adobe CC Photoshop/InDesi gn/illustrator Quarter 1 Jan 17 - Jan 21, Mar 13 - Mar 17, Jan 24 - Quarter 2 Application Training Application

More information

CompTIA Certification Renewal Policy and Continuing Education (CE) Program. Kyle Gingrich Senior Director, Product Management

CompTIA Certification Renewal Policy and Continuing Education (CE) Program. Kyle Gingrich Senior Director, Product Management CompTIA Certification Renewal Policy and Continuing Education (CE) Program Kyle Gingrich Senior Director, Product Management kgingrich@comptia.org CompTIA s Mission Our Mission Educate The IT Community

More information

PMP (Project Management Professional)

PMP (Project Management Professional) PMP (Project Management Professional) Course Overview PMP (Project Management Professional) v5 training and certification boot camp in Washington, DC will prepare you to earn the credential in the most

More information

SITEC II Labor Category Program Manager (PM) SITEC II Experience SITEC II Certification

SITEC II Labor Category Program Manager (PM) SITEC II Experience SITEC II Certification Program (PM) Information Technology Project (L1) Project (L2) Systems Analyst Technical Writer Database (Tier 2) Database (Tier 3) WEB (Microsoft SharePoint) WEB Messaging Network Architect Network Masters

More information

Skills You Will Gain. PC Component + Laptop Troubleshooting + Configuration Printers-+ peripherals Troubleshooting + NetworkSupport Technician

Skills You Will Gain. PC Component + Laptop Troubleshooting + Configuration Printers-+ peripherals Troubleshooting + NetworkSupport Technician LEVEL3 IT TECHNICIAN PATHWAY Job Prospects IT Technician 1st/2nd /3rdLine Support Hardware Engineer Prerequisite No prior experience necessary Progression Network Infrastructure Server Infrastructure Cloud

More information

A UNIVERSAL SECURITY GATEWAY

A UNIVERSAL SECURITY GATEWAY A UNIVERSAL SECURITY GATEWAY IDS /IPS / HTTP AV/ Web Content Filter / Web Load Balancer / Web Reverse Proxy / Multi-line Internet / Network IP &Protocol Monitor / IP Reputation Blocker / Captive Portal

More information

T H E U N I V E R S I T Y O F T E X A S A T E L P A S O. College of Business Administration. Information Systems

T H E U N I V E R S I T Y O F T E X A S A T E L P A S O. College of Business Administration. Information Systems T H E U N I V E R S I T Y O F T E X A S A T E L P A S O College of Business Administration Information Systems What is Computer Information Systems? A field of studying computers and algorithmic processes.

More information

A Passage to Penetration Testing!

A Passage to Penetration Testing! A Passage to Penetration Testing! EC-Council Cyber Research This paper is from EC-Council s site. Reposting is not permitted without express written permission. What Is Penetration Testing? A penetration

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Certified Ethical Hacker - CEH v9 Training & Certification

Certified Ethical Hacker - CEH v9 Training & Certification Certified Ethical Hacker - CEH v9 Training & Certification SecureNinja's CEH v9 (Certified Ethical Hacker) training and certification boot camp in Alexandria, VA, Dulles, VA and San Diego, CA will immerse

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning

More information

GET400: INDEPENDENT TECHNOLOGY EDUCATION (SPRING 2013)

GET400: INDEPENDENT TECHNOLOGY EDUCATION (SPRING 2013) GET400: INDEPENDENT TECHNOLOGY EDUCATION (SPRING 2013) 1. COURSE DETAILS Revised: 11/24/2012 COURSE (SECTION): GET400 (M802) TERM: Spring 2013 INSTRUCTOR: OFFICE: OFFICE HOURS: Deborah Nosky Hinds 222

More information

CCNP ROUTING & SWITCHING

CCNP ROUTING & SWITCHING CCNP ROUTING & SWITCHING ABOUT US WHO WE ARE CRAW Security is a Training and Consulting Company with high industry training and consulting Standards. CRAW Security Deals with various kinds of products

More information

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS SESSION ID: AST3-R02 THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS Jon Oltsik Senior Principal Analyst Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International Board Director ISSA

More information

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY The Foundation Certificate in Information Security (FCIS) course is designed to provide

More information

Professional (CBAP) version 3

Professional (CBAP) version 3 Certified Business Analysis Professional (CBAP) version 3 Amman Jordan July 29 th August 5 th, 2017 Instructor Mr. Tareq Al Nashawati Certified CBAP, PMP Table of Content 1 PROGRAM VALUE... 3 2 TARGET

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting

More information

This is the first unit in a series in which we are going to speak about jobs in the Information Technology field.

This is the first unit in a series in which we are going to speak about jobs in the Information Technology field. This is the first unit in a series in which we are going to speak about jobs in the Information Technology field. 1 Nowadays Information technology has become part of our daily lives, being used in all

More information

CyberSec First Responder Continuing Education Program

CyberSec First Responder Continuing Education Program CyberSec First Responder Continuing Education Program Overview This document identifies the details of the continuing education program for Logical Operations CyberSec First Responder certification. This

More information

College of Information Technology

College of Information Technology College of Information Technology Undergraduate Transfer Evaluation Guidelines Bachelor of Science in Information Technology: Network Administration A transcript evaluation is completed once official transcripts

More information