Title : SQL DBA with MarkLogic
Location : Branchville, NJ (Hybrid)(Local preferred)
Rate :$60/hour on C2C
An L3 role typically involves advanced-level responsibilities, including resolving complex issues, overseeing system stability, and providing expert guidance. Here's a breakdown based on specifications for SQL (70%), MarkLogic (20%),
1. SQL
Database Design and Optimization: Designing efficient database schemas, indexing strategies, and query optimization to improve performance.
Performance Tuning: Monitoring and optimizing the performance of SQL queries, stored procedures, and overall database health.
Troubleshooting: Handling escalated issues from L2 support, including complex SQL errors, deadlocks, and data inconsistencies.
Data Integrity and Security: Implementing security measures, such as access controls and encryption, ensuring data integrity and compliance with standards.
Backup and Recovery: Managing and maintaining database backups, ensuring disaster recovery processes are in place.
Automation: Creating and maintaining scripts for database tasks, including backups, monitoring, and alerts.
Collaboration: Working with development teams to optimize database interactions and provide guidance on best practices.
2. MarkLogic
Database Administration: Managing the MarkLogic NoSQL database, including installation, configuration, and upgrading.
Query Optimization: Optimizing XQuery and search performance in MarkLogic, ensuring efficient data retrieval.
Data Management: Managing document-based data structures, indexing, and retrieval, ensuring the system handles large-scale data efficiently.
Troubleshooting and Maintenance: Handling escalated MarkLogic-specific issues, including performance bottlenecks and system failures.
Security: Managing security features like user roles, permissions, and encryption in MarkLogic.
3. Netezza
System Administration: Administering the Netezza appliance, including system health checks, upgrades, and maintenance.
Performance Tuning: Optimizing Netezza-specific SQL queries, particularly those involving large datasets.
Troubleshooting: Handling escalated issues specific to the Netezza environment, such as performance lags or database errors.
Data Load Management: Overseeing data load processes to ensure efficient ETL operations.
Across these platforms, L3 support will involve advanced troubleshooting, handling escalations, and ensuring overall system performance, reliability, and security. Additionally, the L3 professional would likely be responsible for mentoring junior team members and staying up-to-date with evolving technologies
Title : WindowVMware Architect
Location : Dallas / Frisco Texas / Indiana(Remote)
Visa independent candidates only
Rate :$65/hour
VMware Architect
· The Virtualization Architect´s role is to analyze, design and plan architecture according to best practices, while ensuring high levels of data quality and availability, including analysis and integration of new customers and projects into the Architecture. This individual is responsible for the design, specifications, sizing, development, and oversight of policies, standards and procedures to ensure a consistent architecture and management throughout the organization.
VMware Architect Job Description
QUALIFICATIONS/REQUIRED EXPERIENCE:
· VMWARE Cloud, Virtualization, Server and Storage vendor Certifications Preferred.
· 10 plus years of previous architecture experience, across multiple vendors and technologies.
· In-depth understanding of Cloud, Server, Storage, and Virtualization architecture design techniques, theories, principles, and practices.
· In-depth exceptional of VxRail, Dell, Nutanix architecture architecture design techniques, theories, principles, and practical troubleshooting experience.
· Solid experience architecting enterprise in Windows OS, Active Directory, GPO.
· In-depth knowledge of networking concept.
· ·Excellent experience and troubleshooting skills of Private, Public and Hybrid Cloud environments
· ·Excellent experience and troubleshooting skills of Cloud Orchestration platforms
· ·Excellent experience and troubleshooting skills of Windows Server, Linux, in HA/DR type configurations.
· ·Excellent experience and troubleshooting skills of Server hardware platforms: x86
· ·Excellent experience and troubleshooting skills of VMware ESXi, vSphere, vRa, vSAN, vCenter, SDDC, NSX-T
· ·Excellent knowledge of SAN, NAS, DAS,RAID, SCSI, Fibre Channel, Backup to Disk, clustering, encryption technologies from multiple vendors.
KEY TASKS & RESPONSIBILITIES:
· Ability to present ideas in business-friendly and user-friendly language appropriate to both executive and managerial audiences.
·Ability to effectively manage relationships with other architecture teams, application teams, stakeholders, business and customer representatives.
·Organizational skills with attention to task details, documentation and target dates.
·Strong written, oral, and interpersonal communication skills.
·Team orientated, willing to share knowledge and collaborate with peers.
·Proven analytical, strategic vision drawing on strong problem-solving abilities.
·Able to prioritize and execute tasks in a high-pressure environment. ·Ability to conduct research into server, storage, virtualization issues, standards, and products.
-Mentor team members regularly.
-Lead Major incident calls and take it to resolution and work on RCA.
Title : IBM WebSphere MQ Administrator
Location : Charleston SC (onsite)
Rate :$50/hour
Job Description –
• Candidate should be extremely good at IBM WebSphere MQ Administrator with minimum of 7-8 years of experience.
• Candidate must know skills on IBM MQ Clustering , Installations , Distribution queuing and new setup.
• Candidate must be good using MQ with Linux , Windows and have expertise in scripting.
• Candidate should have administration experience on IIB experience who can able to do configuration changes , deployments and Broker setup.
• Good hands-on expertise on Problem management , change management , Incident management is must.
• Hands-on expertise on setting up SSL, certificate/key management
• Experience with installing, patching, upgrading, administering, scripting, and maintaining/troubleshooting on both MQ & IIB.
• Should be having expertise in working through Agile Methodology.
• Candidate having Certification on MQ , IB , ACE will be preferred.
• Ability to work independently and as part of a team.
• Need hands on experience to tune the AKS cluster environment
• Need to have knowledge into scripting knowledge
• Should have working knowledge on monitoring tools like Grafana, Kibana
• Must have knowledge to deploy Kubernetes application into AKS (Azuere Kubernetes Services)
Role: – IAM LEAD
Location: – Dallas, TX (Preferable), else REMOTE in USA to work as per CST Time Zone
Rate : $60/hr
Years of Experience |
· Overall 10+ years of relevant experience in IAM & PAM Implementation projects · Hands on experience in Design & Architecture of IAM (SSO/ MFA/ Access Policies) and PAM/EPM. |
General Description |
· Creating and implementing strategies for managing privileged access, designing solutions, and ensuring the secure storage and retrieval of sensitive credentials. · Lead architectural discussions and provide guidance on IAM/PAM capabilities, including user provisioning, guest access, and secure collaboration. · Demonstrating in-depth knowledge of PAM products, including the Enterprise Password Vault, Privileged Session Manager, and other related tools. · Overseeing the installation, configuration, and integration of IAM/PAM components to safeguard critical systems and data. · Developing and enforcing security policies, access controls, and privileged access management procedures to mitigate risks. · Identifying vulnerabilities and potential threats, and implementing measures to protect against unauthorized access. · Maintaining detailed records, reports, and documentation of IAM/PAM configurations and activities. · Ensuring that IAM/PAM solutions are up-to-date and providing support for system upgrades and maintenance. · Resolving technical issues and providing expert guidance to address security challenges. |
Technical Requirements |
· Strong understanding of identity federation standards such as SAML, OAuth, and OpenID Connect. · Hands-on experience with single sign-on (SSO) solutions and directory synchronization. · In depth knowledge of various IAM/ PAM tools relevant to B2E and B2B scenarios · Experience in designing and implementing secure, high-availability, and scalable IAM solutions. · Expertise in designing IAM/PAM architectures for large scale customers. · Should have experience on leading IAM/ PAM solutions and their updated versions. · Design deploy & support high-performance, high-availability PAM environment with any number of target end points, creating workflows, custom connectors, policies. · Should be capable to deploy/install/configure PAM components like Vault, CPM, PVWA, PSM, PSMP and AIM as per the client requirements. · Hands-on experience or knowledge on Configuring PTA, EPM. · Integrating various platforms with IAM/PAM such as Windows, UNIX, Databases and network devices, SSH Keys, SAP etc. · Creating and managing Safes, platforms and owners. · Should be familiar with Password upload utility and PACLI. · Experience on integrating IAM & PAM solution with LDAP, SIEM, SNMP, etc. · Strong scripting skills, often using languages like PowerShell, Python, or Shell scripting, to automate tasks and customize CyberArk solutions. · Knowledge of regulatory requirements and industry standards related to IAM & PAM, such as NIST, CIS and GDPR. |
Soft Skills |
· Excellent Verbal and written communication skills in English. · Ability to present solutions to clients remotely and in person if needed. · Good documentation skills that will enable creation of design documents for the technical solutions proposed. · Excellent problem-solving skills. · Good collaboration skills in working with virtual and distributed teams. |
Certifications |
· Possession of certifications relevant to IAM and PAM tools |
Educational Qualifications |
· University degree in IT or/and IT Security |
Location: – Dallas, TX (Preferable), else REMOTE in USA to work as per CST Time Zone
Rate : $65/hr
Primary skills : Cybersecurity (Firewall, EDR/DLP, Proxy, WAF,etc)
Secondary Skills : IAM/PAM
Hands on experience in Design & Architecture of Cybersecurity (Network Firewall, EDR/DLP,Proxy, PT, Email security) and IAM/PAM/EPM.
Submission Format –
Primary skills : Cybersecurity (Firewall, EDR/DLP, Proxy, WAF,etc)
Secondary Skills : IAM/PAM
Hands on experience in Design & Architecture of Cybersecurity (Network Firewall, EDR/DLP,Proxy, PT, Email security) and IAM/PAM/EPM.
Cyber Security Architect – Roles and Responsibilities |
1. Perform architecture design and engineering for the Security Environment, including log monitoring, threat intelligence, anti-virus, encryption and web intrusion prevention, Software and tools used to monitor, scan, test and repair the security of the infrastructure |
2. Perform lifecycle engineering of security infrastructure, equipment and software, that are part of, installed on, or used in connection with, the application applicable Security Infrastructure and the processes, tools, infrastructure and other resources necessary and as otherwise required by the Agreement to provide the Security Services |
3. Architect, design and engineer a complete security (e.g., cyber security, information security, user security) program that keeps pace with industry best practices and threat levels, including implementation and maintenance of security and threat management and detection tools and processes across the Company IT Environment |
4. Provide identity and access management (IAM) program design and engineering services |
5. Architect and design capacity planning/analysis as required to meet Company’s requirements, including the Service Levels. |
6. Develop, document, and maintain security policies, to maintain integrity of the Security Services |
7. Architect and engineer Security Services (including Equipment and Software), including anti-virus and anti-malware Software and definitions/signatures, patches, host-based agents, data leak prevention (DLP), web filtering, spam prevention, host-based firewalls, web application firewalls, cloud security products and other monitoring Software, based upon supplier version release keeping the Company IT Environment updated at N release level at all times, subject to Company-approved waivers. |
8. Develop controls for security assessments, audits, and internal control testing. |
9. Develop information classification parameters within CMDB in accordance with Company security strategies, polices, standards and guidelines. |
10. Develop action plan and escalation procedures for any identified potential or real security breaches and reporting of any identified potential or real security breaches |
11. Design all Security Infrastructure and cloud security products |
12. Design the processes used to manage the introduction of new Security Infrastructure into the Company IT Environment. |
13. Provide key leadership and guidance to Company in the development and implementation of security policies as related to the Services. Providing consultative security expertise to Company by making and recommending key decisions in security. |
14. Design integration of email filtering solution with Company LDAP/Active Directory for user authentication |
15. Provide planning, propose service levels, and draft policy statements |
16. Develop standards to maintain compliance within the scope of the Services, which support Company’s information security policies; |
17. Establish Supplier ISMS standards to managing security risks and improving information security to deliver results in accordance with Company’s security requirements and in accordance with Incident Management, Problem Management, Configuration Management, escalation management and Change Management processes |
18. Develop a process by which Company may at any time, subject to an agreed upon notification process, perform quality assurance tests (e.g., penetration tests, generating distributed denial of service (DDoS) activities, generating security alarms) of the security processes and security incident response functions by generating security events and monitoring Supplier’s response to determine if the appropriate action is taken at each step of the process |
19. Maintain all security documentation related to Company’s enterprise security architecture for Equipment, Software and networks |
20. Support Company’s compliance teams with the identification of solutions to meet Company’s compliance requirements |
21. Develop reporting for audit, compliance and board level meetings as directed by Company’s IT leadership |
—
You received this message because you are subscribed to the Google Groups “C2Crequirements” group.
To unsubscribe from this group and stop receiving emails from it, send an email to AllC2Copenings+unsubscribe@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/AllC2Copenings/CAOkwNxCMXaN6g35VSCJ4RDGS0gRV8s2YmvvjVFb0oyivUcPkqA%40mail.gmail.com.