2 New Messages
Digest #1394
1
Controller w/Payroll & Benefits duties - Asset Mgmt. co. - Summit NJ by "Keith Bogen SPHR" hrslugger2002
Messages
Tue Nov 20, 2012 11:05 am (PST) . Posted by:
"Keith Bogen SPHR" hrslugger2002
Contact Marilyn Richards (MRichards@snellings
Our asset management client seeks an experienced accounting professional to perform all accounting, payroll and human resources functions.
Duties include all A/P, A/R, GL postings using QuickBooks, monthly bank reconciliations, financial statement preparation, payroll processing and employee benefits management.
Requirements:•Prior accounting and human resources experience•
Previous experience at an investment firm•QuickBooks knowledge mandatory; ADP payroll experience a plus•Excellent MS Office skills•Bachelors degree strongly preferred
Hiring immediately -- reviewing resumes today! Send qualified resumes to: Marilyn Richards MRichards@snellings
Tue Nov 20, 2012 4:00 pm (PST) . Posted by:
"John Barry" itechjohn
Information Security Officer/Engineer
Wilton, CT
Perm position
Summary:
Information Security Officer researches, develops, implements, tests and
reviews the company's information security in order to protect information
and prevent unauthorized access. Officer informs users and co-workers about
security measures, explains potential threats, implements security measures
and monitors networks. Officer is responsible for gathering information
necessary to maintain security and establish functioning external barriers
such as firewalls and other security measures. He or she assesses the impact
on system modifications and technological advances. Officer reviews systems
in order to identify potential security weaknesses, recommend improvements
to amend vulnerabilities, implement changes and document upgrades.
Candidates must be highly analytical and effectively able to troubleshoot
and prioritize needs, requirements and other issues. Aside from technical
skills, prospective candidates should have excellent communications,
teamwork, leadership and conflict management skills. Because of the constant
developing nature of information systems and cyber attacks, officers must be
committed to continuous learning and system development.
Responsiblities:
Enhances security team accomplishments and competence by planning delivery
of solutions; answering technical and procedural questions for less
experienced team members; teaching improved processes; mentoring
infrastructure team members.
Determines security requirements by evaluating business strategies and
requirements; researching information security standards; conducting system
security and vulnerability analyses and risk assessments; studying
architecture/platform; identifying integration issues; preparing cost
estimates.
Plans security systems by evaluating network and security technologies;
developing requirements for local area networks (LANs), wide area networks
(WANs), virtual private networks (VPNs), routers, firewalls, and related
security and network devices; designs public key infrastructures (PKIs),
including use of certification authorities(CAs) and digital signatures as
well as hardware and software; adhering to industry standards.
Implements security systems by specifying intrusion detection methodologies
and equipment; directing equipment and software installation and
calibration; preparin g preventive and reactive measures; creating,
transmitting, and maintaining keys; providing technical support; completing
documentation.
Maintains security by monitoring and ensuring compliance to standards,
policies, and procedures; conducting incident response analyses; developing
and conducting training programs; prepares system security reports based on
analysis; upgrades security systems by monitoring security environment,
identifying security gaps, evaluating and implementing enhancements.
Requirements:
Minimum ten (10) years experience in a large, complex information system
environment, four (4) years of which must include direct and primary duties
in IT Security.
Expertise in state-of-the-art IT security systems, tools, programs and
policies.
Advanced analytical and problem solving skills.
Superior communication skills; comfortable interacting with all levels of
management.
Strong customer service and problem solving skills. Requires occasional
weekend and night time work.
Bachelor'sdegree in Computer Science or Information Systems, or at least 5
- 7 years of related experience, or an equivalent combination of education
and experience.
Vendor certifications such as MCSE, CCNA, CCNP required.
Security certification such as Certified Information System Security
Professional (CISSP), Certified Information Systems Manager (CISM) strongly
preferred
Best regards,
John Barry
ITech Consulting Partners
30 Church Hill Road
Newtown, CT 06470
203-270-0051 Ext: 301
203-270-0071 Fax
john@itechcp.com
www.itechcp.com
Providing IT professionals on a contract or fulltime basis.
Please visit our website for more information about our company and a list
of our hot jobs: <http://www.itechcp.com/ > www.itechcp.com
linkedin profile: <http://www.linkedin.com/in/johnbarryitech >
www.linkedin.com/in/johnbarryitech
<http://www.facebook.com/pages/Newtown-CT/ITech-Consulting-Partners/50093108
5054#!/pages/Newtown-CT/ITech-Consulting-Partners/500931085054?v=wall>
http://www.facebook.com/pages/Newtown-CT/ITech-Consulting-Partners/500931085
054#!/pages/Newtown-CT/ITech-Consulting-Partners/500931085054?v=wall
www.twitter.com/itechcpjobs
Wilton, CT
Perm position
Summary:
Information Security Officer researches, develops, implements, tests and
reviews the company's information security in order to protect information
and prevent unauthorized access. Officer informs users and co-workers about
security measures, explains potential threats, implements security measures
and monitors networks. Officer is responsible for gathering information
necessary to maintain security and establish functioning external barriers
such as firewalls and other security measures. He or she assesses the impact
on system modifications and technological advances. Officer reviews systems
in order to identify potential security weaknesses, recommend improvements
to amend vulnerabilities, implement changes and document upgrades.
Candidates must be highly analytical and effectively able to troubleshoot
and prioritize needs, requirements and other issues. Aside from technical
skills, prospective candidates should have excellent communications,
teamwork, leadership and conflict management skills. Because of the constant
developing nature of information systems and cyber attacks, officers must be
committed to continuous learning and system development.
Responsiblities:
Enhances security team accomplishments and competence by planning delivery
of solutions; answering technical and procedural questions for less
experienced team members; teaching improved processes; mentoring
infrastructure team members.
Determines security requirements by evaluating business strategies and
requirements; researching information security standards; conducting system
security and vulnerability analyses and risk assessments; studying
architecture/
estimates.
Plans security systems by evaluating network and security technologies;
developing requirements for local area networks (LANs), wide area networks
(WANs), virtual private networks (VPNs), routers, firewalls, and related
security and network devices; designs public key infrastructures (PKIs),
including use of certification authorities(
well as hardware and software; adhering to industry standards.
Implements security systems by specifying intrusion detection methodologies
and equipment; directing equipment and software installation and
calibration; preparin g preventive and reactive measures; creating,
transmitting, and maintaining keys; providing technical support; completing
documentation.
Maintains security by monitoring and ensuring compliance to standards,
policies, and procedures; conducting incident response analyses; developing
and conducting training programs; prepares system security reports based on
analysis; upgrades security systems by monitoring security environment,
identifying security gaps, evaluating and implementing enhancements.
Requirements:
Minimum ten (10) years experience in a large, complex information system
environment, four (4) years of which must include direct and primary duties
in IT Security.
Expertise in state-of-the-
policies.
Advanced analytical and problem solving skills.
Superior communication skills; comfortable interacting with all levels of
management.
Strong customer service and problem solving skills. Requires occasional
weekend and night time work.
Bachelor'sdegree in Computer Science or Information Systems, or at least 5
- 7 years of related experience, or an equivalent combination of education
and experience.
Vendor certifications such as MCSE, CCNA, CCNP required.
Security certification such as Certified Information System Security
Professional (CISSP), Certified Information Systems Manager (CISM) strongly
preferred
Best regards,
John Barry
ITech Consulting Partners
30 Church Hill Road
Newtown, CT 06470
203-270-0051 Ext: 301
203-270-0071 Fax
john@itechcp.
www.itechcp.
Providing IT professionals on a contract or fulltime basis.
Please visit our website for more information about our company and a list
of our hot jobs: <http://www.itechcp.
linkedin profile: <http://www.linkedin
www.linkedin.
<http://www.facebook
5054#!/pages/
http://www.facebook
054#!/pages/
www.twitter.
No comments:
Post a Comment