Florida Department of Management Services Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services RFI
|
|
- Eleanore Chandler
- 7 years ago
- Views:
Transcription
1 Florida Department of Management Services Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services RFI
2 August 25, 2015 Re: Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services Mr. Joel Atkinson: Thank you for the opportunity to submit an RFI response for Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services. DH Technologies is pleased to present Florida Department of Management Services with this proposal for a Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services. We are prepared to leverage our past performance with several Department of Defense accounts. Our services team includes Justin Henderson who is 1 of 13 people worldwide to achieve Offense and Defense SANS Cyber Guardian certification, and vulnerability specialists to develop a thorough assessment. Why choose DH Technologies as a solution partner for this effort? You can be assured of a fully compliant, best-practice integration methodology Leverage our successful implementation experience with data center and virtualization solutions ranging from 100 to 10,000+ users at federal agencies. Be assured that all work will be completed with 100% satisfaction Employ a team of industry-recognized virtualization experts with numerous certifications from top vendors including GIAC Penetration Tester, Computer Hacking Forensics Investigator, Certified Ethical Hacker certifications. Be assured of a fully compliant solution, our team has deployed multiple DoD and NIST compliant solutions. We are a HUBZone-certified small business, and we can assist with meeting small business set-aside goals for your agency. Our unique ability to analyze business requirements and leverage the right technology to address tactical and strategic goals of an organization has been a key differentiator for DH Technologies, and we have a number of recent accomplishments to substantiate that claim. We re excited to be a part of this effort with Florida Department of Management Services and we are confident that collectively we will deliver the best solution possible. Thank you for your time and consideration. Sincerely, Devin Henderson, CEO / DH Technologies ii
3 Table of Contents 1. Company Background Contact Information Technical (Section IV Response)
4 1. Company Background DH Technologies (DH Tech) is a small business entity that has rapidly established itself as an industry-recognized expert in system integration/virtualization services and cyber security, as validated recently with The Federal Partner of Year 2014 & 2015 award by Nutanix;; The Federal Innovation Partner of the Year 2013 award by Arista Networks;; named to CRN s List of Tech Elite 250 in 2014 & DH Tech is an industry-recognized enterprise data center solution provider with extensive past performance in the Public and Private sectors. We leverage broad exposure gained from our work as a VMware Pre/Post sales Professional Services delivery partner. We focus on proficiency training and customer-facing fieldwork to ensure that we bring the best and brightest team to bear on our projects. We perform services around the globe to include all of the United States, US territories, and military facilities over seas. DH Mission Statement: DH TECHNOLOGIES s mission is to consistently deliver innovative, value-add solutions that effectively address business requirements with proven and repeatable processes. SERVICES and/or PRODUCTS Provided: Complete solution design, implementation and sustainment Datacenter Consolidation/Virtualization Penetration Testing Server Virtualization Application Virtualization Data Center Assessment Virtual Desktop Infrastructure/Mobile Cloud Solutions Continuity of Operations Planning Global Services Delivery for all US States, Territories, and military facilities. CERTIFICATIONS or ACCREDITATIONS or MEMBERSHIPS: VMware Premier Solutions Partner Nutanix Elite Partner & Platform Professional GIAC, EC Council, SANS Institute 1
5 2. Contact Information DH Technologies contact information: Devin Henderson DH Technologies 305 Harrison ST SE, Suite 1B Leesburg, VA
6 3. Technical (Section IV Response) 1) Pre-Incident Services:. a) Incident Response Agreements Terms and conditions in place ahead of time to allow for quicker response in the event of a cyber-security incident. We would develop an incident response agreement based on industry standards. The agreement can be tailored to be specific to state requirements and response time can be agreed upon.. b) Assessments Evaluate a State Agency s current state of information security and cyber-security incident response capability. A gap assessment can be provided based on industry standards methods such as NIST and the SANS 20 Critical Controls. A live assessment can also be performed to evaluate the State Agency s current detect and response capabilities. Depending on the needs, a crosswalk could be provided to base the gap assessment against the State Agency s needs such as DHS CDM, ISO 27002, etc. This would increase the time to report and costs but may be more comprehensive and actionable.. c) Preparation Provide guidance on requirements and best practices. We can work with you to develop policies and procedures based on industry standards. A security awareness program can be developed for both employees and incident response teams.. d) Developing Cyber-Security Incident Response Plans Develop or assist in development of written State Agency plans for incident response in the event of a cyber-security incident. A formal plan for incident response can be created using the industry standard six phase incident management process (PICERL). This will include the establishment of CERT teams and organizational structures so that decisions can be made in a timely matter and reduce damages. Also, a schedule can be established for updating the plan and testing it.. e) Training Provide training for State Agency staff from basic user awareness to technical education. We provide training documentation and custom labs upon request. Also, instructor training can be provided from a SANS instructor who is a qualified GSE and Cyber Guardian. 3
7 2) Post-Incident Services:. a) Breach Services Toll-free Hotline Provide a scalable, resilient call center for incident response information to State Agencies. We can establish an in house hotline to provide telephone response after an incident. This can also include breach notification letters as needed.. b) Investigation/Clean-up Conduct rapid evaluation of incidents, lead investigations and provide remediation services to restore State Agency operations to preincident levels. We provide subject matter experts skilled in incident handling and recovery. These experts can be used for live incident response as well as cleanup activities.. c) Incident response Provide guidance or technical staff to assist State Agencies in response to an incident. We provide subject matter experts to provide guidance and/or provide incident handling abilities during or after an incident. During such events, we can either provide guidance or leadership in handling the incident.. d) Mitigation Plans Assist State Agency staff in development of mitigation plans based on investigation and incident response. Assist State Agency staff with incident mitigation activities. We provide industry experts to provide strategic leadership and strategy in risk mitigation. This can range from identifying products or processes that could mitigate risk or staff augmentation to implement solutions.. e) Identity Monitoring, Protection, and Restoration Provide identity monitoring, protection, and restoration services to any individuals potentially affected by a cyber-security incident. We can establish an identity monitoring, protection, and restoration services for individuals impacted by a cyber-security incident. 4
8 Justin Henderson Résumé Page 1 of 2 IT Professional Systems and Solutions Architect, IT Consultant, and Project Manager 1 of 13 People worldwide to achieve Offense and Defense SANS Cyber Guardian certification. Results-driven leader experienced with designing and maintaining cross-platform systems and network infrastructures for small to large companies. Able to multi-task priorities and keep focus on the core business processes. Continual education through regular training and self-research. Able to resolve complex system and networking issues and train staff to handle ongoing business opportunities. Excellent communication, collaboration, and problem solving skills. Able to wear many hats and exceed well under pressure and time constraints. Aligns business goals and processes using industry standards and able to think outside the box. Projects and Accomplishments Achieved SANS Mentor status Performed migrations from Windows NT environments to Active Directory on 2012 Multiple Exchange migrations starting from Exchange 5.5 to Exchange 2010 Managed security team to design and test disaster recovery plans for multiple sites Managed infrastructure team to support systems with over a 100:1 server to staff ratio Performed internal and external penetration tests using industry standard methodologies Architected and built a fully redundant and scalable web server farms Migrated users from physical desktops to virtual desktops across multiple departments with various external devices Certifications and Training Microsoft IT Professional Enterprise Administrator 2008 Solutions Associate Systems Engineer Systems Administrator: Messaging Technology Specialist Systems Administrator Systems Engineer: Messaging Professional Security GIAC Penetration Tester GIAC Certified Firewall GIAC Windows Security GIAC Security Essentials Analyst Administrator Computer Hacking Security+ Forensics Investigator Systems Engineer: Systems Security Administrators: Security Tenable Nessus Certified Auditor Certified Sonicwall Security Administrator Certified Information Systems Security EC-Council Certified Security Analyst Professional Certified Ethical Hacker Licensed Penetration Tester Governance, Service, and Project Management Certified Information Systems Manager ITIL Foundation Project+ COBIT 5 Foundation Course ITIL Lifecycle: Continual Project Management Certified in Risk and Service Improvement Professional Information Systems Control Virtualization VMware Certified VMware Certified VMware Certified VMware Certified Professional 5 Professional 5 : Desktop Professional 4 Professional 3 Network and Hardware A+ I-Net+ Network+ Cisco Certified Entry Networking Technician Cisco Certified Network Associate
9 Justin Henderson Résumé Page 2 of 2 Database MySQL 5 Database Administrator MySQL 4 Core Education WESTERN GOVERNORS UNIVERSITY, Salt Lake City, UT Bachelors of Science, Network Design and Administration, LAKE LAND COLLEGE, Mattoon, IL Associates of Science, Network Administration, Technology Skills Server-Related Technologies Active Directory Microsoft SQL Apache MySQL Microsoft Exchange Microsoft IIS Clustering Load Balancing Proxy Certificate Authorities Virtualization Platforms / Operating Systems Windows NT Linux Android IOS Networking LAN WAN VPN DHCP DNS WINS TCP/IP SMTP Firewalls IDS VoIP FTP / HTTP Telnet / SSH Radius ISCSI NFS Programming Languages PHP Perl SQL MySQL Bash Scripting AutoIT PowerShell Batch Scripting Professional and Consulting Experience HEARTLAND DENTAL CARE, Effingham, IL 2009-Present Heartland Dental Care is the leading dental service management provider in the United States and is a leader of customer care in dentistry. Modeled around letting dentists practice dentistry and business users manage the business, Heartland has achieved record breaking growth while continuing to give back to the community. Systems and Security Architect Systems and security architect that manages the security, infrastructure, and networking team. Developed and created Heartland s security department and risk management platform. Responsible for the design and maintenance of enterprise systems including VMware, Microsoft, and all networking devices. SARAH BUSH LINCOLN HEALTH SYSTEM, Mattoon, IL 2008 Sarah Bush Lincoln Health Center is a not-for-profit, regional hospital centrally located in East Central Illinois' Coles County. Sarah Bush Lincoln is accredited by The Joint Commission, the nation's oldest and largest standardssetting and accrediting body in healthcare. Systems Engineer Identified and deploy virtual desktop system to lower support and increase agility of IT services. Implemented VMware Infrastructure 3.5 for server infrastructure. LAKE LAND COLLEGE, Mattoon, IL Lake Land College is a public community college offering career programs that lead to immediate employment, transfer programs that lead to baccalaureate degree, liberal arts, adult education, special job training, and retraining programs. Network Security Teacher Taught Network Security Fundamentals to students and fostered future growth opportunities. FIRST MID-ILLINOIS BANK & TRUST, Mattoon, IL First Mid-Illinois Bank and Trust is a locally community focused chain of banks in Illinois. Network Engineer Responsible for secure networking and server access from banks to central office. BONUTTI CLINIC, Effingham, IL Bonutti Clinic is a world-class clinical care and orthopedic surgical expertise facility specializing in minimally invasive surgical techniques and instrumentation. Network Administrator Design and implement company website and Active Directory structure. Responsible for day to day support.
Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring and Restoration Services
Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring and Request for Information 9/3/2015 12:00PM Prepared For State of Florida Department of Management Services Division of State
More informationLiquidware Labs Partner Solutions Brief. Streamlining Processes for Planning, Deploying, Securing and Managing Virtual Desktop Infrastructure
Streamlining Processes for Planning, Deploying, Securing and Managing Virtual Desktop Infrastructure 1 It s no secret that providing services to U.S. government agencies requires exacting standards as
More informationCyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services
4937 Fargo Street North Charleston SC 29418 Phone 843.266.2330 Fax 843.266.2333 w w w. c o d e l y n x. c o m Request for Information: Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring,
More informationBridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO.
Bridging The Gap Bridged Group is the Strategic partner of The Telstra Business Centre and Telstra Store. We are a Telstra Preferred Cloud Partner with over 35 years of experience between our senior staff
More informationSENIOR SYSTEMS ANALYST
CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and
More informationcarahsoft Florida Department of Management Services CARAHSOFT S RESPONSE TO THE REQUEST FOR INFORMATION
carahsoft CARAHSOFT S RESPONSE TO THE Florida Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services
More informationNextLabs International Private Limited. 1. Position: Software Engineer (Java) Location: Singapore
1. Position: Software Engineer (Java) NextLabs (www.nextlabs.com), a Silicon Valley technology company, is the leading provider of policydriven information risk management (IRM) software for large enterprises,
More informationDepartment of Management Services. Request for Information
Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley
More informationCourse Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion
Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,
More informationOVERVIEW DEGREES & CERTIFICATES
OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.
More informationSPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
More informationREQUEST FOR INFORMATION
Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services 3 September 2015 6506 Loisdale Rd, Ste 325
More informationJohn Smith Prattville, AL career@hashbangsecurity.com
John Smith Prattville, AL career@hashbangsecurity.com Career Objective I am a certified and skilled senior security and UNIX systems administrator with over twenty years of experience. I am seeking a position
More informationGEARS Cyber-Security Services
Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments
More informationFedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
More informationState of Florida Cyber Security Services RFI
RFI ATTENTION: State of Florida Dept. of Management Services Joel Atkinson Associate Category Manager 4050 Esplanade Way, Suite 360 Tallahassee, FL 32399-0950 (850) 488-1985 joel.atkinson@dms.myflorida.com
More informationNetwork Management and Defense Telos offers a full range of managed services for:
Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:
More informationCisco and VMware Virtualization Planning and Design Service
Cisco and VMware Virtualization Planning and Design Service Create an End-to-End Virtualization Strategy with Combined Services from Cisco and VMware Service Overview A Collaborative Approach to Virtualization
More informationBrandman University. School of CCNA
Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators
More informationApply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE
RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE
More informationFedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
More informationPosition Description. Job Summary: Campus Job Scope:
Position Description Report Run Date Sep 10 2015 11:07AM Position Number: 02018467 Dept: ENT APPS & INFRASTRUCTURE SVCS - 061419 Position: WNDOWS SYSTEM APPLICATION ADMINISTRATOR Approved Payroll Title
More informationImplementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
More informationSocial Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
More informationCourse 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course
More informationFISMA Cloud GovDataHosting Service Portfolio
FISMA Cloud Advanced Government Oriented Cloud Hosting Solutions Cyber FISMA Security Cloud Information Security Management Compliance Security Compliant Disaster Recovery Hosting Application Cyber Security
More informationInformation Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
More informationAdvancedHosting SM Solutions from SunGard Availability Services
AdvancedHosting SM Solutions from SunGard Availability Services A SINGLE POINT OF CONTACT A COMPLETE MANAGED SERVICES SOLUTION Higher levels of availability Continuous investment in people, technology
More informationConnecting PTE to Careers in Idaho
1 Connecting PTE to Careers in Idaho Wendi Secrist Director, Business Outreach July 21, 2015 www.pte.idaho.gov 2 School Portals NextSteps Career Information Where do I start? SkillStack lmi.idaho.gov College/University
More informationAPPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c
APPLICATION FOR BOARD APPROVAL of Locally Developed Course MCP CERTIFICATION 11/12a/12b/12c John Murtha APPLICATION FOR BOARD APPROVAL Of the Locally Developed MCP CERTIFICATION 11/12a/12b/12c PREAMBLE:
More informationMASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS
OVERVIEW MASTER S DEGREES & GRADUATE CERTIFICATES REGIONAL ACCREDITATION FUNDING OPTIONS 2016 Coursework to Meet Real World Demands The best. Made better. SANS graduate programs are the ultimate expression
More informationReliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
More informationINFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
More informationResearch, recommend, and assist in implementing identity automation solution.
Stephen Hargrove PO Box 592241 San Antonio, TX 78259 210-239-9763 stephen@stephenhargrove.com EXPERIENCE Information Security Officer Manager, Information Security Administration, UTHSCSA; San Antonio,
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationCurrent Vacancies. UK & South Africa. This document contains both Permanent & Contract roles.
Current Vacancies UK & South Africa This document contains both Permanent & Contract roles. To apply for any of the roles please email your CV and covering letter: Email: resourcing@ecs.co.uk Or call our
More informationSymantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
More informationInformation Technology Cluster
Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network
More informationState of Florida Department of Management Services
September 3, 2015 State of Florida Attn: Joel Atkinson Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services 350 Seventh Avenue 10th Floor New York, New
More information1.Cisco Network Architect
1.Cisco Network Architect Analyze business requirements to develop technical network solutions and their framework. Design, test, and inspect data communications systems. Perform network modeling, analysis,
More informationCybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
More informationHosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth)
Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) March 2014 Premier Provider of egov Services to the Commonwealth of Virginia Virginia
More informationCourse and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages
Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance
More informationCyber threats are growing.
Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College
More informationWyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X
More informationPREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK
MAXIMIZE PERFORMANCE AND REDUCE RISK 1 BROCHURE COMPLEXITIES IN MISSION CRITICAL SYSTEMS CONTINUE TO INCREASE Mission critical communications systems have become increasingly complex as more features and
More informationNew-Age Undergraduate Programme
New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security
More informationEnterprise SM VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES
VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES 5.1 MANAGED TIERED SECURITY SERVICES [C.2.7.4, M.2.1.3] Level 3 will support the GSA s Multi-Tier Security Profiles (MTSP) initiative in accordance
More information6. Responsible for installing, configuring and administering VMware vsphere for test and production environments.
DATE PREPARED: 5/18/2016 TITLE: JOB PURPOSE: NETWORK ENGINEER This position is responsible for the administration and maintenance of the City s IT network infrastructure including network security, data
More informationStatement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy
Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee
More informationHosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
More informationCorporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.
Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services
More informationNetwork Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7
1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network
More informationCurrent Vacancies. UK & South Africa. This document contains both Permanent & Contract roles.
Current Vacancies UK & South Africa This document contains both Permanent & Contract roles. To apply for any of the roles please email your CV and covering letter: Email: resourcing@ecs.co.uk Or call our
More informationMobile MOUSe SERVER ADMINISTRATOR ONLINE COURSE OUTLINE
Mobile MOUSe SERVER ADMINISTRATOR ONLINE COURSE OUTLINE COURSE TITLE SERVER ADMINISTRATOR COURSE DURATION 15 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW The Server Administrator designation
More informationForensic Certifications
Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice
More informationAt the Heart of Connected Manufacturing
www.niit-tech.com At the Heart of Connected Manufacturing Transforming Manufacturing Operations to Drive Agility and Profitability The success of the new manufacturing network hinges on the agility of
More informationProfessional Experience
MUTHURAJA S.P. Mobile : +91 9944 282299 E-Mail : s.p.muthuraja@gmail.com Career Summary Windows administrator with over 9.5 years of hands-on and multi-tasking experience, adept at handling multiple system
More informationIT Authorities Builds and Manages Technology Platform of the Future for Coca-Cola Beverages Florida
IT Authorities Builds and Manages Technology Platform of the Future for Coca-Cola Beverages Florida Providing a dynamic, flexible IT infrastructure; the key to success of growing Florida bottler Photo
More informationInjazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
More informationHackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
More informationCyber Defense Operations Graduate Certificate
The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide
More informationPayment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
More informationChart Optimize Transform Your Data Center
Chart Optimize Transform Your Data Center Advisory Services The Strength of Your Network Begins with An Optimized Physical Infrastructure The performance of your data center depends on a complex interrelationship
More informationACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011
ACADEMIC PROGRAM REVIEW of PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE May 12-13, 2011 Report Amended October 2011 Table of Contents PC AGE Organizational Profile... 3 Academic Program Review
More informationCOMPUTER NETWORKS AND SECURITY A FUTURE IN
COMPUTER NETWORKS AND SECURITY A FUTURE IN COMPUTER NETWORKS & SECURITY WHAT ARE CAREERS IN NETWORKS AND SECURITY ALL ABOUT? Computer networks are an inextricable part of modern life. We use computers
More informationBridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement
Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement 2015 Burning Glass Technologies Cybersecurity has a Big Problem Attacks are rising Cyber incidents jumped
More informationJACK LEVY 8609 Misty River Ct. Tampa, FL 33637 Home: (813) 601-1434 JLEVY1126@gmail.com
SYSTEMS ADMINISTRATOR\Engineer Infrastructure planning, development and maintenance Systems administrator with 8 years of experience in IT infrastructure, deployment, planning, installation, configuration.
More informationClick here to submit your resume
To be considered for positions with SE Solutions candidates must be clearable to a Top Secret level. A current Secret clearance or higher is preferred. US citizenship is required. All positions are full
More informationIT-CNP, Inc. Capability Statement
Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government
More informationCourse Descriptions. CS 101 Intro to Computer Science
Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating
More informationWelcome to Tech Data's Enterprise Service Center!
Welcome to Tech Data's Enterprise Service Center! Resellers today are looking for ways to reduce their costs and maximize their resources. Leveraging Tech Data s services has become a successful strategy
More informationDeveloping a Mature Security Operations Center
Developing a Mature Security Operations Center Introduction Cybersecurity in the federal government is at a crossroads. Each month, there are more than 1.8 billion attacks on federal agency networks, and
More informationDATABASE ADMINISTRATOR (SQL & ORACLE) Location: Richmond, VA (1 position)
DATABASE ADMINISTRATOR (SQL & ORACLE) Location: Richmond, VA (1 position) Universal Adaptive Consulting Services, Inc (UACS) is seeking a highly motivated, savvy and energetic professional for the role
More informationAcademic Programs INFORMATION TECHNOLOGY
Academic Programs INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY The Information Systems programs at Tidewater Community College cover the essential areas of study in information systems technology. The
More informationRemote Infrastructure Support Services & Managed IT Services
Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The
More informationAbout Injazat Data Systems
About Injazat Data Systems Injazat Data Systems is an industry-recognized market leader in the region for secure and business-aligned IT services. Injazat serves a diverse variety of industry sectors,
More informationEnterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
More informationWyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
More informationAccess FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk
More informationAbout Advent One. Contents. 02 What we do. 03 Infrastructure Services. 04 Cloud and Managed Services. 07 Hosting Desktop. 08 Phone.
About Advent One Contents 02 What we do 03 Infrastructure Services 04 Cloud and Managed Services 07 Hosting Desktop 08 Phone 09 Email 10 Back up Recovery 12 Dev/Test 13 Contact Making technology work.
More informationGlobal Knowledge Cybersecurity Training
Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis,
More informationCisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
More informationIT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski
IT AUDIT Current Trends and Top Risks of 2015 2 02 Eric Vyverberg WHO WE ARE David Kupinski Randy Armknecht Associate Director Internal Audit Protiviti 317.510.4661 eric.vyverberg@protiviti.com Managing
More informationEND TO END DATA CENTRE SOLUTIONS COMPANY PROFILE
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing
More informationDIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES
G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..
More informationLinux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
More informationGREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY. Adult Students: 1050 Hours
GREAT PLAINS TECHNOLOGY CENTER COURSE OF STUDY Career Cluster: Career Pathway: Career Major: Career Major Hours: Information Technology (IT) Network Systems (IT001) Cyber Security Forensics Specialist
More informationKASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
More informationGlobal Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
More informationHackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
More informationALASKA HOUSING FINANCE CORPORATION
ALASKA HOUSING FINANCE CORPORATION Infrastructure Administrator I-IV (DOE) (Two Positions) Anchorage/Job #44-15 ===================================================================== Definition Under supervision
More informationMANAGED IT SERVICES. Expert management
MANAGED IT SERVICES Expert management for your missioncritical workloads 2 / 8 MANAGED IT SERVICES Managed IT services from Sungard Availability Services On average, enterprises realize only 43% of technology
More informationLINUX / INFORMATION SECURITY
LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,
More informationCybersecurity Strategic Consulting
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
More informationTraining Course ECSA/LPT
Brochure More information from http://www.researchandmarkets.com/reports/2226534/ Training Course ECSA/LPT Description: The EC-Council ECSA/LPT EC-Council Certified Security Analyst/ Licensed Penetration
More informationProtecting Malaysia in the Connected world
Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE
More informationSTATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO
STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO Introduction Since taking office in January 2015, Governor Larry Hogan has
More informationProven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia
Resume: Michael McNab Systems Administrator and Web Support Proven Technical and Management skills over a career spanning more than 10 years Name: Address: Phone: Email Address: Website: Michael McNab
More informationSomeone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.
New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone
More information