by Steve Earle | May 11, 2015 | Job Opportunities, Marketing, Newsletters
Our Miami based client has a 6 month assignment for a local IT Security Engineer responsible to implement and project manage Information Security related infrastructure projects
Position Requirements:
• Bachelor’s degree in a IT related discipline required
• 5+ years’ experience in systems and network engineering that is both deep and broad.
• Combination IT Engineering and Project Management skills
• Lead design delivery of large-scale, high-quality systems focused on IT infrastructure
• Deep hands-on design and deployment expertise with massive global networks, complex distributed systems architectures, and automation of network infrastructure
• Attention to detail and organizational skills
• Experience with agile development methodology
SherlockTalent loves to share our $500 referral bonus.
by Steve Earle | May 11, 2015 | Events, Marketing, Newsletters
You are invited to join the Microsoft Business Intelligence South Florida User Group (MSBISF) for an evening with Gareth Swanapoel, SQL Server DBA, to discuss SQL Server 2012/2014 Columnstore Indexes. The event will be held at NSU, Carl DeSantis Bldg Room 4030, Fort Lauderdale, FL 33314 and is sponsored by, GRAVITY IT RESOURCES

by joshuapiller | May 11, 2015 | Marketing, Newsletters
Bill Inmon, world-renowned expert, speaker and author on data warehousing, is widely recognized as the “Father of Data Warehousing.” He was also voted as “One of the Ten IT People Who Mattered in the Past Forty Years” by the Computer World Magazine’s July 2007 issue. He is creator of the Corporate Information Factory and more recently, creator of the Government Information Factory. With over 35 years of experience in database technology management and data warehouse design, he has been a keynote speaker for many major computing association and many industry conferences, seminars, and tradeshows. Newest Book: Data Architecture: A Primer for the Data Scientist: Big Data, Data Warehouse and Data Vault; Nov 26, 2014 by W.H. Inmon and Dan Linstedt.
by joshuapiller | May 11, 2015 | Marketing, Newsletters
Join moderator Bill Witiak, General Manager, MTN-TV and our panel of guests on Thursday, May 21 for our May event “Guest Facing Technology”.
In today’s hospitality industry, technology plays not just a key but also a required role when it comes to the guest. Whether a guest is researching different vacation alternatives and experiences, in the midst of the vacation and curious about dining or entertainment options, or looking to relax and unwind. Technology plays a part, either through the delivery of options, information, or by providing the entertainment itself.We’ve seen the evolution through the use of technology enabled tools and offerings, the internet and smart phones and now internet enabled devices. But what lies ahead and where do industry leaders see technology taking the guest? Come join us while we explore the ever changing and evolving role of guest facing technology in the hospitality industry.
by Steve Earle | May 11, 2015 | Marketing, Newsletters
Many thanks to our friend Michael Scheidell of Security Privateers for alerting the Tech Hiring community to this danger.
The current shortage of qualified IT security professionals is affecting organizations across the United States, but now it seems that criminals are taking advantage of the booming job market in a new way: Proofpoint reports that cyber criminals have been infecting businesses with malware through fake job applications.
Combining “phishing and social engineering techniques in order to trick users into opening a malicious documentâ€, criminals have been uploading infected files to online job site CareerBuilder.com, which exploit “a memory corruption vulnerability for Word RTF (such as CVE-2014-1761, CVE-2012-0158, and others).â€
It may seem a labor-intensive way of attacking organizations, but because of this approach the “probability of the mail being delivered and opened is higherâ€. As Proofpoint notes, “recipients are likely to read them and open the attachments because not only are they legitimate emails from a reputable service, but these emails are expected and even desired by the recipient. Moreover, because of the way that resumes are circulated within an organization, once the document has been received by the owner of the job listing (often “hr@<company name>â€) it will be sent to the hiring manager, interviewers, and other stakeholders, who will open and read it as well. Taking advantage of this dynamic enables the attackers to move laterally through their target organization.â€
Having been alerted by Proofpoint, CareerBuilder “took prompt action to address the issueâ€, but other recruitment sites could still be vulnerable. We recommend you exercise caution when opening attachments from unknown sources – especially if you’re recruiting. Once infected with malware, organizations are at significant risk of data breach, or wider compromise.
by: Neil Ford
by joshuapiller | May 11, 2015 | Job Opportunities, Marketing, Newsletters
You are invited to Interview Interns at the 2015 NAF Annual Student / Industry Conference – post your company’s internship positions and schedule on-site interviews through the GetMyInterns.org app.