Top Job Pick – 6 Month Assignment for Windows Security Engineer – Miami

Top Job Pick – 6 Month Assignment for Windows Security Engineer – Miami

Apply to this job.

Our Miami based client has a 6 month assignment for a local IT Security Engineer responsible to implement and project manage Information Security related infrastructure projects

Position Requirements:
• Bachelor’s degree in a IT related discipline required
• 5+ years’ experience in systems and network engineering that is both deep and broad.
• Combination IT Engineering and Project Management skills
• Lead design delivery of large-scale, high-quality systems focused on IT infrastructure
• Deep hands-on design and deployment expertise with massive global networks, complex distributed systems architectures, and automation of network infrastructure
• Attention to detail and organizational skills
• Experience with agile development methodology

SherlockTalent loves to share our $500 referral bonus.

The Father of Data Warehousing Bill Inmon @ TDWI – May 29

The Father of Data Warehousing Bill Inmon @ TDWI – May 29

Bill Inmon, world-renowned expert, speaker and author on data warehousing, is widely recognized as the “Father of Data Warehousing.” He was also voted as “One of the Ten IT People Who Mattered in the Past Forty Years” by the Computer World Magazine’s July 2007 issue. He is creator of the Corporate Information Factory and more recently, creator of the Government Information Factory. With over 35 years of experience in database technology management and data warehouse design, he has been a keynote speaker for many major computing association and many industry conferences, seminars, and tradeshows. Newest Book: Data Architecture: A Primer for the Data Scientist: Big Data, Data Warehouse and Data Vault; Nov 26, 2014 by W.H. Inmon and Dan Linstedt.

SFTA Panel – Guest Facing Technology

SFTA Panel – Guest Facing Technology

Join moderator Bill Witiak, General Manager, MTN-TV and our panel of guests on Thursday, May 21 for our May event “Guest Facing Technology”.
In today’s hospitality industry, technology plays not just a key but also a required role when it comes to the guest. Whether a guest is researching different vacation alternatives and experiences, in the midst of the vacation and curious about dining or entertainment options, or looking to relax and unwind. Technology plays a part, either through the delivery of options, information, or by providing the entertainment itself.We’ve seen the evolution through the use of technology enabled tools and offerings, the internet and smart phones and now internet enabled devices. But what lies ahead and where do industry leaders see technology taking the guest? Come join us while we explore the ever changing and evolving role of guest facing technology in the hospitality industry.
Recruiting? Beware malware-infected job applications

Recruiting? Beware malware-infected job applications

Many thanks to our friend Michael Scheidell of Security Privateers for alerting the Tech Hiring community to this danger.

The current shortage of qualified IT security professionals is affecting organizations across the United States, but now it seems that criminals are taking advantage of the booming job market in a new way: Proofpoint reports that cyber criminals have been infecting businesses with malware through fake job applications.

Combining “phishing and social engineering techniques in order to trick users into opening a malicious document”, criminals have been uploading infected files to online job site CareerBuilder.com, which exploit “a memory corruption vulnerability for Word RTF (such as CVE-2014-1761, CVE-2012-0158, and others).”

It may seem a labor-intensive way of attacking organizations, but because of this approach the “probability of the mail being delivered and opened is higher”. As Proofpoint notes, “recipients are likely to read them and open the attachments because not only are they legitimate emails from a reputable service, but these emails are expected and even desired by the recipient. Moreover, because of the way that resumes are circulated within an organization, once the document has been received by the owner of the job listing (often “hr@<company name>”) it will be sent to the hiring manager, interviewers, and other stakeholders, who will open and read it as well. Taking advantage of this dynamic enables the attackers to move laterally through their target organization.”

Having been alerted by Proofpoint, CareerBuilder “took prompt action to address the issue”, but other recruitment sites could still be vulnerable. We recommend you exercise caution when opening attachments from unknown sources – especially if you’re recruiting. Once infected with malware, organizations are at significant risk of data breach, or wider compromise.

by: Neil Ford