Wednesday, August 26, 2009

Cisco Sales Specialist position in Glenview, IL

Cisco Sales Specialist NEEDED in Glenview, IL!
We are looking for an IT Sales specialist to make an immediate impact and perform business development and sales of Cisco Network products and networking solutions, manage vendor relationships, and other related duties

REQUIRED EXPERIENCE
Candidates must have 5-10 years IT sales and enterprise sales, Cisco product and solutions sales experience

APPLY HERE
http://www.pronetworkmedia.com/jobs/index.php?post_id=1346

Tuesday, August 25, 2009

Senior Network Security Engineer

Senior Network Security Engineer
Location US - Virginia - FDIC (VA31)
Clearance Required Yes - Required to Start
Clearance Type Secret
Daily Responsibilities SRA is searching for talented IT security professionals to join our growing Information Assurance team. Team members support our clients' information security programs by engaging in a mix of the following activities. The day-to-day responsibilities for this project are as follows:

· Providing senior level support for the installation, upgrades, configuration changes, and monitoring of network security systems – which includes firewalls, secure email & spam filtering appliances, web proxies, router ACLs, and network based intrusion detection systems.

· Act as Subject Matter Expert for the troubleshooting of network security issues in our production and non-production environments.

· Working closely with the Computer Security Incident Response Team within the agency and other Incident Response Teams across the federal space to identify & mitigate network intrusion attacks.

· Working with other Federal agencies and third-party vendors to provide secure email solutions - using industry standards such as TLS, PGP, and S/MIME.

Future responsibilities could include:

•performing technical vulnerability assessments;
•engaging in intrusion detection and prevention;
•providing incident reporting and response capability;
•offering investigative and computer forensics support;
•conducting penetration tests;
•providing patch and exploit dissemination;
•providing technical computer security training to both internal and external audiences;
•conducting security product and suite research;
•evaluating, testing, and configuring various security products;
•carrying out technical certification reviews (including Web sites);
•installing, configuring, and implementing security hardware and software solutions (firewalls, etc.);
•offering security help desk support; and
•providing computer security lab services.
Required: Years of experience (min) 6-9
Required: Degree Bachelors
Required: Skills Successful candidates will possess a mix of the following knowledge, skills, attributes, and experience:

•excellent client relationship management skills;
•well-developed oral and written communication skills;
•an ability to deal with individuals at all levels;
•a Bachelor's or Master's degree in a related discipline;
•familiarity with FISMA, NIST, OMB A-130, and other information security-related Federal guidelines; and
•an active Government security clearance, or the ability to obtain one.

Tuesday, August 11, 2009

Help Desk Position

Joanne,

Just a heads up, my old boss is going to need some Help desk help this month towards the end, just a week or two of consulting work. Rates would have to be disscussed. It's at a pair of Charter Schools in Chicago and would be carting some computers around and running some basic setups on them. If you want more information you can e-mail my boss John Fletcher at jfletcher@catalystschools.org. I'm letting you know because I was just thinking you might be able to post it on your blog or you might know someone who could use a couple weeks of work possibly.

Paul Webb

Monday, August 3, 2009

ISO and CCSP Security Domains

There has been some confusion with students as to the number and category of defined ISO and CISSP security domains. This is quite understandable as the CISSP security domains have significant parallels with the domains defined by the International Organization for Standardization (ISO) International Elecgtrotechnical Commission (IEC).

There are 12 security domains specified by the ISO. The 12 domains are intended to serve as a common basis for developing organizational security standards and effective security management practices, and to help build confidence in inter-organizational activities.

The 12 domaines of network security: Risk Assessment; Security Policy; Organization of Information Security; Assess Management; Human Resources Security; Physical and Environmental Security; Communications and Operations Management, Access Control; Information Systems Acquistion, Development and Maintenance; Information Security Incident Management; Business Continuity Management; and Compliance.

The CISSP, one of the most popular certifications in the network security profession, was the first credential in the field of information security accredited by the American National Standards Institute (ANSI). For CISSP credential, in addition to five years of experience, professional experience must be in two or more of 10 defined (ISC)2 CISSP domains.

The 10 CISSP domains include: Access Control; Application Security; Business Continuity and Disaster Recovery Planning; Cryptography; Information Security and Risk Management; Legal, Regulations, Compliance and Investigations; Operations Security; Physical (Environmental) Security; Security Architecture and Design; and Telecommunications and Network Security.

While the CISSP domains are specific to (ISC)2 CISSP certification, the ISO domains serve as a useful reference for networking and/or security professional, independent of any specific certification.

Wednesday, July 22, 2009

How to calculate which subnet a host is on . . .

From, "Classful IP Subnet Calculations", by Josh Gentry, which can be found under "Links Worth Visiting".

Given the IP address of a host and the subnet address for the network, you need to be able to calculate which subnet that host is on. To do this we compare the binary representation of the pertinent octet of the subnet mask witht he binary representation of the corresponding octet in the IP address. Example:

IP address=172.60.50.2
subnet mask=255.255.224.0

50= 00110010
224=11100000

We perform a logical on these two numbers. We will be left with only the bits where there is a one in both octets.

00110010
11100000
--------
00100000=32

This host is on subnet 172.60.32.0.

Monday, June 22, 2009

SMTP

There has been much confusion as to just what SMTP applications are responsible for sending and delivering mail. I am going to try to clarify things a bit. While mail servers (mail transfer agents) use SMTP to send and receive mail messages, client mail applications normally use only SMTP for relaying messages to a mail server. For receiving messages, client applications normally use Post Office Protocol (POP) or Internet Message Access Protocol (IMAP) to access their mail box accounts on a mail server. Since SMTP is a delivery protocol only, it cannot pull messages from a remote server on demand. Because of this, POP and IMAP are used to retrieve messages and manage mail boxes.

The SMTP client typically initiates a Transmission Control Protocol (TCP) connection to the SMTP server on the well-known port designated for SMTP, port number 25. The originating host, initiating the SMTP session, can be either an end-user's email client, the mail user agent (MUA), or a relay server's mail transfer agent (MTA).

When users compose e-mail messages, they typically use a MUA (email client). The MUA allows messages to be sent and places received messages into the client's mailbox. In order to receive email, as stated earlier, the e-mail client can use POP.

The e-mail server operates two separate processes: MTA and Mail Delivery Agent (MDA). The MTA process is used to forward e-mail, as stated above. The MTA receives messages from the MUA or from another MTA on another e-mail server. Based on the message header (the email envelope and email header is seen by every MTA), it determines how a message has to be forwarded to reach its destination. If the mail is addressed to a user whose mailbox is on the local server, the mail is passed to the MDA. If the mail is for a user not on the local server, the MTA routes the e-mail to the MTA on the appropriate server.

The MDA accepts a piece of e-mail from a MTA and performs the actual delivery. The MDA receives all the inbound mail from the MTA and places it into the approprite users' mailboxes.

Keep in mind, most e-mail communications use the MUA, MTA, and MDA applications. However, there are other alternatives for e-mail delivery that are outside the scope of our CCNA studies. Also keep in mind, the interoperability standard, RFC2821, which defines the Mail Transfer Architecture indicates "the implied boundaries between MUAs and MTAs often do not accurately match common, and conforming, practices with Internet mail."

Monday, May 25, 2009

Why Can't I Skip My Twenty Minutes of Reading Tonight?

Why Can't I Skip My Twenty Minutes of Reading Tonight? (shared on mailring by Emmy Ellis: source unknown) came via my granddaughter's 2nd grade teacher. I was so happy to receive it and want to share it with you too!

Why Can't I Skip My Twenty Minutes of Reading Tonight?
Let's figure it out -- mathematically!

Student A reads 20 minutes five nights of every week;
Student B reads only 4 minutes a night .. or not at all!

Step 1: Multiply minutes a night x 5 times each week.
Student A reads 20 minutes x 5 times a week = 100 mins./week
Student B reads 4 minutes x 5 times a week = 20 minutes

Step 2: Multiply minutes a week x 4 weeks each month.
Student A reads 400 minutes a month
Student B reads 80 minutes a month

Step 3: Multiply minutes a month x 9 months/school year
Student A reads 3600 minutes in a school year
Student B reads 720 minutes in a school year

Student A practices reading the equivalent of ten whole school days a year. Student B gets the equivalent of only two school days of reading practice.

By the end of 6th grade if Student A and Student B maintain these same reading habits, Student A will have read the equivalent of 60 whole school days.
Student B will have read the equivalent of only 12 school days.

One would expect the gap of information retained will have widened considerably and so, undoubtedly, will school performance. How do you think Student B will feel about him/herself as a student?

Some questions to ponder:

Which student would you expect to read better?
Which student would you expect to know more?
Which student would you expect to write better?
Which student would you expect to have a better vocabulary?
Which student would you expect to be more successful in school... and in life?