Your Ad Here

Wednesday, August 26, 2009

Security Job: Information Security Research Forensics Engineer

Position Summary for

Information Security Research Forensics Engineer

Job Type:

Full Time

Job Location:

Nashville, TN


$80,000 - $90,000 plus potential bonus




BS Preferred, BUT nit required



Travel %:

Maximum of 25%

Relo Paid:

Yes, assistance is being offered

Job Description has been engaged to assist in identifying a difficult-to-find, deeply skilled, passionate about information security professional to join the corporate information security team of a global company. This role is designed for the combination of a white hat hacker, security researcher, security generalist, security engineer and computer forensics expert.

The Security Engineer will handle network intrusion monitoring, malware analysis, incident response, computer forensics and many other related activities. Additional responsibilities include: Systems installation, configuration and testing, wireless security, password cracking, security engineering, war-dial scanning, application testing, operating system hardening, penetration testing, risk assessments and more.

The candidate chosen for this role will demonstrate a passion for their chose career of information security combined with strong personal character and high personal integrity.

The Security Engineer will present investigation findings to a variety of audiences that could include internal audit, office of the Chief General Counsel, external legal bodies requesting subpoena response information and others. Travel up to 25% is possible and can be global in scope. When traveling to global locations, trips could be several weeks in duration. Outstanding training opportunities exist. This role is designed for someone who has chosen information security as a career because they are passionate about becoming an expert in many domains of subject matter expertise.

Job Requirements

· Requires 10 or more years of experience where a BA/BS degree is preferred. An advanced degree is desirable.

· Industry certification including the CISSP and/or GIAC certifications preferred.

· Candidates will demonstrate deep experience in the following areas:

o Deep and well-rounded information security knowledge;

o Very deep, in the weeds technical skills;

o Solid understanding of TCP/IP, common network protocols and services;

o Knowledge of various operating systems (UNIX, Linux, Windows);

o Strong problem solving and trouble shooting skills, sound judgment and sound character;

o One who can work independently at times and also part of a closely-knit team at other times;

o Excellent verbal and written communication skills;

o Well-rounded understanding of regulatory compliance requirements, common security frameworks and overall best practices.

· Industry certification including the CISSP and/or GIAC certifications preferred.

· Strong candidates will demonstrate extensive knowledge of risks and threats, knowledge of vulnerabilities, malware, attack tools, attacker methodology, exploit techniques, security controls and countermeasures.

· Must demonstrate a deep understanding of critical security infrastructure and technologies to include: Digital certificates, packet capture and packet decode devices, VPN, IDS, IPS, HPIS, BIDS, firewalls, encryption, honeypots, etc.

For a more detailed understanding of this position, please contact me directly for a confidential conversation.

Wils Bell - President

Email:, Inc.

POB 620298

Oviedo, FL 32762

Phone: 407-365-2404

eFax: 407-956-4976

LinkedIn Profile:


Twitter: Security_REC

To view all Security Jobs please visit:

Wednesday, August 19, 2009

Using Login Banner on a Mac OS X system

What is a login Banner?

A login banner is a statement made by the system owner that asserts their rights and informs the users of the system what expectation of privacy they should have. Login banners are a critical aspect of IT system security as they allow IT systems administrators and IT Security staff to monitor the system for intrusion and abuse.

Why do we need login banners?

In any modern IT system log monitoring, network monitoring, and security monitoring take place at regular intervals. It is theoretically possible that, while performing their work related duties, an IT systems administrator may come across user information (such as a file stored on the system). The purpose of the login banner is to inform any user of the system that they may be monitored and that unauthorized or malicious access may be prosecuted. Administrators should use login banners on any system that supports their use.

Sample Login Banner

As a login banner is a form of legal assertion, please consult your General Counsel and Information Services before using the following login banner for use on any systems:

Access to electronic resources at [Organization] is restricted to employees, students, or individuals authorized by the [Organization] or its affiliates. Use of this system is subject to all policies and procedures set forth by the [Organization] located at

Unauthorized use is prohibited and may result in administrative or legal action. [Organization] may monitor the use of this system for purposes related to security management, system operations, and intellectual property compliance.

Command to issues warning banner on Mac OS X

sudo defaults write /Library/Preferences/ LoginwindowText "Your Warning Message Here"

You will be prompted for your password. Once that is complete you can log out to see the warning banner (requires you to disable automatic login).

Friday, August 7, 2009

Recent cyberattacks on Twitter and other popular Web services disrupted the lives of millions

The recent cyberattacks on Twitter and other popular Web services disrupted the lives of millions of Internet users

Preliminary indications have the attacks originating in Russia and Georgia (Former Soviet Union Territory).

"Security experts say that it is nearly impossible to determine who exactly is behind the attack, which disrupted access to Twitter, Facebook, LiveJournal and some Google sites on Thursday and continued to affect many Twitter users into Friday evening."

Twitter still fighting off DoS attack

According to researchers at Twitter the social networking micro-blogging is still struggling to recover from the DoS attack. User have not been able to post comments via SMS, the web or client based-applications. It is apperent that the company continues to fight off the attack.

Below is part of message that was posted on their blog:

"Due to defensive measures we've taken against the ongoing denial-of-service attack, some Twitter clients are unable to communicate with our API, and many users are unable to tweet via SMS."

"We are working as quickly as possible to restore our full service."

There is no word on when service will resume...


DoS Cyber Attack Takes Twitter Offline

Attacks on the social networking site Twitter Thursday morning left many users unable to access and update their status.

Twitter was back up by mid-day and it was reported that the attacks had originated either from Russia or the former Soviet republic Georgia.

Twitter confirmed the outage was linked to malicious attackers in a brief status message posted around 11:00 a.m EST.

We are defending against a denial-of-service attack, and will update status again shortly.

Update: the site is back up, but we are continuing to defend and recover from this attack.

Facebook experienced problems for part of the day, but it was unknown if they were the result of this attack.



Thursday, August 6, 2009

Latest Bank of America Scam

Below is the latest scam that is going around, I received this from a lady who wanted to know if it was real or not. I did some research and of course it was not. If you google the following (Joan Own, David Dupont or , you will find more information on this scam.

My recommendation is to delete it and do not respond to this email.

Sent: Tue, Aug 4, 2009 7:41 am

Bank of America Corporate Center
Senior Personal Banker - Head Office
Bank Of America Corp Ctr 100 North Tryon Street
Charlotte, NC 28255-0001
This is to Officially inform you that it has come to our notice and we have thoroughly completed an Investigation with the help of our Intelligence Monitoring Network System that you legally won the sum of $800,000.00 USD from our online balloting system in the Banks Head Quarter in United States of America. This funds have been investigated and we have discovered that your e-mail won the money from our Online Balloting System and we have been authorized to contact you and pay to you, your winnings via a Certified Cashier's Check.
Normally, it will take up to 2 business days for an Bank of America Check to be cleared, cashed and remmited into your account by another local bank. We have successfully notified the banks on your behalf that funds are to be drawn from our registered bank, the Bank Of America so as to enable you cash the check instantly without any delay, henceforth the stated amount of $800,000.00 USD has been deposited with our bank, Bank Of America in COVINA, CALIFORNIA. where your check is deposited in a new online account. This is the Online Number: 626-453-8400 to verify the deposited Check.
We have completed this investigation and you are hereby approved to receive the certified cashier's check into your personal account as we have verified the entire transaction to be Safe and 100% risk free, due to the fact that the funds is with Bank Of America you will be required to settle the following bills directly to the Bank of America Agent in-charge of this transaction whom is located here in United States of America. According to the directives, you are required to pay for the following -
(1) Deposit Fee's (Fee's paid to setup a new account for the beneficiary by the Bank Of America)
(2) Courier Delivery Fee (Fee paid to deliver the check through UPS deleivery to your designated address)
(3) Insurance (This is the fee paid by bank to insure the check before been deposited at the bank)
The total amount for everything is $450.00 (Four Hundred and Fifty-US Dollars). We have tried our possible best to indicate that this $450.00 should be deducted from your funds but we found out that the funds have already been deposited at Bank Of America and cannot be accessed by anyone apart from you the beneficiary, therefore you will be required to pay the required fee's to the Agent in-charge of this transaction via Western Union Money Transfer Or Money Gram.
In order to proceed with this transaction, you will be required to contact the agent in-charge (Mr. David Dupont) via e-mail. Kindly look below to find appropriate contact information:
BANK OF AMERICA, 1375 N Citrus Ave, Covina, CA 91722.
You will be required to e-mail him with the following information:
You will also be required to request Western Union details on how to send the required $450.00 in order to immediately Deliver your funds $800,000.00 USD via Certified Cashier's Check drawn from Bank Of America, also include the following transaction code in order for him to immediately identify this transaction : EA2948-910.
After making the payment to the Agent in-charge, an Account Information, with Account Name and Access Code will be given to you, to access your funds where it is deposited in an online account with the bank of america. This is the Online Account Number: 626-453-8400 and the Agent incharge will issue you the CODES.
This letter will serve as proof that the BANK OF AMERICA is authorizing you to pay the required $450.00 ONLY to Mr. David Dupont via information in which he shall send to you, if you do not receive your funds of $800,000.00 we shall be held responsible for the loss and this shall invite a penalty of $10,000 which will be made PAYABLE ONLY to you (The Beneficiary).Failure to contact Mr. David Dupont and complete the delivery of your check to you, the check will be deposited with the bank reserve.
Best Regards
Senior Personnel Banker - Head Office
Note: The $450 can not be deducted from your fund of $800,000 becuase the cashiers's check have been insured and also all fees must be paid before the check will be delivered your designated address.

Tuesday, August 4, 2009

Hathaway Resigns as U.S. Cyber-security Chief

Acting cyber-security chief Melissa Hathaway will reportedly step down Aug. 21.