Job Description :
Job Title: Security Architect/Lead
Location: Long Beach, CA
Duration: 6 Months + Ext possible

Detailed job description   In the role of Security Architect/Lead, you will collaborate, direct and manage information security operations comprising Firewalls, Antivirus, Network Access Control, Data Classification, Data Loss Prevention, Application whitelisting and Vulnerability Management.
Lead distributed technical team with strong relationship building and able to gain trust of diverse stakeholders.
Effectively bridge the communication gap between the technical risks to the overall business risks.
You will be part of a learning culture, where teamwork and collaboration are encouraged. Role and Responsibilities
7-10 years of experience in technologies – BurpSuite, AppScan Standard, OWASP Zap Proxy, Nessus, MetaSploit, NMAP, Application whitelisting (Bit9-Carbon Black) and Vulnerability Management
Dynamic Application Code Scanning Support
PCI Scanning, Penetration testing and 3rd party pen test and remediation support
Should have experience in end to end vulnerability management life cycle
Experience in implementation, support and operations of VA tools like Qualys Guard, Nexpose and Nessus. Should be able to create customized vulnerability reports as per risk rating frameworks adopted by the customer, Experience in using IBM AppScan Source Code Scanner and Dynamic Code Scanner
Experience in false positive analysis, remediation advice and vulnerability tracking through ticketing systems
Network penetration testing skills with hands on experience on tools like Metasploit, wireshark and Kali Linux platform based tooling, various attack techniques like brute force, DDOS and equivalent
Conduct Vulnerability assessment and penetration testing.
Social engineering attack background
Scripting knowledge in Python or power shell etc.
Application security architecture and Design experience
CEH V9 and or CISSP will be an added advantage   Tools Experience: BurpSuite, AppScan Standard, OWASP Zap Proxy, Nessus, MetaSploit, NMAP