CISSP, SENIOR SYSTEMS SECURITY SOLUTIONS ARCHITECT

SENIOR SYSTEMS SECURITY SOLUTIONS ARCHITECT

Enterprising strategic leader with outstanding technical skills in cloud, data, optical, radio, satellite, software, and wireless networks consisting of architecture, development, design, engineering, prototyping, implementation, project management, security, and systems.

  • Successfully lead highly technical, mission critical, enterprise level large scaled projects that exceeded business, technical, and security requirements. [Read more…]

Twitter Revealed that It Had Been;

A Developer Holds Many KeysWe knew that bad news was on the horizon more than two weeks ago. That was when the social networking giant Twitter revealed that it had been the target of a sophisticated hack that spilled account credentials for 250,000 users (including this author). At the time, Twitter warned that the hack “wasn’t an isolated incident” and that “other companies and organizations” had be “similarly attacked.” The only question then was “what other companies?” and “how were they hacked?” [Read more…]

RAILS ARCHITECT Ready to Interview: Ruby on Rails, PHP, MySQL, JQuery/Javascript, HTML/CSS, AJAX, Linux, Apache, Yii framework, C++, XML, JSON, Apache, Git, Svn

Extremely hands-on information technology and operations executive with deep experience in advertising, digital media, healthcare and telecommunications,. Have managed global software development teams, practiced Agile and Test Driven Development, and have leveraged frameworks such as Ruby on Rails to accelerate time to market.

Specialties:

Connecting mobile devices to Web services
Building enterprise Web applications that scale globally [Read more…]

Ruby, Java, C++ to back-end RDBMS Available Mid March

Agile PM / Architect / Presales

Comprehensive development expertise, demonstrated presales and sales engineering accomplishments.

Experienced hands-on developer and analyst with comprehensive web development experience, developing all components of zero-client distributed n-tier database applications, for commercial as well as internal IT systems.  [Read more…]

What Cyber Criminals Are Looking For

Looking back over the past 25 years of threat detection and mitigation, the cyber security industry

has evolved from malicious intentions to ruin files and backups to more organized targeted attacks.

More specifically, some threats are organized by politically motivated groups who issue denial of

service attacks with the intention of shutting down web sites. An example of such an attack was performed [Read more…]

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Namtek or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Namtek shall not be liable for any damages whatsoever arising out of the content or use of this blog.
%d bloggers like this: