Comedian Job Description Sample
ESSENTIAL DUTIES AND RESPONSIBILITIES include the following. Other duties may be assigned.
- Grade comic books
- Select comics for submission to certification services
- Research and estimate values of comic books.
- Use Word, Excel, and proprietary Heritage software to compile listings of the consigned items.
PHYSICAL AND MENTAL DEMANDS: Individual will need to be able to lift boxes full of comics weighing up to 30 pounds. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
WORK ENVIRONMENT: Individual must be able to work in a fast-paced team environment.
The following are attributes that we are seeking in all employees at Heritage:
- Self-motivation, intelligence, and strong work ethic.
- Willingness to learn.
- Ability to follow set standards and take direction.
- Ability to analyze and propose solutions to problems.
- Ability to work in a fast-paced, multi-project, and dynamic environment.
- Absolute drive to complete projects on time and in a detailed manner.
- Excellent organizational skills: accurate and thorough.
- Excellent communication skills: listening, writing, and verbal.
Critical Ethnic Studies - Part-Time Faculty
Critical Ethnic Studies - Part-time Faculty
Full-time Faculty Positions
Full-time faculty positions will be posted on a per-opening basis. Postings are organized by college/school and department. Applicants will be evaluated at the college/school level for the position which they are submitting an application. Unless noted by a close date, positions will remain open until they are filled. Qualified applicants are encouraged to apply.
Part-time Faculty Opportunities
DePaul University invites expressions of interest for a pool of qualified Part Time Faculty to teach courses in a variety of disciplines across all 10 colleges and schools. Individuals may enter expressions of interest by submitting their credentials to any posting for which they are qualified to teach. Postings are organized by college/school and department. Screening of individuals in the pool is ongoing, depending on curricular need and funding. Individuals will be contacted by the department if they reach the finalist stage for teaching a particular course or set of courses. The pool will remain in place until the closing date specified in the posting details; those interested in remaining in the pool beyond that time must resubmit. All individuals in the pool will be notified by email when the posting is closed.
DePaul University is an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, ethnicity, religion, sex, sexual orientation, gender identity, national origin, age, marital status, physical or mental disability, protected veteran status, genetic information or any other legally protected status, in accordance with applicable federal, state and local EEO laws. A copy of DePaul University's Safety and Security Information Report and Fire Safety Report is available upon request. The report includes statistics about crimes that occurred on campus and public property immediately adjacent to campus. The report includes institutional policies concerning campus security, sexual assault and other matters. It also includes fire statistics, fire safety practices and standards of the institution. A copy of this report can be obtained by contacting the Crime Prevention Office at 773-325-7775 or by visiting the DePaul Public Safety website at http://publicsafety.depaul.edu.
Below you will find the details for the posting including any supplementary documentation and questions you should review before applying for the opening or submitting your interest in teaching. To apply for the position, please click the Apply for this Job link/button.
If you would like to bookmark this posting for later review, click on the Bookmark link. If you would like to print a copy of this posting for your records, click on the Print Preview link.
Bookmark this Posting | Print Preview | Apply for this Job/Submit Expression of Interest
Please see Special Instructions for more details. This positing applies to the following sub-disciplinary specialties:•International studies•Migration studies•Refugee studies
We are looking to hire an instructor for Spring 2019 (March 30-June 14, 2019) to teachCES 404 Border and Migration, (cross-list INT 404 Migration and Forced Migration), Monday, 6:00-9:15pm, Lincoln Park CampusCES 404 course description
This course examines the integral role that different processes of mobility play in shaping today's world: emigration, immigration, displacement, refugee and internally displaced persons flows. Students study the causes and effects of population movements including push-pull factors, demographic, economic, and political variables. Students also look at the role of state and non-state actors and organizations. Cross-listed with INT 404 "Migration and Forced Migration."INT 404 course description
This course examines the integral role that different processes of mobility play in shaping today's world: emigration, immigration, displacement, refugee and internally displaced persons flows. Students study the causes and effects of population movements including push-pull factors, demographic, economic, and political variables. Students also look at the role of state and non-state actors and organizations.
Rank Adjunct (Non-tenure Track)
Position / Posting Information
This pool will close on the date specified in the Close Date field. You will be notified of the closing by email. If you would like to remain in the pool after that time, you will need to resubmit to the new pool posting at: https://facultyopportunities.depaul.edu/
College/School College of Liberal Arts and Social Sciences Responsibilities
The Critical Ethnic Studies Master's Program within the College of Liberal Ars and Social Sciences at DePaul University invites expressions of interest in part-time faculty teaching opportunities. Part-time teaching opportunities are available throughout the academic year. Applicants with expertise that matches course scheduling needs will be contacted for an interview. Academic course schedules fluctuate from quarter to quarter and the program will work with selected individuals to determine a quarterly schedule. Courses are not guaranteed; however the program does its best to give ample notice about available courses and potential course cancellations.
PhD in a related field of ethnic studies
Minimum of 1-2 years full-time teaching (not as a graduate student) on the university level
Schedule must be flexible to accommodate quarterly course schedules (typically M, T, W, or Th 6-9:15pm, once a week).
Preferred Qualifications Posting Number Part-time Faculty 420Posting Special Instructions to Applicants
This positing applies to the following sub-disciplinary specialties:
We are looking to hire an instructor for Spring 2019 (March 30-June 14, 2019) to teach
CES 404 Border and Migration, (cross-list INT 404 Migration and Forced Migration), Monday, 6:00-9:15pm, Lincoln Park Campus
CES 404 course description
This course examines the integral role that different processes of mobility play in shaping today's world: emigration, immigration, displacement, refugee and internally displaced persons flows. Students study the causes and effects of population movements including push-pull factors, demographic, economic, and political variables. Students also look at the role of state and non-state actors and organizations. Cross-listed with INT 404 "Migration and Forced Migration."
INT 404 course description
This course examines the integral role that different processes of mobility play in shaping today's world: emigration, immigration, displacement, refugee and internally displaced persons flows. Students study the causes and effects of population movements including push-pull factors, demographic, economic, and political variables. Students also look at the role of state and non-state actors and organizations.
Writing Sample 1
- Publication 1
Required fields are indicated with an asterisk (*).
Do you have a PhD in a related field of ethnic studies?
Do you have a minimum of 1-2 years full-time teaching experience (not as a graduate student) on the university level?
Schedule must be flexible to accommodate quarterly course schedules (typically M, T, W, or Th 6-9:15pm, once a week)
Please indicate the number of years of teaching experience you have in the field of ethnic studies.
(Open Ended Question)
- Please describe your research in relation to your teaching.
(Open Ended Question)
- Please describe your 1-2 years of prior teaching experience at the university level.
(Open Ended Question)
Cybersecurity Threat Intelligence Advisor (Sro)
Job ID R77194 Date posted Nov. 06, 2018
Cybersecurity Threat Intelligence Advisor (SRO)
Round Rock, TX or Hopkinton, MA or Remote
The Dell Security & Resiliency organization manages the security risk across all aspects of Dell's business. We are currently experiencing incredible growth in order to meet the security needs of the world's largest technology company. With team members located in over 15 countries, you will have an excellent opportunity to influence the security culture at Dell and further develop your career.
Dell is a worldwide provider of information technology services and business solutions to a broad range of clients. We seek men and women who share our values, thrive in a team environment, and recognize the importance of accountability; people who strive to exceed expectations to ensure our Clients' success.
We are currently seeking a Cybersecurity Threat Intelligence Advisor to join our Security & Resiliency team, based in Round Rock, TX or Hopkinton, MA or Remote. Threat Intelligence Curation is the research, collection, processing, classification, annotation, enrichment, pivoting and attribution of threat intelligence data. This data includes indicators of compromise (IoCs); Tools, Tactics and Procedures (TTP); Threat Actor dossiers and campaign information related to threat actors. The curation function includes the use and management of a centralized management system for threat intelligence data.
Collection, Classification, Storage and Maintenance of IoC, TTP, and threat actor profile data
Validate, verify and increase the confidence of threat intelligence data
Develop and execute processes for threat intelligence data enrichment and pivoting
Research, re-classify and re-categorize threat intelligence data as applicable
Maintain and refine existing sources and develop new sources of threat intelligence data
Evaluate sources of threat intelligence data both internal and external to the organization
Manage threat intelligence validity, integrity or classification escalations
Manage threat intelligence data source relationships and data ingestion mechanisms
Collaborate with and establish threat intelligence data sharing mechanisms with peers, partners and appropriate external parties
Research and develop new threat intelligence data types
Develop presentations, reports and metrics related to threat intelligence data in the enterprise
Issuing Critical Advisories
Developing Threat Actor campaign reports
Tracking trends related to targeted threat actor activity
Monitoring likely or active threats related to company sponsored events as needed
Supporting event security efforts
Developing executive briefings for threats and threat actors
Conducting OSINT research on internal and external threats and pertinent investigation entities and performing related briefings and reports
Bachelor's Degree or Master's Degree in Computer Science, Information Science, or Information Systems Management and/or 4+ years of relevant experience
Excellent analytical skills
Excellent familiarity with attacker methodology
Creative and critical thinking
Familiar with application function concepts
Familiar with Internet and networking foundational technologies
DNS, WHOIS, Web, Mail, Remote connection protocols
Familiar with network configurations and security control deployments
Routers, Switches, Firewalls, Proxies, IDS, DNS, etc.
Excellent familiarity with popular IoC data types
Familiarity with popular enterprise class operating systems
Understanding of the enterprise "threatscape" at all major threat actor capability levels
Familiarity with critical flaw trends in widely deployed enterprise environments
Knowledge of one or more scripting languages (e.g. python, perl, bash)
Experience with database structures and query languages
Familiarity with major and widely deployed enterprise application technologies
e.g. Apache, Java, JBoss, ColdFusion, BIND, MS-SQL, etc.
Knowledge of Yara and similar signature based languages
Head Of Incident Response And Forensics
Armor is seeking a talented and highly-motivated individual to serve as our Head of Incident Response and Forensics. Reporting to the Chief Security Officer, the primary responsibilities in this role will be to manage the day to day operations of Armor's SOC, the industry-leading reactive security forces consisting of real-time 24X7 monitoring, as well as Incident Response and Forensic Services. A significant portion of this role will include managing relationships and advising customers as they face security incidents. Acting as a leader within Armor's security organization, a successful candidate will aid in developing security strategy and executing the operational program protecting Armor and it's customers.
Head of Incident Response and Forensics Essential Duties and
(Additional duties may be assigned as required)
Actively mentor key Armor personnel and teams to increase their knowledge of traffic analysis, incident response and forensic investigations.
Have a view outside of Armor, keeping up with and understanding the changing nature of threat actors and how to effectively mitigate their activities.
Influence Armor's security strategies as part of company offerings and internal business requirements.
Drive the strategy of Armor's Incident Response and Forensics services.
Aid, guide, and advise security strategies within Armor Products and Services.
Participate, author and conduct blogs, webinars, and act as a public Subject Matter Expert in regards to security services.
Act as a key liaison between Armor and external Law Enforcement agencies.
Work closely with other leaders across Armor's security and compliance programs.
Operationally manage day to day reactive security operations and event monitoring provided through Armor Products and Services.
Exceptional leadership and communication skills.
Ability to demonstrate providing consultative services around threat mitigation and incident response activities.
Ability to interact with customer C-Level executives, external agencies and technical personnel regarding and throughout incident response activities.
Ability to detail unique threat mitigation and corrective action recommendations encompassing of People, Process and Technologies.
Ability to lead/conduct public speaking events and engagements.
Ability to demonstrate a strong understanding of network/system/application designs and cloud/virtualized environments.
Ability to demonstrate creative solutioning within network/system/application design controls to achieve an effective security state.
Ability to demonstrate working knowledge of common public cloud providers and the associated security capabilities.
Ability to build and maintain relationships with customers within all layers of an organization.
Highest ethical standards when handling private and confidential data.
Able to work independently and efficiently to meet deadlines.
Self-motivated and detail-oriented.
Ability to clearly articulate the differences between security controls and compliance.
Highly skilled in Incident Response and Forensics.
Able to multi-task, prioritize, and resolve multiple inquiries at once.
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required:
Prior history in public speaking events and engagements.
Prior history working in an Information Technology capacity outside of an audit function.
More than 10 years of prior history in providing consultative services around Incident Response and Forensics.
More than 10 years of prior history running Incident Response and Forensics programs.
Expert knowledge of and ability to implement technical aspects to mitigate threat actors activities.
Education And/Or Experience:
15+ years of job-related experience.
7-10 years of management or lead experience.
Bachelor's or Master's Degree in Computer Science or related field (preferred)
Security and Technical Certifications: CISSP, CISM preferred, C|CISO a plus
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. The noise level in the work environment is usually low to moderate. The work environment may be in either an office setting, at the company's data center, or at a third-party location for training.
Equal Opportunity Employer
It is the policy of the company to comply with all employment laws and to afford equal employment opportunity to individuals in all aspects of employment, including in selection for job opportunities, without regard to race, color, religion, sex, national origin, age, disability, genetic information, veteran status, or any other consideration protected by federal, state or local laws.
Cyber Threat Intelligence Senior Analyst
JOINUS AS A CYBER THREAT INTELLIGENCE, STRATEGIC ANALYST, CTI - CYBERSECURITY
TheCyber Threat Intelligence Senior Analyst role supports Target's cyber threatintelligence collection, analysis, and dissemination of finished product to Target'spopulation of security operations teams, information technology teams,enterprise risk management teams, and overall executive decision makers. The Senior Analyst also coordinates with external peer groups and informationsecurity circles over cyber threats, and on the development of global cyberpolicy to address events ranging from intrusions, malware, DDoS, unauthorizedaccess, insider attacks, and loss of proprietary information.
Useyour skills, experience and talents to be a part of groundbreaking thinking andvisionary goals. As a Cyber Threat Intel Senior Analyst, you'll take thelead as you:
Serve as an all source cyber threat intelligence analyst
Develop and hold regional expertise on cyber network operations, emerging cyber threats and trends, and the evolving policy and regulatory framework related to cyber security
Investigate threat information, fuse with other relevant information, and analyze data for patterns and actionable information
Collect, analyze, catalog, and assist in the deployment of indicators of compromise (IOCs) in partnership with the Cybersecurity Incident Response Team (CSIRT) to understand incidents and help refine detection and response efforts
Develop and maintain expertise in a wide variety of technology platforms, threat vectors, and threat actors in order to track cyber campaigns using internal and external data
Perform analytic support focused on cyber doctrine, policies, strategies, capabilities, and intent to conduct cyberspace operations and cyber-oriented groups, individuals, organizations, tools, tactics, and procedures
Assist with drafting, editing, critiquing, and proofreading threat intelligence assessments and briefs
Work closely with functional senior leaders to ensure threat intelligence analysis and products are mapped to prioritized corporate assets and risks
BA or BS degree inInternational Relations, Security Studies, Intelligence Studies, PoliticalScience, Cyber Security or related field
Possession of excellentoral and written communication skills
2-4 years of experiencewith all-source cyber intelligence analysis
Experience withcollecting, analyzing, and interpreting qualitative and quantitative data frommultiple sources
Experience with cyberintelligence, computer network operations, information operations, informationwarfare, or cyber topics
Knowledge of currenthacking techniques, vulnerability disclosures, data breach incidents, andsecurity analysis techniques
Familiarity with link-analysismethods and software (Maltego, Palantir, Analyst Notebook)
Ability to communicateintelligence and analysis of cyber threats in various forms (writtenproduction; briefings) for a senior-level audience
Ability to developspecific expertise, discern patterns of complex threat actor behavior, andcommunicate an understanding of current and developing cyber threats
Considerable workingknowledge in one or more of the following topics: Cybercriminals, Point-of-Salemalware, Financially motivated cyber groups, Hacktivism, DDoS attack methods,Malware variants, Mobile and Emerging Threats, Social Engineering, InsiderThreats
Can apply a variety ofcyber-related analytic techniques to identify, track and support analysis ofcyber threat actors and events. Examples of these techniques include, but arenot limited to: Use of the Diamond Model, Kill Chain Methodology, MITREATT&CK Framework
Ability to leverage well-honed online researching expertise to identify and navigate relevant online forums, including Web sites, social media, and traditional sources to support research and analysis
Experience with targeting or analysis
Network+, Security+, or CEHCertification
Project Manager - Comics
Cenveo, a world leader in the management and distribution of print and related offerings is seeking an experienced Project Manager to work in its Richmond, VA manufacturing facility.
The ideal candidate will have advanced knowledge of the entire publication and electronic media processes and several years' related experience, along with superior organizational, analytical, leadership, communication, customer service and problem-solving skills.
Cenveo offers a competitive salary and a comprehensive benefits package including, but not limited to medical, dental, vision, life insurance, short & long term disability, 401k, PTO and Company paid holidays.
The Key Accounts
Comics is responsible for ensuring overall project management, sourcing, quality, and leadership for all comics in support of all "Comic Focus Factory" customers. This position will report direct to the General Manager of the Richmond facility.
Primary Duties and Responsibilities (*Essential Functions)
These are functions a qualified incumbent or applicant must be able to perform with or without reasonable accommodation.
Manages the efficient flow of comic work through customer service, planning, production, shipping
Communicates broadly and effectively to customers, scheduling and plant.
Leads complex customer issues.
Assists resourcing of paper and other project material requirements as needed.
Proactively looks for bottlenecks or process issues and determines corrective actions to keep projects on time and produced to customer expectations.
Manages Comic hot list and has direct knowledge of the current status of every hot list job.
Assists with managing account manager workloads as required.
Assists in resolving problems with customers by offering advice, coaching, guidance, direction and expertise.
Monitors the financial performance of accounts.
Identifies comic-specific requirements including delivery and quality issues.
Investigates certain quality issues and drafts quality responses for review prior to customer delivery.
Manages and hosts Comic Focus Factory customer visits to the plant.
Manages outside vendors to ensure adherence to job specifications, pricing, schedules and quality expectations.
Serves as secondary back-up to Account Managers.
Other (Non-Essential) Functions
Includes functions which are normally performed by persons holding this title. However, these functions may be reassigned to other employees as part of a "Reasonable Accommodation" under the ADA.
Other duties as assigned.
Cenveo is an EEO Employer
Minimum Education / training: equivalent to an Associate's Degree and 5+ years' experience as an Account Manager, or an equivalent combination of education, training and experience. Preferred: Bachelor's Degree with concentration in Printing or Print Production Technology and 4+ years' experience in a fast-paced and deadline-oriented publication production environment.
Advanced knowledge of the entire publication and electronic media processes.
Advanced technical knowledge of electronic prepress / digital imaging.
Superior customer service skills.
Superior verbal and written communication, interpersonal, problem-solving and analytical skills.
Excellent organizational skills and extremely detail-oriented.
Strong systems skills (estimating, billing, imposition, Docket, Insight, Microsoft, scheduling, PO).
Solid experience delivering quality customer service.
Great leadership skills.
Ability to use independent judgement and work well within a team environment; excellent team working skills are a must.
Self-motivated with exceptional time management skills.
Collaborative and steady disposition.
Ability to multi-task, manage deadlines, be flexible and proactive.
Ability to work in a fast-paced environment and handle multiple high profile projects at once.
Required to work off hours, including nights and weekends as required.
Supervisory experience desired.
Physical Requirements & Environmental Conditions
- While performing the duties of this job, the employee is regularly required to talk and hear. The employee is frequently required to stand; walk; use hands and fingers to handle and feel; and reach with hands and arms.
Cloud Security Consultant
Job Title: Cloud security Consultants
Pen Testing: 10%
Infrastructure & Application Vulnerability Remediation Coordination: 30%
- Excellent command of Cybersecurity organization practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies
- Should have experience in developing use cases to improve the incident response capabilities
- Assist in incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts
- Conduct simulated attacks on firm resources, including but not limited to phishing, web application compromise, social engineering, and penetration testing
- Track threat actors and associated tactics, techniques, and procedures (TTPs) by capturing intelligence on threat actor TTPs and developing countermeasures in response to threat actors
- Host-based and network based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (e.g., signatures, rules etc.); and cyber threat intelligence.
- Maintain and drive the development of new reports of Cyber Threat Intelligence analysis to peers, management and customer teams for purposes of situational awareness and making threat intelligence actionable
- Should have knowledge and experience in handling infrastructure and application vulnerability management (SAST & DAST)
- Provide regular threat/risk briefings to senior management regarding issues raised by the red team. Present findings within a context of overall risk to the firm
- Should be able to handle multiple product and support vendors
- Should have excellent communication and documentation skills
- Should be able to work in an individual capacity with minimal supervision
- Proficient in one more of the following computer languages Python,Perl or Powershell in order to support cyber threat detection or reporting
- Certifications such as GCIH, GPEN, CEH, ECSA, CISSP are an addition
Technical Advisory Services For Increasing Local Content In The Tourism And Hospitality Supply Chain
Compete Caribbean Partnership Facility
- Technical Advisory Services for Increasing Local content in the Tourism and Hospitality Supply Chain
Background of this search:
The objective of this consultancy, which is being coordinated by the Compete Caribbean Partnership Facility (CCPF), is to support the government of Suriname in increasing local content in the tourism and hospitality sector particularly for vegetables, fruits, fish, shrimp, poultry, and local specialty foods. The specific objective is to conduct a study on local content in the tourism and hospitality sectors; develop a gender responsive Action Plan for Increasing Local Content in the Tourism and Hospitality Supply Chain; and design a Tourism and Hospitality Sector Local Content Pilot Project, as part of the technical cooperation project "Supporting Increased Local Content and Expansion of Priority Sectors – Business and Innovation Climate Reforms in Suriname"..
The team's mission:
The purpose of CCPF is to support the region in driving competitiveness and sustainable economic growth. The program focuses on: (i) supporting firms to grow, innovate and enter new sectors and markets; and (ii) promoting an environment that enables innovation and growth. More specifically, the CCPF's objectives are to:
Increase productivity in firms
Increase employment, particularly for women and vulnerable groups
Generate and sustain exports within and outside the region
Foster sustainable and inclusive economic growth
What you'll do:
The consultant will carry out the following key activities that will facilitate the achievement of the objective:
Liaise with CCPF and the Government of Suriname, through the Competitiveness Unit Suriname (CUS) and other local stakeholders to develop a more in-depth understanding of the assignment.
Review background documents and liaise with tourism and hospitality, trade and industry, and agriculture sector stakeholders to: (i) understand the current state of development of Suriname's tourism and agricultural sectors as well as recent, ongoing or planned sector development initiatives; (ii) identify data sources related to, among other things, supply and demand, product specifications, logistics infrastructure and quality management systems; and (iii) identify possible sources and requirements for accessing funding to implement the proposed pilot project.
Prepare a detailed Work Plan including a data collection plan and data collection instruments.
Collect and analyze data and prepare a draft report
- Priority Actions for Increasing Local Content in the Tourism and Hospitality Sector. The report should: (i) provide data on, among other things, supply and demand, product specifications, logistics infrastructure, and the quality management framework; (ii) recommend a list of products (a specific "basket of goods") that represent the best match between supply and demand; and (iii) present an Action Plan for Increasing Local Content in the Tourism and Hospitality Supply Chain, including recommendations to improve supply capacity of women-owned micro, small and medium sized enterprises, the logistics infrastructure, and the quality management framework.
- Design and facilitate a stakeholder workshop to:
- validate the data collected, discuss and provide feedback on recommendations; and
- reach consensus on
- a list of committed and ready supply chain actors who may be the primary participants in a pilot local content project, and
- the composition of a team which will collaborate with the consultant to design the pilot project.
Workshop participants should include producers and distributors of items within the aforementioned "basket of goods"; hotel and restaurant owners/managers; tourism and hospitality sector associations, Ministry of Trade, Industry and Tourism, the Ministry of Agriculture, and development agencies with a programming interest in strengthening value chains and increasing local content in the tourism and hospitality sector.Revise the draft report based on feedback from the stakeholder workshop, CUS and CCPF.
Revise the draft report based on feedback from the stakeholder workshop, CUS and CCPF.
Working closely with the Tourism and Hospitality Sector Local Content Project Team, prepare a draft project proposal for the pilot project, complete with a detailed budget, terms of reference, and possible sources of funding.
Circulate the draft project proposal among, and obtain feedback from, key stakeholders.
Finalize the project proposal based on feedback from the stakeholders, CUS, and CCPF.
The consultant will be responsible for the delivery of the following products:
A detailed Work Plan within 2 weeks of contract signing.
Draft report "Priority Actions for Increasing Local Content in the Tourism and Hospitality Sector" within 6 weeks of acceptance of the Work Plan.
Design and facilitation of a stakeholder workshop within 2 weeks of the acceptance of the draft report "Priority Actions for Increasing Local Content in the Tourism and Hospitality Sector".
Final report "Priority Actions for Increasing Local Content in the Tourism and Hospitality Sector" within 1 week of completion of the stakeholder workshop at item 3.3 and receipt of comments from CUS and CCPF.
Draft pilot project proposal, within 3 weeks of completion of the stakeholder workshop at item 3.
Design and facilitation of a stakeholder workshop within 2 weeks of the acceptance of the draft project proposal.
Final pilot project proposal within 3 days of completion of the stakeholder workshop at item 6 and receipt of comments from CUS and CCPF.
Payment terms will be based on project milestones or deliverables. The Bank does not expect to make advance payments under consulting contracts unless a significant amount of travel is required.
Submission and approval of Work Plan, 2 weeks after contract signing
Draft report – "Priority Actions for Increasing Local Content in the Tourism and Hospitality Sector"
Final report – "Priority Actions for Increasing Local Content in the Tourism and Hospitality Sector"
Final pilot project proposal
What you'll need:
Citizenship: Candidates must be individuals from any IDB member country or non-IDB member countries recognized by the Donors of the Compete Caribbean Partnership Facility as eligible.
Consanguinity: You have no family members (up to fourth degree of consanguinity and second degree of affinity, including spouse) working at the IDB Group.
Education: Master's degree in the field of Agriculture/Agribusiness; Business Administration; Tourism; Hospitality; Supply Chain Management or a related field as required.
Experience: A minimum of 10 years of professional experience, at a senior level, in purchasing and supply chain management. Hands-on experience in strengthening supply chains in the Caribbean tourism sector or in a developing country setting will be highly valued.
Languages: Fluency in English, written and spoken, is required. Fluency in Dutch or Sranan/Surinamese Dutch, written and spoken, will be highly valued.
Core and Technical Competencies:
Results-focused project design
Strong interpersonal skills and demonstrated ability to engage with and stimulate coordination between multiple stakeholders from wide-ranging sectors.
A sound understanding of production practices, quality management systems, standards, and logistics infrastructure relevant to the production and trade of vegetables, fruits, fish, shrimp, poultry, local specialty foods, etc. in Suriname or similar setting.
A strong understanding of (a) the opportunities for and constraints to increasing supply linkages between the tourism and hospitality sector and the agriculture/agri- business and manufacturing sectors in a developing country setting; and (b) challenges faced by, and the capacity building needs of, men and women-owned MSMEs in the tourism and hospitality sector supply chains.
Type of contract and modality: Individual, Product and External Services Consultant (PEC), Lump Sum
Length of contract: Five (5) months.
Location: External consultancy that may require a presence on the ground in Suriname for approximately 40% of the estimated effort.
Responsible person: Private Sector Development Specialist, Private Sector Development Specialist, of the Competitiveness, Technology and Innovation Division (IFD/CTI).
Our culture: Our people are committed and passionate about improving lives in Latin-America and the Caribbean, and they get to do what they love in a diverse, collaborative and stimulating work environment. We are the first Latin American and Caribbean development institution to be awarded the EDGE certification, recognizing our strong commitment to gender equality. As an employee you can be part of internal resource groups that connect our diverse community around common interests.
We encourage women, afro-descendants, people of indigenous origins, and persons with disabilities to apply.
About us: At the IDB, we're committed to improving lives. Since 1959, we've been a leading source of long-term financing for economic, social, and institutional development in Latin America and the Caribbean. We do more than lending though. We partner with our 48-member countries to provide Latin America and the Caribbean with cutting-edge research about relevant development issues, policy advice to inform their decisions, and technical assistance to improve on the planning and execution of projects. For this, we need people who not only have the right skills, but also are passionate about improving lives.
Our team in Human Resources carefully reviews all applications.
The direct contribution of Travel & Tourism to GDP in Suriname is estimated by the World Travel & Tourism Council (WTTC, 2012), at around 1.8%. Including its 'wider impacts' (i.e. the indirect and induced impacts) on the economy, the estimated total contribution of Travel & Tourism to GDP rises to 4.5%. World Tourism Organization estimates that international tourism receipts were around USD 69 million in 2011, which represents 1.6% of GDP and 7.5% of foreign exchange earnings from the export of goods and services and 40% of export of services.
Currently, approximately 90 percent of the products used in the kitchen of lead firms in the Tourism and Hospitality sector is imported. Lead firms acknowledge that there is strong taste preference for fresh local poultry; and there is significant room for and keen interest in increasing the use of locally produced supplies, particularly for vegetable, fruit, fish and shrimp. There is a strong foreign investment interest in agriculture in Suriname and, therefore, prime opportunity for local production to increase value capture in this sector. One lead firm purchases US$500,000 in products for its kitchen monthly, of which only 10% is local produce comprising vegetables, fruit, fish, shrimp, chicken, duck and pork. There is, therefore, prime opportunity for local production to increase value capture in this sector.
Lessons learned from similar projects, financed by the IDB in other countries, suggest that the prerequisites for strengthening Tourism and Hospitality Local Supply Chains include (i) strong buy-in from the local hotels and restaurants; (ii) trust and willingness to cooperate between buyers and suppliers; and (iii) adequate investment in strengthening the various actors and key infrastructure along the supply chain and this includes an entity that can effectively serve as an intermediary between the large hotels and restaurants and the large number of micro and small suppliers.
The proposed consultancy will be funded by the CCPF with the aim of creating a more enabling business environment for increasing local content in the Tourism and Hospitality Sector.
On March 20, 2016, the Board of the Inter-American Development Bank approved the creation of the Compete Caribbean Partnership Facility as a multi-donor Trust Fund. The ultimate goal of the Compete Caribbean Partnership Facility is to support the Caribbean region in increasing productivity and Caribbean firms' contribution to economic growth. The specific objectives are to (i) support firms to grow, innovate and enter new sectors and markets; and (ii) to promote an environment that enables innovation and growth. The Facility will support productivity and economic growth in the Caribbean by focusing on two thematic pillars: (i) productivity and innovation in firms; and (ii) enhancing the business and innovation climate. The Facility is being executed by Inter-American Development Bank and henceforth all procedures related to operations and implementation thereof must comply with IDB policies.
Phase 1 of Compete Caribbean (2010-17) supported the creation of 12,000 jobs (80% for women and youth); increased revenue generation by participating firms and clusters (USD$153m or a 41% increase); increased exports by participating firms and clusters (USD$37m or a 23% increase); introduced environmental technologies or the adoption of climate change-related innovations through nine private sector projects; and improved the business environment in several Caribbean countries (e.g., Jamaica's World Bank Doing Business rank for Getting Credit improved to 12 from 189 in the year 2015, from a year earlier). Phase 2 (2017-2020), is jointly funded by the Inter-American Development Bank, the United Kingdom's Department for International Development (DFID), the Caribbean Development Bank (CDB), and the Government of Canada. The specific objectives are to (i) support firms to grow, innovate and enter new sectors and markets; and (ii) to promote an environment that enables innovation and growth.
Stakeholder meetings with Managing Director of the Marriot Hotel and the Vereniging Surinaams Bedrijfsleven/Association of Suriname Businesses.
This is confirmed by the Permanent Secretary of the Ministry of Trade, Industry and Tourism. There are currently a few investors interest in doing so. But according to the Managing Director of the Marriot, there are serious bureaucratic impediments and the lack of an attractive fiscal regime to incentivize production at that scale.
Stakeholder meeting with MD of Marriot
For example, lessons learned under the project Linking MSEs to Anchor Companies in the Barbados Value Chain (BA-M1012) as shared by members of the project team.
Lessons learned suggest that capacity building is critical in the following areas: (i) procurement and payment processes within buyers; (ii) standardizing, product specifications; (iii) reliably forecasting supply and demand; (iv) consolidation/intermediary services and post-harvest facilities to coordinate supplies from the various small producers and manage quality and delivery reliability; (v) agricultural extension services; ( vi) quality management infrastructure including laboratory testing, farm certification, etc.; (vii) on-farm quality management and traceability systems and farmers skills with respect to GAP; and (viii) cluster development.
Technical Intelligence Intern - Summer 2019
Position Title: Technical Intelligence Intern - Summer 2019
Location: Reston, VA
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 5,600 customers across 67 countries, including more than 40 percent of the Forbes Global 2000.
FireEye iSIGHT Threat Intelligence is a proactive, forward-looking means of qualifying threats poised to disrupt your business based on the intents, tools, and tactics of the attacker. Our high-fidelity, comprehensive intelligence delivers visibility beyond the typical attack lifecycle, adding context and priority to global threats before, during, and after an attack.
Interns in this position will perform malware analysis and related technical analysis tasks in support of iSIGHT Intelligence.
Complete approximately two weeks of hands-on training on FireEye iSIGHT Intelligence, malware analyst work within the Intelligence group, and subject matter.
Track malware, malicious campaigns, or actors through technical analysis of data, malicious codes, exploits, and infrastructure.
Perform reverse engineering and behavioral analysis of malicious codes and related artifacts.
Collaboratively and independently write reports documenting findings that intelligence customers can use to better understand malicious activity and how to defend themselves.
Internship candidates will generally need to demonstrate basic capability to perform malware analysis and related technical analysis functions. The internship will include on-the-job training to provide specific subject matter expertise. So, interns will need to have the capability to learn designated subject matter and roles relatively easily, but are not necessarily expected to already have direct employment history in malware analysis. Internship candidates will be asked to perform a simple evaluation task during the candidate selection process to assess their capability.
Beneficial experience, skills, and knowledge could include the following:
Basic understanding of malware analysis
Understanding of how operating systems work and how malicious actors exploit them.
Understanding of network traffic and fundamental networking/communication protocols such as BGP, DNS, HTTP, TLS/SSL, SMTP, etc.
Awareness of currently-prominent cyber threats, malware, and computer exploitation tactics.
Experience with any of the following concepts and related tool sets:
Process analysis tools
Registry analysis tools
File analysis tools
Memory analysis tool
FireEye is an Equal Opportunity Employer: All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability.
Threat Hunter – Secureworks – Atlanta, GA
Job ID R84795 Date posted Jan. 02, 2019
Secureworks (SCWX-NASDAQ) is a global leader in intelligence-driven information security solutions. We help organizations confidently pursue business goals in a digitally-connected world. Consistently recognized by industry analysts and readers' polls, we are one of the best in the world at understanding and anticipating threat behavior. We see 250 billion events every day across 4400 clients in more than 55 countries, and our solutions work across all the layers of a client's security environment, including 330 different vendor technologies. Join a talented, dedicated, and diverse team of researchers, analysts, engineers, consultants and business professionals who are focused 100% on protecting our clients from cyber threats. We seek out the brightest minds and empower our teams with the tools and support they need to fight the bad guys and maintain our company's leadership in the cyber security industry.
Uniquely positioned to adapt as the industry evolves, we are also proud to be part of the Dell Technologies family. We enjoy competitive compensation and benefits packages, and reward and recognize our employees for exceptional results. A constant focus on continued learning and growth keeps our team members engaged and excited about "what's next." We offer flexible work options when available, and emphasize the importance of work-life balance. We know that when our people are rewarded, recognized, and rejuvenated, we win as a team.
Be part of an exciting team that deals with bleeding-edge information security attacks, malware infections, and incident response situations on a daily basis. Protecting our clients from threat actors attempting to compromise their environments.
Working as a Threat Hunter in an operations center environment with other security and networking professionals, you will extend your currently existing network and endpoint forensic analysis skillset through identification, assessment, review and authoring of incident reports in a variety of client environments. You will actively investigate threat actor activity, malware infections, living off the land attacks, as well as a variety of other security incidents and provide clients with the impact of the threat, your assessment of the incident, as well as recommendations.
Review security-related events and assess their risk and validity based on available telemetry from network, endpoint, and global threat intelligence information in order to provide clients with concise, detailed, and well-written incident reports, root causes identification, and remediation recommendations
Provide customers with understandable context around their security environment and threats
Interface with clients to address their issues, concerns, and questions, and drive to satisfactory closure any issues that impact the service and its value
Work with client and internal SecureWorks incident response teams to resolve ongoing intrusions, malware outbreaks, and other security incidents
Provide mentorship to SecureWorks team members and clients on security strategy, tactics, techniques, and procedures
Develop hunting techniques using the Secureworks platform, iteratively build on existing techniques
Use the Secureworks platform to proactivity hunt for and investigate activity within the client environment
Use experience gained during incident investigations as well as malware and exploit analysis to contribute to the development of indicators of compromise
Knowledge, Skills and Abilities
Significant experience with and expert understanding of:
Two (2) or more of the following operating systems (Windows, Linux, Mac OS) at a filesystem level
Fundamental Internet protocols, services and technologies (e.g. HTTP/HTTPS, DNS, SMTP, SSH, LDAP, TCP/IP, UDP, ICMP, JSON, REST, etc.)
Common security controls (e.g. firewalls, proxies, IDS/IPS, WAF, etc.)
Experience with and strong understanding of:
Threat hunting methodologies
Performing both endpoint and network-based investigations
Reviewing logs to identify evidence of past intrusions
Pivot off indicators within networks to identify the scope and breadth of attacks
Malware and exploit kit functionality
Operating system and application exploits
Lateral movement, living-off-the-land, and persistence establishment mechanisms
Detection of anomalous system activity
Incident response and incident handling processes
Strong technical communication skills, both written and verbal
Attention to detail and great organizational and time management skills
Excellent problem solving skills that would allow for the ability to diagnose and troubleshoot technical issues
Client-focused with a passion for delivering service excellence
Courage and willingness to challenge conventional wisdom
Ability to research and characterize security threats including creating appropriate countermeasures
Ability to write scripts to automate new and existing tasks
6-8 years of relevant experience or equivalent combination of education and work experience:
Completion of a Master's degree or equivalent program in Computer Science, Network Security, Information Security, or other applicable field and 2-4 years of work experience/research in the field
Completion of a Bachelor's degree or equivalent program in Computer Science, Network Security, Information Security or other applicable field and 4-6 years of work experience in the field
- Preferred Certifications: GCIA, GWAPT, GCIH, GCFA/GCFE, GREM, OSCP/OSCE, eLearn THP or similar certification preferred
Experience in one or more of the following:
Vulnerability discovery and assessment
Demonstrated track record of identifying and pursuing strategic and complex areas of security research in collaboration with internal and external stakeholders at all levels, to include defining appropriate policies, practices, and countermeasures
Network-based security tools (e.g. tcpdump, wireshark, etc.)
Malware analysis sandboxes and tools (e.g. Cuckoo, etc.)
Experience with one or more of the following platforms:
Carbon Black, CrowdStrike, Redline, Lastline, RSA ECAT, etc.
Database structures and queries
Secureworks (A Dell Technologies Company) is committed to the principle of equal employment opportunity for all employees and to providing employees with a work environment free of discrimination and harassment. All employment decisions at Secureworks are based on business needs, job requirements and individual qualifications, without regard to race, color, religion or belief, national, social or ethnic origin, sex (including pregnancy), age, physical, mental or sensory disability, HIV status, sexual orientation, gender identity and/or expression, marital, civil union or domestic partnership status, past or present military service, family medical history or genetic information, family or parental status, or any other status protected by the laws or regulations in the locations where we operate. Secureworks will not tolerate discrimination or harassment based on any of these characteristics. Learn more about Diversity and Inclusion at Secureworks here
Making better hires starts with building better job descriptions
- Browse 100s of templates across 40+ industries
- Customize your template with your company info & job requirements
- Post it to 20+ job boards in seconds – for FREE!