Monthly Archives: October 2015

M&T Bank Presentation tomorrow (October 7) in Wheatley Center

Reminder:  Tomorrow, M&T Bank will be here to discuss their company and give an overview of their information technology needs.  Please plan to attend!

M&T Bank
Wednesday, October 7, 2015 (4:30 PM to 5:45 PM)
Wheatley Center Atrium

M&T Bank has been committed to customers and community for more than 150 years. Founded on the principle of providing exceptional financial products and friendly, personalized service, M&T is more than just your neighborhood bank. Representatives from M&T Bank will give a presentation on their company with a focus on information technology needs, including possible job opportunities and internships.

4:30 PM Registration for SET Credit
4:45 PM the speaker will start the presentation

Pizza will be served.

Careers at True North Logistics

True North Logistics is currently searching for IT Specialist Mid-Level Field Service Technicians.  These positions are focused with providing general IT technical services in the effort to support a high profile government client.  Some of the possible duties and responsibilities for this position include:

Providing desk side support to computer HW, SW, and other electronic or mechanical devices including clients, servers, and legacy systems, providing resolution of incidents that could not be resolved remotely and are transferred from the Service Desk to the site for resolution, investigating, resolving, documenting, and reporting the causes and corrective actions in the Incident Management System for all incidents assigned by the Service Desk, complying with escalation procedures and Government directed prioritization to resolve assigned incidents consistent with Service Level Requirements, providing break fix support for contractor furnished and government owned printers, and maintaining and supporting deployable end user devices for use in an expeditionary or field environment.

True North Logistics is offering this position at the following locations: San Diego, Washington DC, Honolulu, Patuxent River, Cherry Point, Oklahoma City, Norfolk, Charleston (SC)

Only a high school diploma or a GED is required to be qualified for this position.  The company also requires 4-6 years of information systems experience in the applicants, as well as experience in SAN/Back-Up/Recovery technologies and operations in a fast paced, Enterprise IT support environment.  In addition, they require  the A+ and OS Certification.  A+ must be possessed prior to on-boarding; OS certification can be obtained within 90 days.  A Secret (or interim) security clearance is required.

Interested applicants should send resume to lucy@military-civilian.com with job title and location in the subject line.

Ford Motor Company – Mainframe Positions

Ford Motor Company is seeking recent graduates who have completed mainframe courses for their special “Mainframe Operations Hiring Program” in Dearborn, MI.

Position Description: This is an entry level technical position where you will complete a two-year mainframe program that includes training, hands on experience and placement into one of the 10 mainframe groups (e.g. Automation, MF Software, CICS, IMS, DB2). You will learn how to support the mainframe (zSeries) infrastructure. Here are the specific job titles:

  • Mainframe Software Engineer: Support IBM Operating Systems (e.g. z/OS, z/VM, z/VSE) and related ISV software. Also provide support for Mainframe performance and Host Communications (e.g. TCPIP, SNA). Both JES2 and JES3 are supported. Support Automation Software and in-house developed tools. Support tools that are used for Source Code Management.
  • Database Engineer: Support CICS, IMS, DB2, WebSphere, Focus and MQ and related ISV software.
  • Security Engineer: Support the RACF environment, assuring that mainframe access is properly controlled. Work with Application groups to develop proper rules to secure their resources.

Skills Required:

  • Strong analytical skills
  • Ability to quickly adapt to new technologies
  • Willingness to learn
  • Self-motivated
  • Strong written and verbal communication skills
  • Ability to work independently and as part of a team
  • Good organization and time-management skills
  • Understanding of MS Office or equivalent software
  • 0-3 years of experience in information technology or related field

Experience Preferred:

  • Information Technology training with or without mainframe courses or experience. Mainframes are at thousands of large companies that need the power, reliability and scalability to process millions of transactions quickly. The mainframe is just a very large computer. Examples of the types of companies that have mainframes are automotive, banks, manufacturing, insurance, mobile computing, etc. not applicable

Education Required:

  • Bachelor of Computer Science, Computer Engineering, Software Engineer or related field (must be completed no later than December 2015)

Ford would like to have all candidates identified by November 1st. The Mainframe Training Program will begin on January 4, 2016 in Dearborn, MI.

Please contact Whitney Willis if interested in this job. Her telephone number is 248-728-5089 and email address is wwillis@TEKsystems.com.

Employers seek CIS majors at Career Expo on October 7

Just a reminder that the 2015 Career Expo will be held on Wednesday, October 7th from 12:00 PM to 4 :00 PM in the Sewall Center Arena.

Over 114 employers already registered!  The following employers want to meet you:

EMPLOYERS SEEKING CIS MAJORS

Allegheny Health Network
ComDoc, a Xerox Company
creehan & company
Duquesne Light Company
Expedient Data Centers
Federated Investors, Inc.
Giant Eagle, Inc.
Highmark Health
INROADS
LANtek Computer Service
Legend Financial Advisors, Inc.
Lutheran SeniorLife
M&T Bank
Mitsubishi Electric Power Products, Inc.
Newton Consulting, LLC
Penn Highlands DuBois
Pittsburgh Mercy Health System
PPG Industries, Inc.
Questeq
Radus Tek Services
Red Valve Co., Inc.
Robert Morris University
rue21
SDLC Partners, L.P.
ServiceLink, A Black Knight Company
Smith Micro Software, Inc.
Solutionary
Steel River Techs
Summa Technologies
SYCOR AMERICAS Inc.
Virtual Officeware Healthcare Solutions

PPG Industries Presentation tomorrow (October 6) in Wheatley Center

Just a reminder — please make room in your schedule to attend!


PPG Industries

Tuesday, October 6, 2015  (3:45 PM to 5:15 PM)
Wheatley Center Atrium

3:45 PM Registration for SET Credit
4:15 PM the speaker will start the presentation

Pizza will be served.


PPG Industries’ vision is to continue to be the world’s leading coatings and specialty materials company. Through leadership in innovation, sustainability and color, PPG helps customers in industrial, transportation, consumer products, and construction markets and aftermarkets to enhance more surfaces in more ways than does any other company. Founded in 1883, PPG has global headquarters in Pittsburgh and operates in nearly 70 countries around the world.

WHY JOIN US?  PPG is a growing global leader with a world of opportunities

• We are defined by our ethics, integrity, and social responsibility

• We develop our employee’s personal strengths

• We fuel their passion to excel

• We fulfill their desire to learn and grow

• We are one company, global businesses, one rewarding career

Apple App Store Suffers First Malware Infiltration

I would like to start today’s post with a question to my fellow iPhone-owning students, faculty and staff. How many apps do you have installed on your device? For comparison’s sake, I’ll limit this example to just iPhones. At the time of this post I counted 47 installed on my own device. Now that you have that number for your own device, stop and ask yourself, how many of these apps do I know were written and published using trusted code sets and verified publishers? Would I have installed these apps if I knew that they were not trusted and potentially malicious?

In order to thwart the publication of malicious apps Apple, Inc. has developed stringent policies and review processes around application development for their OS X and iOS platforms. To complement these processes, developers are required to use a specific software development package called Xcode.

Earlier this week Apple News announced that it had found that an unprecedented number of apps had made it past the review process and were published to the App Store, subsequently downloaded. To put this in perspective, “Prior to this attack, a total of just 5 malicious apps had ever been found in the App Store, according to cyber security firm Palo Alto Networks, Inc.”, says Jim Finkle from Reuters.  To be more precise, 344 apps have been discovered by Chinese security firm Qihoo360 Technology Co. to be potentially affected by this attack.

This begs the question, how could this have happened? How could an organization with such strict requirements on app development inadvertently release apps infected with malicious code? The answer to this question lies with the software that we discussed earlier. Essentially a malicious copy of Xcode was created, also known as XcodeGhost. This framework almost identically mimics Xcode, with the exception that it can be modified to contain malicious code. While this may appear to be a rather simple concept the underlying logic of XcodeGhost is far more complex, a discussion which deserves its own white paper.

The fundamental issue with XcodeGhost is that it could potentially be used by legitimate app developers without their knowledge. Therefore we can assume that legitimate applications that leverage this malicious framework could be susceptible to SQL injection, XSS, or other client-based security flaws that could result in data leakage from a mobile device. Considering the types of apps that are available for banking, location tracking and social media, the problem of data leakage poses a very large and very real problem.

With that in mind, I think back to the 47 apps I have installed on my iPhone and wonder which apps I have installed that could potentially be vulnerable. Should there be a more strict verification process for app development that evaluates even the underlying development software that is being used? While we could leverage peer review methods or even the use of trusted certificates to avoid these situations we may continue to see these types of threats at a high frequency in the very near future. What do you think? Any discussion is welcome in the comments on how an organization might be able to avoid these situations.

Source:
http://www.reuters.com/article/2015/09/20/us-apple-china-malware-idUSKCN0RK0ZB20150920?utm_source=applenews