Main Nav

The Information Security Office at the University of Texas at Austin is looking for an Information Security Analyst to be part of our Risk Management team. This team performs network vulnerability assessments, application vulnerability assessments, and risk assessments for departments, colleges, schools, and research units on campus. It is primarily a technical position with a dash of policy/compliance/awareness work. Additional information can be found here: https://utdirect.utexas.edu/apps/hr/jobs/nlogon/120808019326 Thank you, Charlie -- Charlie Scott, CISSP, GSEC, GCIH, GWAPT Information Security Office The University of Texas at Austin 512-475-9482 "Securus * Vigilare * Insanus"
AttachmentSize
smime.p7s4.81 KB

Comments

Message from maciej.kozuszek@software.com.pl

Hello Charlie, My name is Maciej Kozuszek. I'm a product manager of eForensics Magazine and PenTest Magazine. I also do have a close relations with Hakin9 Magazine. I've just noticed your posting on SECURITY@LISTSERV.EDUCAUSE.EDU mailing list, regarding recruitment. I was wondering if perhaps University of Texas at Austin wouldn't be interested in posting this information to our magazines. Allover we have about 113 000 IT Security professionals in our databases, and I think that this could be of a value for you. In return we would request nothing more than just promoting our publications to the group of IT Security oriented staff / students in University of Texas at Austin, Please let me know if you'd be interested in the above, Warm regards, Maciej Kozuszek PenTest Magazine Product Manager PenTest Laboratory Product Manager eForensics Magazine Product Manager www.pentestmag.com www.pentestlab.org www.eforensicsmag.com Software Media Sp. z o.o. SK CONFIDENTIALITY NOTICE****************************************** This message is intended only for the use of the individual or entity to which it is addressed and may contain information that is privileged, confidential and exempt from disclosure under applicable law. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution, or copying of this communication is strictly prohibited by law. If you have received this communication in error, or would like to have us stop contacting you, please notify me immediately. **************************************************************** W dniu 2012-08-14 21:57, Charlie Scott pisze: > The Information Security Office at the University of Texas at Austin is looking for an Information Security Analyst to be part of our Risk Management team. This team performs network vulnerability assessments, application vulnerability assessments, and risk assessments for departments, colleges, schools, and research units on campus. It is primarily a technical position with a dash of policy/compliance/awareness work. > > Additional information can be found here: > > https://utdirect.utexas.edu/apps/hr/jobs/nlogon/120808019326 > > Thank you, > Charlie > -- > Charlie Scott, CISSP, GSEC, GCIH, GWAPT > Information Security Office > The University of Texas at Austin > 512-475-9482 > "Securus * Vigilare * Insanus" >
Message from valdis.kletnieks@vt.edu

On Thu, 16 Aug 2012 09:28:55 +0200, Maciej Kozuszek said: > Hello Charlie, > My name is Maciej Kozuszek. I'm a product manager of eForensics Magazine Moral of the story: Always double-check whether you did a 'reply list' or 'reply sender', especially if you're about to send something that should *NOT* go to the list....
Please escort this vendor to the list door and see that they don't come back. - ken Maciej Kozuszek wrote: > Hello Charlie, > > My name is Maciej Kozuszek. I'm a product manager of eForensics > Magazine and PenTest Magazine. I also do have a close relations with > Hakin9 Magazine. > I've just noticed your posting on SECURITY@LISTSERV.EDUCAUSE.EDU > mailing list, regarding recruitment. > > I was wondering if perhaps University of Texas at Austin wouldn't be > interested in posting this information to our magazines. Allover we > have about 113 000 IT Security professionals in our databases, and I > think that this could be of a value for you. > In return we would request nothing more than just promoting our > publications to the group of IT Security oriented staff / students in > University of Texas at Austin, > > Please let me know if you'd be interested in the above, > > Warm regards, > > Maciej Kozuszek > PenTest Magazine Product Manager > PenTest Laboratory Product Manager > eForensics Magazine Product Manager > > www.pentestmag.com > www.pentestlab.org > www.eforensicsmag.com > > Software Media Sp. z o.o. SK > > CONFIDENTIALITY NOTICE****************************************** > This message is intended only for the use of the individual > or entity to which it is addressed and may contain information > that is privileged, confidential and exempt from disclosure > under applicable law. If the reader of this message is not > the intended recipient, you are hereby notified that any > dissemination, distribution, or copying of this communication > is strictly prohibited by law. If you have received this > communication in error, or would like to have us stop contacting > you, please notify me immediately. > **************************************************************** > > W dniu 2012-08-14 21:57, Charlie Scott pisze: >> The Information Security Office at the University of Texas at Austin >> is looking for an Information Security Analyst to be part of our Risk >> Management team. This team performs network vulnerability >> assessments, application vulnerability assessments, and risk >> assessments for departments, colleges, schools, and research units on >> campus. It is primarily a technical position with a dash of >> policy/compliance/awareness work. >> >> Additional information can be found here: >> >> https://utdirect.utexas.edu/apps/hr/jobs/nlogon/120808019326 >> >> Thank you, >> Charlie >> -- >> Charlie Scott, CISSP, GSEC, GCIH, GWAPT >> Information Security Office >> The University of Texas at Austin >> 512-475-9482 >> "Securus * Vigilare * Insanus" >> -- - Ken ================================================================= Ken Connelly Associate Director, Security and Systems ITS Network Services University of Northern Iowa email: Ken.Connelly@uni.edu p: (319) 273-5850 f: (319) 273-7373 Any request to divulge your UNI password via e-mail is fraudulent!
Ahhhh.......Fall must be coming......the vultures are migrating in to the distribution lists.....;-) M
Message from maciej.kozuszek@software.com.pl

Dear list, I'm really sorry for posting the message to the list, it was intended for Charlie Scott only, I forgot to change the 'receiver' when using the 'reply' option. Sorry once again, Warm regards, Maciej Kozuszek PenTest Magazine Product Manager PenTest Laboratory Product Manager eForensics Magazine Product Manager www.pentestmag.com www.pentestlab.org www.eforensicsmag.com Software Media Sp. z o.o. SK CONFIDENTIALITY NOTICE****************************************** This message is intended only for the use of the individual or entity to which it is addressed and may contain information that is privileged, confidential and exempt from disclosure under applicable law. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution, or copying of this communication is strictly prohibited by law. If you have received this communication in error, or would like to have us stop contacting you, please notify me immediately. **************************************************************** W dniu 2012-08-16 15:38, SCHALIP, MICHAEL pisze: > Ahhhh.......Fall must be coming......the vultures are migrating in to the distribution lists.....;-) > > M > >
And we get a second advertisement. Maybe we should each take him at his word and send him 2 emails - 1 saying we got his mail in error and the second saying please don't contact me again, as he directs us to do.
And if his second e-mail is accurate in that the list is not the intended recipient and that "If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution, or copying of this communication is strictly prohibited by law " then everyone who has replied to this message is now a criminal because we've copied his text.
On 08/16/2012 09:13 AM, Pratt, Benjamin E. wrote: > And if his second e-mail is accurate in that the list is not the intended recipient and that "If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution, or copying of this communication is strictly prohibited by law " then everyone who has replied to this message is now a criminal because we've copied his text. An interesting assertion. What law would we be in violation of I wonder? /me removes tongue from cheek A nice example of just how silly such disclaimers are... >
Message from win-hied@bradjudy.com

Just for everyone's information, even direct replies with solicitation from vendors are prohibited on Educause lists. If you receive such solicitations, I recommend reporting them to security-council@educause.edu Rules: http://www.educause.edu/discuss/constituent-and-discussion-group-partici... on-guidelines "Please note that unsolicited commercial communications to constituent group participants as a result of postings to a Constituent or Discussion list violate the promotional messages and advertising provisions of these guidelines and may result in the loss of access to the listserv in question." Brad Judy
Please note that I have contacted Maciej Kozuszek regarding today's post and removed them from the listserv. As a reminder to all Security list participants, the EDUCAUSE Participation Guidelines state: Promotional Messages and Advertising EDUCAUSE Constituent and Discussion Groups are educational in nature and not intended for promotional announcements, advertising, product-related press releases, or other commercial use. Please note that unsolicited commercial communications to constituent group participants as a result of postings to a Constituent or Discussion list violate the promotional messages and advertising provisions of these guidelines and may result in the loss of access to the listserv in question. http://www.educause.edu/discuss/constituent-and-discussion-group-partici... As Brad noted, you may send a note to security-council@educause.edu or contact me directly in the future if you have questions or concerns about this listserv. Thank you, Valerie _______________ Valerie M. Vogel Program Manager, EDUCAUSE office: (202) 331-5374 e-mail: vvogel@educause.edu _______________ Follow us on Twitter! @HEISCouncil Like us on Facebook: www.facebook.com/HEISCouncil
Close
Close


Annual Conference
September 29–October 2
View Proceedings

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

Digital Badges
Member recognition effort
Earn yours >

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2014 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.