Home

Cyber Security Analyst :: Location : 4 IRVING PLACE, NY (Hybrid) at Irving, Texas, USA
Email: [email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=1036334&uid=

Hi ,

Hope you are doing good,

My name is Lokesh and I am a Staffing Specialist at Cloud think

Technologies
.

I have the below open position with our client, please find and let me know your interest along with updated copy of resume and best contact number to discuss further if comfortable & interested
in this role.

Role: Cyber Security Analyst

Location : 4 IRVING PLACE, NY (Hybrid)

Position type : Contract

Project Duration : Long Term

On the final round of the INTERVIEW they have to come ON-SITE!!!!

The following are WOULD BE GIVEN FIRST PREFERENCE as a valuable asset in a potential candidate.

Knowledge in OT/ICS protocols.

Technical certifications (e.g., AWS Certified Solutions Architect, Cloud Certified Professional, Microsoft Cloud Certifications, CISSP, CISM, CIPP, IP etc.). are
preferred but not mandatory.

Experience in Agile Development, with specific Security Architect (or similar) experience preferred. Knowledge of security tools is preferred.

AS USUAL PREVIOUS WORK EXPERIENCE IN CON EDISON OR UTILITIES WILL BE GIVEN TOP PRIORITY

Detailed JD :

Under the general guidance of the IT/Security Architect or Systems Manager, the candidate will be responsible for evaluating and implementing new technologies, analyzing cybersecurity related components
and controls associated to the product, process and solution, and identify and resolve potential issues to help enhance and secure a large enterprise network. The position requires a broad foundation of IT/Security architectural experience with an understanding
of Internet, server/storage technologies, cloud services/integrations are a must. The candidate will be responsible for designing complex and innovative solutions addressing vulnerability detection, threat and risk analysis, network intrusion, securing technology
assets across the application, infrastructure, cloud and data tiers and development/implementation of vulnerability mitigation strategies. This is a hands-on team member who actively works with various teams including security, infrastructure and development
teams to improve our overall security standards. This position is expected to be the last level of technical escalation within the company for the assigned responsibilities.

Guides Cyber Governance and Information Protection team and makes informed security decisions on the design of infrastructure, systems and applications.

Works with tech leads and teams to ensure security is built into app development, network infrastructure and cloud systems. Work with necessary Information Technology groups to satisfy specific technology
related issues. Act as an Information Security liaison between the customers and all groups in Information Technology

Implements industry leading practices around cyber risks and Cloud security and perform security assessments of cloud platforms/environments using industry standard frameworks such as ISO, CSA-CSM
and NIST

Designs and develops security policies, standards and procedures e.g. firewall rules, SSL/IPSec, security incident and event management (SIEM), data protection (DLP, encryption), user account management
(SSO, SAML), and password/key management.

Identifies software weaknesses that could lead to exploitable vulnerabilities such as SQL injection, cross-site scripting, cross-site request forgery, buffer overflows, use of hard-coded passwords,
weak encryption, sensitive data.

Seasoned professional with detailed technical knowledge of techniques, standards and state-of-the art capabilities for authentication and authorization, applied cryptography, security vulnerabilities
and remediation. Can advise on architecture decisions at technical and product level.

Adequate knowledge of web related technologies (Web applications, Web Services and Service Oriented Architectures) and of network/web related protocols.

Experience working with Cloud security posture management tools.

Constantly looking for better ways of solving security problems and designing the solution, not afraid of challenging the status quo.

Respond swiftly to all alerts, performing initial risk/impact assessments or escalating issues as appropriate

Follow change management controls and guidelines.

Support operating organizations during corporate emergencies. Participate in the Company's emergency management processes, cyber security and storm plans.

Perform other related tasks and assignments as required.

Skills & Requirements

Must be comfortable and skilled at driving information security processes and techniques. Must be able to communicate designs and give persuasive presentations.

Must be able to interact with all levels of management and communicate technical concepts to a non-technical audience.

Ability to handle multiple assignments with changing priorities while meeting deadlines.

Must be flexible and able to work off-hours as required to support deployments, resolve production problems or respond to corporate emergencies.

Ability to establish medium and long-term plans and priorities and estimate investment requirements.

Minimum 5 years of hands-on experience working in cyber security and related discipline.

Minimum 5 years of hands-on experience in designing, developing, implementing secure architectures and/or processes.

Experience with implementing or integrating commercially available infrastructure components.

Experience in evaluating technology and establishing standard designs.

Must be conversant in emerging technologies and practices such as cloud computing.

Familiarity with security vulnerability management products, process and industry best practices

Familiarity of security infrastructure and application assets to design and implement Cybersecurity controls and designs.

Looking forward to work with you!

Thanks & Regards

Lokesh Yadav

Sr. Technical Recruter

Cloud Think Technologies

E:

[email protected]

Website:

https://cloudthinktech.com/

LinkedIn:

https://www.linkedin.com/in/lokesh-yadav-35941b223/

Address:

12301 Kernan Forest BLVD APT 1407, Jacksonville FL, 32225

Please consider the environment before printing this e-mail.

DISCLAIMER

The information in this e-mail is confidential and may be legally privileged. It is intended solely for the addressee. Access to this e-mail by anyone else is unauthorized.
If you have received this communication in error, please notify the sender and delete the e-mail and destroy any copies of it. If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken in reliance
on it, is prohibited and may be unlawful. Any opinions or advice contained in this e-mail are subject to the terms and conditions expressed in the governing Cloud Think Technologies client engagement letter. Opinions, conclusions and other information in this
e-mail and any attachments that do not relate to the official business of the firm are neither given nor endorsed by it.

Cloud Think Technologies cannot guarantee that e-mail communications are secure or error-free, as information could be intercepted, corrupted, amended, lost, destroyed,

--

Keywords: access management information technology Florida New York
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=1036334&uid=
[email protected]
View All
08:43 PM 22-Jan-24


To remove this job post send "job_kill 1036334" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]


Time Taken: 66

Location: , New York