Cyber security architect Remote at Remote, Remote, USA |
Email: [email protected] |
Role: Cyber security architect Location: Remote Visa: No OPT CPT H1BT Experience: 10+Needed Mandatory skills: Tripwire and Guardium with strong Linux and windows admin Security Administration and Operations Automation of existing operational task as it relates to Database Activity Monitoring and File Integrity Monitoring Install, configure, and troubleshoot Data Protection and Database Activity Monitoring Agents, and other agent-based applications running on Databases, Windows desktops, Windows Servers, Unix Servers, EC2 and at the containers level. Apply patches and upgrades to clients, appliances, and utilities on a regular basis. Perform daily monitoring for integrity and availability of appliances, management of servers, systems and processes which may also include reviewing system and application logs, error messages and verifying services or jobs are running as expected. Establish and maintain operational, configuration and other process/procedures to ensure efficiency of new and existing detective and preventative configuration policies. Provide support to Risk management and IT Security Audit teams assisting in answers, solutions and problem solving. answers, artifacts, and solutions. Provide support to the Cyber Security Operations Center and Threat Detection Teams with recommendations and handling of their requests for changes, updates and improvements of endpoint polices. Coordinate with other infrastructure, engineering, and application project/support teams to ensure new policies/assets are deployed and issues impacting tools and systems are resolved quickly and effectively without adversely impacting the affected business systems. Augment production support team to ensure 24/7 coverage and operations. Responsibilities sometimes require working evenings and weekends, sometimes with little or no advanced notice. Participate in on-call rotation. Coordinate with Information Security team to ensure solution assurance and compliance to security policy, procedures, standards, and baseline security configurations. Understand and advocate IT Security standards, reference architectures. Demonstrate an understanding of malware, threats, vulnerabilities, and the complete affect these could have in the environment. Communicate optimally with clients to identify needs and evaluate alternative technical solutions and strategies. Qualifications: 5-7 years of relevant experience in IT Security Extensive Python scripting and automation experience required. Experience with IBM Guardium Database Activity Monitoring or similar tools that focus on Database Security Experience with Tripwire File Integrity Monitoring, or similar tools that performs FIM. Knowledge of various Database Flavors including DB2, Sybase, Oracle, MSSQL and MongoDB Familiar with industry security regulations and frameworks (MITRE Attack Framework, NIST, CIS CSC, etc.) Familiar with change management processes and activities and change review board routines. 3-5 years of demonstrated ability in administration of security technologies. An understanding of Endpoint Protection, File Integrity Monitoring, Data Loss Prevention, Security Configuration Management, Database Activity Monitoring, Data Masking, Malware Isolation, SaaS security solutions and cloud client security. Working knowledge of network ports, protocols, and firewalls An understanding of HIPS clients and firewall rules and settings. Working knowledge of cloud security for AWS, GCP and Azure. Needs to be organized and have the capability to multitask by working multiple problems, tasks and still seeing tasks through to closure working with all type of endpoint technologies. Must have experience working on physical and virtual appliances. Configurations, Windows, Linux, and Network command line. Thanks & Regards, Kumar US IT Sales /Technical Recruiter Email : [email protected] Linkedin: linkedin.com/in/kumar-stonegate/ Stonegate Technologies LLC 4400 Route 9 South Suite 1000, Freehold, NJ, 07728 www.stonegate-tech.com -- Keywords: information technology New Jersey |
[email protected] View all |
Wed Jan 31 23:32:00 UTC 2024 |