Home

Local to GA only || Sr. Security Engineer || Onsite-Atlanta, GA || USC, GC, GC-EAD only at Atlanta, Georgia, USA
Email: [email protected]
Sr. Security Engineer

Local to Atlanta, GA only(Onsite)

Visa : USC, GC and GC-EAD

Duration: 12+ month contract

Do let me know if you have a candidate with good LinkedIn as well.  

Must haves are marked in Yellow and attached is the Job description,

Description:
Our client is on a journey to becoming the best IT organization in the airline industry, a journey of transformation. They are changing the way we do business from top to bottom as we strive to create meaningful and innovative solutions and are looking for team members to help us realize our vision

Requirements:

Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field

At least 3 years of experience working with Microsoft 365 technologies including Microsoft Intune and Microsoft Purview

Experience administering Microsoft BitLocker Administration and Monitoring (MBAM) solution

Strong technical knowledge of secure architectures, system policies, rules, etc.

Experience with designing and automating data protection strategies for cloud environments

Familiar with securing structured and unstructured data

Experience working with Data Loss Prevention (DLP) solutions

Experience managing Cloud Access Security Broker (CASB) solutions

Experience with deploying and managing data classification solutions

Experience with managing devices using policies in Microsoft Intune

Understanding of regulatory structures such as PCI and GDPR

Creative and adaptive work ethic, with a strong customer-oriented attitude

Microsoft Intune

Microsoft BitLocker Administrator

Microsoft Purview

Microsoft 365

Microsoft Azure

Desired Skills:

Professional certifications such as CISSP, CISM, CEH, Security+, or SANS GIAC

Cloud certifications such as Microsoft Certified Security, Compliance, and Identity Fundamentals

Responsibilities:

Lead the implementation and migration to Microsoft Intune at an enterprise scale

Design and implement security policies and configurations for device management with Microsoft Intune

Recommend best practices and test new features of the product

Provide training and support to partner teams and end users on new security features

Collaborate with business partners who could benefit from the new tools, assisting with implementing new use cases

Continuously monitor and optimize the performance and security of the solution

Administer data protection tools including patching, upgrading, troubleshooting, testing and report generation

Develop new policies using regex, machine learning, fingerprinting, and/or dictionaries to monitor unique data types

Review existing deployment architecture, engineering, and policies and assess overall deployment against best practices

Evaluate and build new data protection solutions in alignment with cloud requirements

Operationalize solutions to deliver value to the business

Implement protective controls in the cloud to ensure the confidentiality, integrity, and availability of data

Responsible for the design, testing, evaluation, implementation, support, management, and deployment of security systems/devices used to safeguard the organization's information assets

Responsible for analyzing the information security environment and assisting with the development of security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure

Works with the technical team to recover data after a security breach

Configures and installs firewalls and intrusion detection systems

Develops automation scripts to handle and track incidents

Investigates intrusion incidents, conducts forensic investigations and mounts incident responses

Delivers technical reports and formal papers on test findings

Installs firewalls, data encryption, and other security measures

Maintains access by providing information, resources, and technical support

Ensures authorized access by investigating improper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements

Updates job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations

Accomplishes information systems and organization mission by completing related results as needed

Builds, deploys, and tracks security measurements for computer systems and networks

Mitigates security vulnerabilities by implementing applicable solutions and tools

Performs vulnerability testing, risk analyses, and security assessments

Collaborates with colleagues on authentication, authorization, and encryption solutions

Tests security solutions using industry standard analysis criteria

Responds to information security issues during each stage of a project's lifecycle

Performs risk assessments and testing of data processing systems

Establishes system controls by developing framework for controls and levels of access; recommending improvements

Establishes computer and terminal physical security by developing standards, policies, and procedures; coordinates with facilities security; recommends improvements

Safeguards computer files by performing regular backups; developing procedures for source code management and disaster preparedness; recommends improvements

Determines the sensitivity of the data in order to recommend the appropriate security needs

Develops proposals for, and consider cost effective equipment options to satisfy security needs

Communicates with the technical team, management team and users companywide if data security is breached

Designs infrastructure to alert the technical team of detected vulnerabilities

Evaluates new technologies and processes that enhance security capabilities

Supervises changes in software, hardware, facilities, telecommunications and user needs

Defines, implements, and maintains corporate security policies

Analyzes and advises on new security technologies and program conformance

Creates, tests, and implements network disaster recovery plans

Recommends security enhancements and purchases

Trains staff on network and information security procedures

Develops security awareness by providing orientation, educational programs, and on-going communication

Recommends modifications in legal, technical, and regulatory areas that affect IT security

Regards,

Adarsh Sharma

Senior Technical Recruiter

--

Keywords: information technology green card Georgia
[email protected]
View all
Fri Mar 01 01:35:00 UTC 2024

To remove this job post send "job_kill 1172821" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 32

Location: Atlanta, Georgia