Home

Sr Security Engineer at Atlanta, Georgia, USA
Email: uvesh@largeton.us
From:

Mohd Uvesh,

Largeton

uvesh@largeton.us

Reply to: uvesh@largeton.us

Hi ,

Sr. Security Engineer

Location : Atlanta GA (Local candidate preferred)

Visa : No OPT/CPT/H1B

JOB DESCRIPTION :

Top 5 skills are as follows:

Microsoft Intune

Microsoft BitLocker Administrator

Microsoft Purview

Microsoft 365

Microsoft Azure

Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field.

At least 3 years of experience working with Microsoft 365 technologies including Microsoft Intune and Microsoft Purview.

Experience administering Microsoft Bit Locker Administration and Monitoring (MBAM) solution.

Strong technical knowledge of secure architectures, system policies, rules, etc.

Experience with designing and automating data protection strategies for cloud environments.

Familiar with securing structured and unstructured data.

Experience working with Data Loss Prevention (DLP) solutions.

Experience managing Cloud Access Security Broker (CASB) solutions.

Experience with deploying and managing data classification solutions.

Experience with managing devices using policies in Microsoft Intune.

Understanding of regulatory structures such as PCI and GDPR.

Creative and adaptive work ethic, with a strong customer-oriented attitude.

Professional certifications such as CISSP, CISM, CEH, Security+, or SANS GIAC.

Cloud certifications such as Microsoft Certified Security, Compliance, and Identity Fundamentals.

Responsibilities:

Collaborate with multiple teams to support data protection.

Contribute to an expanding Data Protection program and assist in implementing best practices.

Implement solutions to help safeguard the most sensitive data.

Responsible for architecting, implementing, documenting, and maintaining Data Protection technologies such as Bit Locker endpoint encryption.

Lead the implementation and migration to Microsoft Intune at an enterprise scale.

Design and implement security policies and configurations for device management with Microsoft Intune.

Recommend best practices and test new features of the product.

Provide training and support to partner teams and end users on new security features.

Collaborate with business partners who could benefit from the new tools, assisting with implementing new use cases.

Continuously monitor and optimize the performance and security of the solution.

Administer data protection tools including patching, upgrading, troubleshooting, testing and report generation.

Develop new policies using regex, machine learning, fingerprinting, and/or dictionaries to monitor unique data types.

Review existing deployment architecture, engineering, and policies and assess overall deployment against best practices.

Evaluate and build new data protection solutions in alignment with cloud requirements. Operationalize these solutions to deliver value to the business.

Implement protective controls in the cloud to ensure the confidentiality, integrity, and availability of data.

Responsible for the design, testing, evaluation, implementation, support, management, and deployment of security systems/devices used to safeguard the organization's information assets.

Also responsible for analyzing the information security environment and assisting with the development of security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure.

Works with the technical team to recover data after a security breach. Configures and installs firewalls and intrusion detection systems.

Develops automation scripts to handle and track incidents.

Investigates intrusion incidents, conducts forensic investigations, and mounts incident responses.

Delivers technical reports and formal papers on test findings.

Installs firewalls, data encryption, and other security measures.

Maintains access by providing information, resources, and technical support.

Ensures authorized access by investigating improper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements.

Updates job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations.

Accomplishes information systems and organization mission by completing related results as needed.

Builds, deploys, and tracks security measurements for computer systems and networks.

Mitigates security vulnerabilities by implementing applicable solutions and tools.

Performs vulnerability testing, risk analyses, and security assessments.

Collaborates with colleagues on authentication, authorization, and encryption solutions.

Tests security solutions using industry standard analysis criteria.

Responds to information security issues during each stage of a project's lifecycle.

Performs risk assessments and testing of data processing systems.

Establishes system controls by developing framework for controls and levels of access, recommending improvements.

Establishes computer and terminal physical security by developing standards, policies, and procedures; coordinates with facilities security; recommends improvements.

Safeguards computer files by performing regular backups; developing procedures for source code management and disaster preparedness; recommends improvements.

Determines the sensitivity of the data to recommend the appropriate security needs.

Develops proposals for and considers cost effective equipment options to satisfy security needs.

Communicates with the technical team, management team and users companywide if data security is breached.

Designs infrastructure to alert the technical team of detected vulnerabilities.

Evaluates new technologies and processes that enhance security capabilities.

Supervises changes in software, hardware, facilities, telecommunications, and user needs.

Defines, implements, and maintains corporate security policies.

Analyzes and advises on new security technologies and program conformance.

Creates, tests, and implements network disaster recovery plans. -Recommends security enhancements and purchases.

Trains staff in network and information security procedures.

Develops security awareness by providing orientation, educational programs, and on-going communication.

Recommends modifications in legal, technical, and regulatory areas that affect IT securit.

Mohd Uvesh

US IT Recruiter

Email:

Uvesh@largeton.us

Phone: 571-459-7164 EXT : 116

LARGETON INC.

13800

Coppermine Rd, Herndon, VA 20171

Keywords: information technology Georgia Virginia
uvesh@largeton.us
View All
09:27 PM 22-Mar-24


To remove this job post send "job_kill 1244540" as subject from uvesh@largeton.us to usjobs@nvoids.com. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to uvesh@largeton.us -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at me@nvoids.com


Time Taken: 8

Location: Atlanta, Georgia