Urgent Need - 8 New Requirements, Location: Either of Atlanta---Georgia & Charlotte---North Carolina (onsite from Day 1) at Atlanta, Georgia, USA |
Email: [email protected] |
From: SAPNA, ITECS [email protected] Reply to: [email protected] Urgent 8 requirements from IBM. Any visa. Phone + Video. Location: mentioned in the job. Either of Atlanta/Georgia OR Charlotte/North Carolina. Onsite from Day 1 at either of the location. End Client: Truist -------------------------------------------------------------------------------------------- Project Name: TIH Cyber Security Support Sector: Financial Services Location: Either of Atlanta/Georgia & Charlotte/North Carolina (onsite from Day 1) ----------------------------------------------------------------------------------------------------------------- Requirement #1 Role title: Cybersecurity Principal Architect Location: Either of Atlanta/Georgia & Charlotte/North Carolina (onsite from Day 1) Required Skills (Be specific): Responsible for defining and maintaining cyber security architecture and technology plans with a focus on creating strategy, researching emerging technology/best practices, and applying technology to enable business solutions. Requirement #2 Role title: Principal Security Threat Hunter Cloud Location: Either of Atlanta/Georgia & Charlotte/North Carolina (onsite from Day 1) Bill Rate: $90/hr. Required Skills (Be specific): Minimum of 7 years of cyber operations, incident response, threat hunting, etc. experience Experienced, proactive, and creative threat hunter searching for threats to Truist from TIH environments and consult on improvements to detect/respond processes. Support day-to-day incidents and escalations from TIH as needed. Conduct cyber investigations for escalated and challenging computer security incidents using computer forensics, network forensics, root cause analysis and/or malware analysis. Participate in the creation and maintenance of playbooks used in response for investigation/incident triggers in support of 24/7 Cyber Fusion Center operations. Identify new threat tactics, techniques and procedures used by cyber threat actors.. --------------------------------------------------------------------------------------------------------------------------------- Requirement #3 Role title: Principal Cyber Technologies M&A Consultant Location: Either of Atlanta/Georgia & Charlotte/North Carolina (onsite from Day 1) Bill Rate: $90/hr C2C Required Skills (Be specific): Consultant highly experienced in both M&A and Cyber Technology to support leadership in TIH related meetings and to ensure that the cyber technologies remain accurate and available during the transition period. --------------------------------------------------------------------------------------------------------------------------------- Requirement #4 Role title: Cyber Security Engineer Location: Either of Atlanta/Georgia & Charlotte/North Carolina (onsite from Day 1) Bill Rate: $65/hr. Required Skills (Be specific): A. Support Data Protection transition for the various data lifecycle management (DLCM) tools that support Truist today -- Purview, Varonis, Informatica DPM, AvePoint. Will backup or represent Data Protection as scanning is shifted from one platform to another. Will also support exception management and analysis for both data protection sub-capabilities, providing TIH the understanding of present exceptions and how they can be emulated. B. Support Data Protection transition for the various data loss prevention (DLP) and CASB tools. Will back up or represent Data Protection as DLP transitions from Forcepoint to Microsoft DLP and from one Zscaler configuration to another. Supporting configuration transition for Microsoft Defender for Cloud Apps (MDCA) and related CASB technologies. No support included for API security within data protection. --------------------------------------------------------------------------------------------------------------------------------- Requirement #5 Role title: Static Code/SCA Principal Engineer Location: Location: Either of Atlanta/Georgia & Charlotte/North Carolina (onsite from Day 1) Bill Rate: $65/hr. C2C Required Skills (Be specific): (hands on and is able to drive the SAST/SCA TIH identification and reporting tasks) Responsible for developing and maintaining the technical IT/cyber security capabilities necessary for safeguarding TIH applications in parallel with TIH AppSec, including phases of SDLC and Static Application Security Lifecycle. Leads the designing, planning, testing and implementation phases of shifting SAST/SCA responsibilities to TIH. Develop and maintain the technical IT/cyber capabilities for TIH applications in scope of separation, including all phases of the software development lifecycle and software stack with a primary focus on static application security testing (SAST) and software composition analysis (SCA). Work with TIH AppSec teams to identify methods to remediate vulnerabilities, evaluate existing workarounds, and troubleshoot false positives via manual code review. Aid in the integration of the SAST and SCA process into shift-left processes (IDE, Pipelines, and Change Management Systems) of newly created TIH processes Participate in the implementation of new TIH information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff. Provide technical support and vulnerability validation of identification processes running parallel to TIH processes to prove vulnerability identification in a timely manner and explain and interpret complex, difficult, or sensitive information. Create TIH separation specific reporting monthly/weekly in conjunction with TIH AppSec resources to ensure executive visibility into separation progress and ownership transfer roadmap of TIH applications. --------------------------------------------------------------------------------------------------------------------------------- Requirement #6 Role title: Active Directory Technical Leader Location: Either of Atlanta/Georgia & Charlotte/North Carolina (onsite from Day 1) Bill Rate: $80/hr C2C Required Skills (Be specific): (hands on and is able to drive the IAM tasks) This position leads the IAM effort, technically, to ensure that all IAM capabilities (Authentication / Authorization, IAM and Privileged Access is represented. Align with IAM-wide priorities that define our what that may change based on business need. Solid Active Directory experience enough to partner with our Cyber Solution Architect. Oversee Sterling Cap CCS/IAM operational plans in support of business objectives; develop and execute transition plans to solve problems by making technical tradeoffs. Apply a balance of 70% technical and 30% functional knowledge to deliver quality results. 10-15 years tech experience working in identity and access management building capability and implementing processes. 10 years operational planning and execution. Experience working in a complex, dynamic and demanding environment with short time frames. 5 years experience and expert-level technical knowledge of product knowledge and processes for specific IAM areas (e.g., Active Directory, RACF, Idaptive, CyberArk, Centrify, PRIVA, Oracle OIM, Persistent Ignite). Experience and functional knowledge of tools and processes for the broader IAM capability. Experience working with enterprise risk partners knowing what they are looking for Knowledge of how to implement Active Directory authentication and auth following industry security standards like NIST. Technical and business acumen needed to break down complex problems and concepts into their core parts, simplify, create diagrams, and present solutions in terms that are understood by non-Active Directory experts. --------------------------------------------------------------------------------------------------------------------------------- Requirement #7 Role title: Active Directory Technical Principal Engineer (Hands On) Location: Either of Atlanta/Georgia & Charlotte/North Carolina (onsite from Day 1) Bill Rate: $80/hr C2C Required Skills (Be specific): Well versed in Active Directory Design and Engineering. Can drive technical solution planning, implement, and work with application development and infrastructure partners as needed. Solid Active Directory experience enough to partner with our Cyber Solution Architect. Understand 2-way and 1-way trusts; solid security; working knowledge of Quest Migration Manager Experience in performing domain migrations; cross domain access; migrating servers, application and users between domains. Experience in divesture where domain resources (identities, services, laptops, etc.) migrate from one company to another. Experience with AD and Azure AD federation. Experience migrating M365 users between tenants. Deep knowledge of Azure Active Directory/Entra ID Synchronization (e.g., dependencies on UPN, Alternate ID sync method, etc.) Experience migrating NAS (DFS and non-DFS) to OneDrive. Deep understanding of Active Directory authentication and authorization protocols and supporting network protocols. Strong PowerShell automation experience. --------------------------------------------------------------------------------------------------------------------------------- Requirement #8 Role title: OIM Technical Leader Location: Either of Atlanta/Georgia & Charlotte/North Carolina (onsite from Day 1) Bill Rate: $80/hr C2C (All Inc.) Required Skills (Be specific): (hands on and is able to drive the IAM tasks) This position leads the IAM effort technically, to ensure that all IAM capabilities (IAM Lifecycle and Privileged Access is represented Align with IAM-wide priorities that define our what that may change based on business need Solid OIM and ID Lifecycle Management (provisioning, transfer, leaver, joiner, attestation, etc.) experience enough to partner with our Cyber Solution Architect as well as Application Development teams (including HR Technology) Oversee projects IAM Provisioning and Access Review operational plans in support of business objectives; develop and execute transition plans to solve problems by making technical tradeoffs. Apply a balance of 70% technical and 30% functional knowledge to deliver quality results. 10-15 years tech experience working in identity and access management building capability an implementing processes. 10 years operational planning and execution Experience working in a complex, dynamic and demanding environment with short time frames. 5 years experience and expert-level technical knowledge of product knowledge and processe for specific IAM areas (e.g., Active directory, RACF, Idaptive, CyberArk, PRIVA, Oracle OIM, Persistent Ignite). Experience and functional knowledge of tools and processes for the broader IAM capability. Experience working with enterprise risk partners knowing what they are looking for. ---------------------------------------------------------------------------------------------------------------- Keywords: active directory information technology Idaho Urgent Need - 8 New Requirements, Location: Either of Atlanta---Georgia & Charlotte---North Carolina (onsite from Day 1) [email protected] |
[email protected] View all |
Thu May 02 12:07:00 UTC 2024 |