Multiple Cybersecurity Positions in Charlotte , NC or Atlanta , GA at Charlotte, North Carolina, USA |
Email: [email protected] |
Hi, Please find the below requirements and send me your updated profile to [email protected] Position: Multiple Cybersecurity Positions Location: Local to Charlotte , NC or Atlanta , GA Duration: Long-term Project Need Locals to Charlotte , NC or Atlanta , GA Staff to Remediation/Hardening of Cyber Apps/Infrastructure 4 roles Job Description 1 : Cybersecurity NAC Engineer Forescout Job Profile Summary Responsible for developing and maintaining the technical IT / cyber security capabilities related to Network Access Controls. Plan, test and implement Network Access Control capabilities to authorize and authenticate all network attached endpoints. Essential Duties and Responsibilities Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time. 1. Analyze network attached endpoints to determine, recommend, and plan enhancements to Network Access Control capabilities that will provide for project requirements, efficient operations, and effective ROI. 2. Develop and maintain Network Access Control capabilities including all phases of detection, identification, authorization, authentication, monitoring, and reporting of network attached endpoints. 3. Lead efforts, in collaboration with line of business owner, related to designing, planning, enhancing, and testing of Network Access Controls throughout the enterprise. Required Qualifications: The requirements listed below are representative of the knowledge, skill and/or ability required. 1. Specialized and/or broad functional knowledge of information security technologies including but not limited to network operating systems and endpoint identification and management. 2. Experience planning, testing, and deploying Network Access Controls in an enterprise environment. 3. Specialized and/or broad functional knowledge of Forescout deployment and policy administration. Job Description 2: Cybersecurity Engineer Job Profile Summary Responsible for developing and maintaining the technical IT/cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle), including every phase of the SDLC and software stack. Assist in the designing, planning, testing and implementation phases of cybersecurity technology projects. Essential Duties and Responsibilities Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time. 1. Develop and maintain documentation for the (DDoS) Distributed Denial-of-Service (DDoS) capabilities and related processes. 2. Monitor and analyze Network layer traffic for potential security threats and take appropriate action to mitigate risks. 3. Design and implement DDoS mitigation strategies at Layers 3,4 and 7 to protect the network infrastructure against Volumatic attacks. 4. Monitor and analyze network traffic to identify and mitigate potential DDoS threats in real-time. 5. Participate in efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies. 6. Participate in the analysis of information to determine, recommend, and plan the use of new technologies, or modifications to existing equipment and systems that will provide capability for proposed project or workload, efficient operation and effective use of allotted resources 7. Participate in the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff 8. Take a new perspective on existing solutions to solve complex problems and exercise judgment based on the analysis (e.g. modeling, testing, etc.) of multiple sources of information. 9. Provide technical support of information security technologies, providing problem analysis and resolution in a timely manner and explain and interpret complex, difficult, or sensitive information. 10. Lead small cybersecurity projects with manageable risks and resource requirements; plays significant roles in larger, more complex initiatives. Required Qualifications: The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. 1. Associate degree/bachelors degree and five years of experience in systems engineering or administration or an equivalent combination of education and work experience. 2. Hands-on experience with DDoS tools such as Akamai/Prolexic, AT&T Arbor, Verizon, AWS, and Azure to monitor and analyze web traffic for potential security threats and take appropriate action to mitigate risks. 3. Previous experience in planning and managing IT projects. 4. Ability to coordinate with internal and external teams to implement changes in large matrix organization. Preferred Qualifications: 1. Bachelors degree and six years of experience or an equivalent combination of education and work experience 2. Banking or financial services experience Job Description 3: Cybersecurity Engineer Job Profile Summary Responsible for developing and maintaining the technical IT/cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle), including every phase of the SDLC and software stack. Assist in the designing, planning, testing and implementation phases of cybersecurity technology projects. Essential Duties and Responsibilities Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time. 1. Develop and maintain documentation for the (WAF) web application firewall system and related processes. 2. Monitor and analyze web traffic for potential security threats and take appropriate action to mitigate risks 3. Participate in efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies. 4. Participate in the analysis of information to determine, recommend, and plan the use of new technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources 5. Participate in the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff 6. Take a new perspective on existing solutions to solve complex problems and exercise judgment based on the analysis (e.g. modeling, testing, etc.) of multiple sources of information. 7. Provide technical support of information security technologies, providing problem analysis and resolution in a timely manner and explain and interpret complex, difficult, or sensitive information. 8. Lead small cybersecurity projects with manageable risks and resource requirements; plays significant roles in larger, more complex initiatives. Required Qualifications: The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. 1. Associate degree/bachelors degree and five years of experience in systems engineering or administration or an equivalent combination of education and work experience. 2. Hands-on experience: Monitor and analyze web traffic for potential security threats and take appropriate action to mitigate risks. 3. Previous experience in planning and managing IT projects Preferred Qualifications: 1. Bachelors degree and six years of experience or an equivalent combination of education and work experience 2. Banking or financial services experience Full Legal Name of the candidate Current Location Relocation (open to relocate to work location) Availability to Join Currently on project / Project last date MM/YY Contact Number Reason for change of project Work Authorization Status & Validity Last 4 Digit SSN Email ID Any Interviews in Pipeline Total Exp. Education Details ( Degree/ University / Year of passing) LinkedIn: Interview availability Passport Number Any vacation plans in the Next 3 months Thanks & Regards, Vamshi VRN Technologies LLC. 1908 Yaupon Trail, Suite 203 Cedar Park TX 78613 Email: [email protected] Website: www.vrntech.us -- Keywords: materials management information technology Georgia Idaho North Carolina Texas Multiple Cybersecurity Positions in Charlotte , NC or Atlanta , GA [email protected] |
[email protected] View all |
Fri May 31 19:13:00 UTC 2024 |