Home

Multiple Cybersecurity Positions in Charlotte , NC or Atlanta , GA at Charlotte, North Carolina, USA
Email: [email protected]
Hi,

Please find

the below requirements and send me your updated profile to

[email protected]

Position: Multiple Cybersecurity Positions

Location: Local to Charlotte , NC or Atlanta , GA

Duration: Long-term Project

Need Locals to Charlotte , NC or Atlanta , GA

Staff to Remediation/Hardening of Cyber Apps/Infrastructure 4 roles

Job Description 1
: Cybersecurity NAC Engineer Forescout

Job Profile Summary

Responsible for developing and maintaining the technical IT / cyber security capabilities related to Network Access Controls. Plan, test and implement Network Access Control capabilities to authorize and authenticate all network attached endpoints.

Essential Duties and Responsibilities

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

1.

Analyze network attached endpoints to determine, recommend, and plan enhancements to Network Access Control capabilities that will provide for project requirements, efficient operations, and effective ROI.

2.

Develop and maintain Network Access Control capabilities including all phases of detection, identification, authorization, authentication, monitoring, and reporting of network attached endpoints.

3.

Lead efforts, in collaboration with line of business owner, related to designing, planning, enhancing, and testing of Network Access Controls throughout the enterprise.

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required.

1.

Specialized and/or broad functional knowledge of information security technologies including but not limited to network operating systems and endpoint identification and management.

2.

Experience planning, testing, and deploying Network Access Controls in an enterprise environment.

3.

Specialized and/or broad functional knowledge of Forescout deployment and policy administration.

Job Description 2: Cybersecurity Engineer

Job Profile Summary

Responsible for developing and maintaining the technical IT/cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle), including every phase of the SDLC and software stack. Assist in the designing, planning, testing and implementation phases of cybersecurity technology projects.

Essential Duties and Responsibilities

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

1.

Develop and maintain documentation for the (DDoS) Distributed Denial-of-Service (DDoS) capabilities and related processes.

2.

Monitor and analyze Network layer traffic for potential security threats and take appropriate action to mitigate risks.

3.

Design and implement DDoS mitigation strategies at Layers 3,4 and 7 to protect the network infrastructure against Volumatic attacks.

4.

Monitor and analyze network traffic to identify and mitigate potential DDoS threats in real-time.

5.

Participate in efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies.

6.

Participate in the analysis of information to determine, recommend, and plan the use of new technologies, or modifications to existing equipment and systems that will provide capability for proposed project or workload, efficient operation and effective use of allotted resources

7.

Participate in the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff

8.

Take a new perspective on existing solutions to solve complex problems and exercise judgment based on the analysis (e.g. modeling, testing, etc.) of multiple sources of information.

9.

Provide technical support of information security technologies, providing problem analysis and resolution in a timely manner and explain and interpret complex, difficult, or sensitive information.

10.

Lead small cybersecurity projects with manageable risks and resource requirements; plays significant roles in larger, more complex initiatives.

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

1.

Associate degree/bachelors degree and five years of experience in systems engineering or administration or an equivalent combination of education and work experience.

2.

Hands-on experience with DDoS tools such as Akamai/Prolexic, AT&T Arbor, Verizon, AWS, and Azure to monitor and analyze web traffic for potential security threats and take appropriate action to mitigate risks.

3.

Previous experience in planning and managing IT projects.

4.

Ability to coordinate with internal and external teams to implement changes in large matrix organization.

Preferred Qualifications:

1.

Bachelors degree and six years of experience or an equivalent combination of education and work experience

2.

Banking or financial services experience

Job Description 3: Cybersecurity Engineer

Job Profile Summary

Responsible for developing and maintaining the technical IT/cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle), including every phase of the SDLC and software stack. Assist in the designing, planning, testing and implementation phases of cybersecurity technology projects.

Essential Duties and Responsibilities

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

1. Develop and maintain documentation for the (WAF) web application firewall system and related processes.

2. Monitor and analyze web traffic for potential security threats and take appropriate action to mitigate risks

3. Participate in efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies.

4. Participate in the analysis of information to determine, recommend, and plan the use of new technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources

5. Participate in the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff

6. Take a new perspective on existing solutions to solve complex problems and exercise judgment based on the analysis (e.g. modeling, testing, etc.) of multiple sources of information.

7. Provide technical support of information security technologies, providing problem analysis and resolution in a timely manner and explain and interpret complex, difficult, or sensitive information.

8. Lead small cybersecurity projects with manageable risks and resource requirements; plays significant roles in larger, more complex initiatives.

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

1. Associate degree/bachelors degree and five years of experience in systems engineering or administration or an equivalent combination of education and work experience.

2. Hands-on experience: Monitor and analyze web traffic for potential security threats and take appropriate action to mitigate risks.

3. Previous experience in planning and managing IT projects

Preferred Qualifications:

1. Bachelors degree and six years of experience or an equivalent combination of education and work experience

2. Banking or financial services experience

Full Legal Name of the candidate

Current Location

Relocation (open to relocate to work location)

Availability to Join

Currently on project / Project last date MM/YY

Contact Number

Reason for change of project

Work Authorization Status & Validity

Last 4 Digit SSN

Email ID

Any Interviews in Pipeline

Total Exp.

Education Details ( Degree/ University / Year of passing)

LinkedIn:

Interview availability

Passport Number

Any vacation plans in the Next 3 months

Thanks & Regards,

Vamshi

VRN Technologies LLC.

1908 Yaupon Trail, Suite 203 Cedar Park TX 78613

Email:

[email protected]

Website:

www.vrntech.us

--

Keywords: materials management information technology Georgia Idaho North Carolina Texas
Multiple Cybersecurity Positions in Charlotte , NC or Atlanta , GA
[email protected]
[email protected]
View all
Fri May 31 19:13:00 UTC 2024

To remove this job post send "job_kill 1441864" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 68

Location: Charlotte, North Carolina