Home

Opening for Cybersecurity consultant with data injection and sentinel in remote at Sentinel, Oklahoma, USA
Email: [email protected]
Hi, 

I Hope you are doing well, A brief version of the job description is attached below, if you are interested revert to my mail with your updated resume 

Role: cybersecurity with Data injection and Extraction using Python From Microsoft Sentinel.

Duration: Long Term

Location:  remote 

Need PP Number 

No opt and cpt and h1t visas

Job Description: 

In this role you will be helping to support and improve the efficacy of Client's Cyber Operations teams. This will be achieved through leading efforts on the team in the areas of data engineering and applying statistical and advanced analytics combined with cybersecurity knowledge to surface trends, reveal detection and capability gaps, and solve a wide range of challenges to create real security value from data.

Job Description

Improves process efficiency by creating and implementing creative and sustainable changes to existing deployment methodologies.

Leads the identification of security needs & recommends plans/resolutions.

Implements, tests & monitors info security improvements

Maintains visibility inside & outside of information security at the People management level.

Collaborate with groups such as application support, engineering ops, finance, privacy, risk management, etc.

Implements security projects driven by groups both internal and external to info security

Mentors peers and junior team members in security technologies, enterprise solution design and facilitation and effective customer interaction

Experience with implementation of various threat modeling approaches pertaining to one or more of the following STRIDE, PASTA, TRIKE, ATTACK TREE, DREAD, KILL CHAIN, CAPEC, Mobile Application threat model, Cyber Threat Tree, and data flow diagram

Authority in multiple facets of network & information security, including Firewall policy design, SSL Certificate management, vulnerability analysis & mitigation, and other topics as assigned.

Advanced understanding of IP/Security solutions & technologies applicable to the Wireless Network Architecture.

Experience with the analysis of underlying technologies that form the solution necessary for the application of threat identification, analysis, and threat model design.

The threat model depicts trust boundary, threat agent(s), threat vector(s), and safeguard(s) necessary to protect person, asset, data, and Client brand.

Lead and coordinate data engineering and analytics efforts on the team.

Develop advanced analytical solutions and novel methods for detecting new cybersecurity threats.

Design and implement a data modeling process for security platforms.

Process, correlate and perform data analysis on structured and unstructured data to identify cybersecurity threats and trends.

Use data to identify operational improvement opportunities for Cyber Operations teams.

Produce useful visualization dashboards for Cyber Operations teams.

Skills

Medium to advance knowledge of Scripting tools (Python/Perl/Shell/HTML/PHP)

Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI ()

Familiarity with load balancers (ex A10, F5), firewalls (ex CheckPoint), Venafi, MDM (ex - Mobile Iron), Cloud (ex - AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex - Damballa), Privileged Accounts (ex CyberArk), SIEM (ex MS Sentinel), Log & Event (ex Splunk), Intrusion IDS/IPS (ex Symantec) , Cloud Platform (ex PCF, Docker), Scanning (ex Qualys), AppSec (ex - Veracode)

Solid understanding of Clients network elements and how they work together (EIT, Engineering & 3rd Party).

Strong presentation skills to large and small audiences.

In-depth knowledge of security standard processes in large-scale environments

Strong problem solving / troubleshooting skills

Dedicated and able to work under tight timelines.

Always act with tact and integrity, and work with a variety of individuals in a positive and productive manner

Strong verbal and communication skills with diverse multi-functional groups & the ability to communicate effectively to small & large groups

Knowledge of information security policies and regulatory controls (per team function)

Demonstrable knowledge of current technological trends and developments in the area of info security

Ability to plan, organize and prioritize tasks to complete independently; Ability to work under stress and meet tight timelines

--

Keywords: information technology ffive microsoft
Opening for Cybersecurity consultant with data injection and sentinel in remote
[email protected]
[email protected]
View all
Fri Jul 19 19:39:00 UTC 2024

To remove this job post send "job_kill 1579227" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 0

Location: ,