Urgent opening for Cyber Security Analyst at Boston, Massachusetts, USA |
Email: [email protected] |
From: Rohit Singh, KK software associates [email protected] Reply to: [email protected] Hello, Hope you are doing good. This is Rohit from KK Software Associates LLC. We are the Preferred vendor for the clients. I found your resume suitable for one of the job opportunities we currently have. Please find the detailed job description and please do let me know if you are interested in this opening: Role name: Cyber Security Analyst Location: Boston, MA/ Worcester, MA Experience (Years): 6-8 Duration: 12 Months Rate: $50/hr C2C Role Description: Managing user groups: Creating and managing user groups within the identity & access management system, which streamlines access control and simplifies management. Enforcing company policies: IAM analysts enforce company policies and procedures related to IAM, ensuring compliance and security are adhered to. User activity monitoring: They actively monitor user activities within the identity & access management system to identify any unusual or suspicious behavior. Reporting on IAM system activity: IAM analysts generate reports detailing the activities and usage of the identity & access management system. These reports are crucial for audits and security assessments. Staying updated on best practices: IAM analysts maintain current knowledge of industry best practices in identity & access management to ensure the organizations approach remains cutting-edge and secure. Essential Skills: Technical skillsAs an IAM specialist, you need to have a solid foundation in various technical domains, such as networking, cryptography, authentication, authorization, auditing, and cloud computing. You also need to be familiar with the tools and standards used for IAM, such as Active Directory, LDAP, SAML, OAuth, OpenID Connect, and MFA. Additionally, you should be able to write scripts and code to automate and integrate IAM solutions, using languages like PowerShell, Python, Java, or C#.Analytical skillsIAM involves a lot of data collection, analysis, and reporting. You need to be able to identify and assess the risks, threats, and vulnerabilities related to IAM, and devise appropriate mitigation strategies and controls. You also need to be able to monitor and measure the performance and compliance of IAM systems, and generate reports and dashboards for various stakeholders. Moreover, you need to be able to troubleshoot and resolve any issues or incidents that may arise in the IAM environment. Project management skills: IAM projects are often complex, dynamic, and cross-functional. You need to be able to plan, execute, and deliver IAM projects on time, on budget, and on scope. You need to be able to define the scope, objectives, requirements, and deliverables of IAM projects, and manage the resources, tasks, risks, and issues involved. You also need to be able to track and report the progress and status of IAM projects, and ensure the quality and satisfaction of the outcomes. Thanks & Regards, Rohit Kumar Singh Lead US IT Recruiter Mail: [email protected] www.kksoftwareassociates.com Keywords: csharp information technology Massachusetts Urgent opening for Cyber Security Analyst [email protected] |
[email protected] View all |
Mon Aug 12 19:45:00 UTC 2024 |