Home

Cyber Security Architects at Remote, Remote, USA
Email: [email protected]
From:

ashutosh parashar,

vyzeinc

[email protected]

Reply to:   [email protected]

Job Description -IMPORTANT!!!     Hiring 2, Cyber Security Architects 

                                  2 total, open positions

Hiring 2 Cyber Security Architects

Job Title: Cyber Security Architect x2    

    Important !!!!     {Please send the month and day of the Birthday, last 4 SSN with ALL submissions } 

    Location: (100% Remote) 

    

MUST HAVEs

{Please send the month and day of the Birthday with ALL submissions } 

    These Must haves go for the Cyber Security Architect 

    Strong experience with design and development of new security technologies, architectures, and security products that will support security requirements

    Strong knowledge of network security protocols, best practices, and perimeter security tools

    Strong knowledge of identity and access management controls, including SAML and OAUTH / OIDC based authentication, Active Directory, and role mapping  

    Understanding of common security control solutions for event logging, remote access, endpoint management, and mobile device management 

    Understanding of common data protection technologies such as cryptography, tokenization, and hashing 

    Understanding of Azure native security services and best practices - understanding of secure cloud service design, specifically for Azure cloud components

    Strong knowledge of threat modelling and risk assessment technologies or frameworks

    On the resume in job descriptions: Make sure they explain this ..3+ years  Developing a hardening baseline for a technology stack

Client: Delta Dental  

Job description:

The Cyber Security Engineer will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues.

Contributes to a team that ensures the security of enterprise data and systems by developing enterprise information security solutions.

Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats.

Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors.

Serves as a security expert in one or more of application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices.

Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks and contributes to the development and maintenance of information security architecture.

Engages with security specialists and other functional area architects to ensure adequate enterprise security solutions are in place to sufficiently mitigate identified risks, and to meet business objectives and regulatory requirements.

Serves as a cybersecurity subject matter expert, assessing the business impact of cybersecurity risks to the enterprise and identifying options and recommendations for mitigating those risks.

Serves as an expert in one or more of platform, application, storage, network, virtualization, cloud and mobile security best practices.

Mandatory Technical Skills:

    Strong knowledge of network security protocols, best practices, and perimeter security tools

    Strong knowledge of identity and access management controls, including SAML and OAUTH/OIDC based authentication, Active Directory, and role mapping

    Understanding of common security control solutions for event logging, remote access, endpoint management, and mobile device management

    Understanding of common data protection technologies such as cryptography, tokenization, and hashing

    Understanding of Azure native security services and best practices

    Strong knowledge of threat modelling and risk assessment technologies or frameworks

Keywords: information technology golang
Cyber Security Architects
[email protected]
[email protected]
View all
Fri Sep 06 19:25:00 UTC 2024

To remove this job post send "job_kill 1727170" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 0

Location: ,