Cyber Security Engineers at Remote, Remote, USA |
Email: [email protected] |
From: Raman Arora, Zealhire [email protected] Reply to: [email protected] Hello, My name is Raman Arora and I am a Staffing Specialist at ZealHire. I am reaching out to you on an exciting job opportunity with one of our clients. Job Title - Cyber Security Engineers Location - N/A, California Job Description : USC/GC Need LinkedIn, VISA DL LinkedIn must have picture Candidates in CA will be given 1st preference 3 openings - Architect (2) and Engineer (1) level applicants are needed Need architect level and one senior 11+ years of profile Mandatory: Please include Pre-Screen Questions: 1 - Please describe where resource gained Design experience. 2 - Please detail your candidate's experience regarding the following: - Developing a hardening baseline for a technology stack. - Comprehensive understanding of secure cloud service design, specifically for Azure cloud components. - Expertise in infrastructure security. Notes from Manager: 3 Page Resumes MAX Interview Details 2 Zoom Interviews WITH Camera ON Must Have: LinkedIn with a picture HealthCare Experience 8 or more years of IT experience Understanding of Azure native security services and best practices Strong knowledge of network security protocols, best practices, and perimeter security tools Strong knowledge of identity and access management controls, including SAML and OAUTH/OIDC based authentication, Active Directory, and role mapping The Cyber Security Engineer will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. The person in this role will contribute to the execution of strategic information security architecture to enable effective business operations, manage enterprise risk, and address business or regulatory issues. Contributes to a team that ensures the security of enterprise data and systems by developing enterprise information security solutions. Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats. Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Serves as a security expert in one or more of application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices. Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks and contributes to the development and maintenance of information security architecture. Engages with security specialists and other functional area architects to ensure adequate enterprise security solutions are in place to sufficiently mitigate identified risks, and to meet business objectives and regulatory requirements. Serves as a cybersecurity subject matter expert, assessing the business impact of cybersecurity risks to the enterprise and identifying options and recommendations for mitigating those risks. Serves as an expert in one or more of platform, application, storage, network, virtualization, cloud and mobile security best practices. Mandatory Technical Skills: Strong knowledge of network security protocols, best practices, and perimeter security tools Strong knowledge of identity and access management controls, including SAML and OAUTH/OIDC based authentication, Active Directory, and role mapping Understanding of common security control solutions for event logging, remote access, endpoint management, and mobile device management Understanding of common data protection technologies such as cryptography, tokenization, and hashing Additional Technical Skills: Understanding of Azure native security services and best practices Strong knowledge of threat modelling and risk assessment technologies or frameworks Non-technical skills: Able to manage ambiguity Collaboration and team skills with a focus on cross-functional collaboration Verbal and written communication skills Should you be interested, please send me a copy of your resume in word format along with the following details ASAP. Full Name: Current Location: Hourly rate on C2C/W2: Work Authorization: Earliest Available date to start: Date and times available to interview: Two Professional References:(Preferably Supervisory references): Kind Regards, Raman Arora Technical Recruiter ZealHire Inc. Email: [email protected] Direct: ( 332) 287 8468 Ext. 112 14 Wall Street 20th Floor | New York, NY 10005 www.zealhire.com Keywords: access management information technology green card wtwo California New York Cyber Security Engineers [email protected] |
[email protected] View all |
Fri Sep 06 23:49:00 UTC 2024 |