| 100% Remote-- (10 yrs + experience only)Requirement for Security Analyst (State of WA-Requirement) at Remote, Remote, USA |
| Email: [email protected] |
|
http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=2113730&uid= From: srini, plenium corp [email protected] Reply to: [email protected] Pls submit the given details: Copies of degrees/certification : Work visa/status : Email: Phone number: Location: ----------------------------------------------------------------------------------------------------------------------- At least 10 years of Information Security experience in specialized roles such as penetration testing, application development, and application security testing. 7-10 years in software development or IT security related fields. D-12: Security Analyst Resource Qualifications | Ref # | 2. Expert Level Resource Requirements | | 2.a. Mandatory | Vendors proposed Expert Level Resource must have: A Bachelors degree in Computer Science, Information Systems, Engineering, Cybersecurity or a related field. At least 10 years of Information Security experience in specialized roles such as penetration testing, application development, and application security testing. 7-10 years in software development or IT security related fields. 3-5 years of experience as a Cloud Security architect or related position. Formal education in Computer Science, Information Systems, Engineering, Cybersecurity or a related field can be substituted for the following years of experience: . Masters degree 1 year | Does the Vendor meet these requirements Select Yes or NO Describe how Vendor meets these requirements: | 2.b. Mandatory | Vendors proposed Expert Level Resource must have demonstrated experience in the following: Strong understanding of cloud computing technologies including, Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Proficient in designing security controls, security tools needs/assessment and technology services. Experience working with containerized and micro architecture platform as per the industry best practices. Excellent understanding of securing SDLC, architecture design and IT operations, and integrating application security into CI/CD pipeline. Experience performing application security code and roles matrix review and practical risk assessments. | D-12: Security Analyst Resource Qualifications | Ref # | 2. Expert Level Resource Requirements | | | Experience working with threat modeling frameworks (e.g., STRIDE, MITRE ATT&CK, etc.). Experience with common vulnerability management process including scanning, analyzing, reporting, remediation planning and tracking. Experience working with application security testing tools such as dynamic application security testing, static application security testing, mobile application security testing, source code analysis, vulnerability management. Experience with common networking tools (e.g., Wireshark, tcpdump, netcat). Experience with security incident or breach investigation and development of strategies to respond to and recover from an incident or breach. Familiar with application vulnerability/security frameworks and standards such as OWASP, SANS, CVE, CWS, CVSS, etc. | Does the Vendor meet these requirements Select Yes or NO Describe how Vendor meets these requirements: | 2.c. Desired | Its desirable for Vendors proposed Expert Level Resource to have: Experience in a Health Exchange or its partners would be a plus. CompTia Security+, CISSP or other industry recognized certifications. Experience with administering serverless, cloud-based enterprise applications and environments. Experience and general understanding of object-oriented coding (Java, Python, .Net, etc.). Understanding of core Internet protocols and routing (e.g., DNS, HTTP, HTTPS, TCP/IP, UDP, IPSEC, routing protocols, etc.). Operational understanding of cryptography fundamentals (e.g., SSL/TLS, password security, filesystem encryption, etc.). Good understanding of security information and event management tools. Excellent understanding of emerging cybersecurity threats. | Does the Vendor meet these desirables Select Yes or NO Describe how Vendor meets these desirables: | 2.d. Desired | Its desirable for Vendors proposed Expert Level Resource to have experience with the following Software and Services: Cloudflare Azure Sentinel Tenable Nessus Rapid7 AppSec, Insight Vulnerability Management BurpSuite Ostorlab | D-12: Security Analyst Resource Qualifications | Ref # | 2. Expert Level Resource Requirements | Not bidding | | Microsoft Defender RecordedFuture KnowBe4 Microsoft Purview Microsoft Threat Model Jira Confluence SolarWinds Orion Power GitHub GitHub Advanced Security SolarWinds ServiceDesk SQL Server Studio Postman | Does the Vendor meet these desirables Select Yes or NO Describe how Vendor meets these desirables: | Thanks & Regards, Srini Director, Recruiting Phone: 301 578 5789 | Fax: 206-203-3731 [email protected] | Silver Spring, MD _______________________________________ Plenium America | www.plenium.com Talent Acquisition | IT Consulting | Software Development Equal Opportunity Employer | E-Verified Company | Teamwork | Ethics | Efficiency | Talent | Hard work Keywords: continuous integration continuous deployment information technology Maryland 100% Remote-- (10 yrs + experience only)Requirement for Security Analyst (State of WA-Requirement) [email protected] http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=2113730&uid= |
| [email protected] View All |
| 08:12 AM 27-Jan-25 |