Home

Sr. Security Engineer. at Remote, Remote, USA
Email: [email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=3066581&uid=90e2ea24781c4934a917f63dc5cc860a

From:

sumit kumar,

vizon

[email protected]

Reply to: [email protected]

Job Description -Please read the job description and please pay attention to the bolded red and highlighted blue . Candidates must be in state as In Person Interviews for 2nd round .. Also, you make sure they candidates are sending the correct e-mail and not just a work related e-mail. Send me your Top candidate and if they do not have all of the red do not send. Also make sure you read the job description and do not just go off the title please . Personal email through which they are using Netflix or prime!Additional Job Information:Title: Sr. Security Engineer.

Location: Atlanta
Onsite Flexibility: Hybrid in the office 3 days a week Legal First Name: Legal Last Name: Available Date:
Middle Initial:
Date of Birth (mmddyr):
SSN (last 4):
Gender:
Ethnicity:
Veteran:
Currently military spouse: Disability: Qualifications:Top 5 skills are as follows: Microsoft IntuneMicrosoft BitLocker AdministratorMicrosoft PurviewMicrosoft 365Microsoft Azure Are you seeking to work on a team of professionals protecting one of the worlds largest global air lines As a Data Protection Engineer at Delta Air Lines youll be collaborating with multiple teams to support data protection. Youll have the opportunity to contribute to an expanding Data Protection program and assist in implementing best practices. As a Data Protection Engineer, you will implement solutions to help safeguard Deltas most sensitive data. You will be responsible for architecting, implementing, documenting, and maintaining Data Protection technologies such as BitLocker endpoint encryption. The Data Protection team seeks a self-motivated, flexible individual who is always looking for a way to improve and protect our environment. Your Responsibilities in this Role: Lead the implementation and migration to Microsoft Intune at an enterprise scale. Design and implement security policies and configurations for device management with Microsoft Intune. Recommend best practices and test new features of the product. Provide training and support to partner teams and end users on new security features. Collaborate with business partners who could benefit from the new tools, assisting with implementing new use cases. Continuously monitor and optimize the performance and security of the solution. Administer data protection tools including patching, upgrading, troubleshooting, testing and report generation. Develop new policies using regex, machine learning, fingerprinting, and/or dictionaries to monitor unique data types. Review existing deployment architecture, engineering, and policies and assess overall deployment against best practices. Evaluate and build new data protection solutions in alignment with cloud requirements. Operationalize these solutions to deliver value to the business. Implement protective controls in the cloud to ensure the confidentiality, integrity, and availability of data. What are We Looking for At least 3 years of experience working with Microsoft 365 technologies including Microsoft Intune and Microsoft Purview. Experience administering Microsoft BitLocker Administration and Monitoring (MBAM) solution. Strong technical knowledge of secure architectures, system policies, rules, etc. Experience with designing and automating data protection strategies for cloud environments. Familiar with securing structured and unstructured data. Experience working with Data Loss Prevention (DLP) solutions. Experience managing Cloud Access Security Broker (CASB) solutions. Experience with deploying and managing data classification solutions. Experience with managing devices using policies in Microsoft Intune. Understanding of regulatory structures such as PCI and GDPR. Creative and adaptive work ethic, with a strong customer-oriented attitude. Responsibilities:Responsible for the design, testing, evaluation, implementation, support, management, and deployment of security systems/devices used to safeguard the organizations information assets. Also responsible for analyzing the information security environment and assisting with the development of security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure. '-Works with the technical team to recover data after a security breach. -Configures and installs firewalls and intrusion detection systems. -Develops automation scripts to handle and track incidents. -Investigates intrusion incidents, conducts forensic investigations and mounts incident responses. -Delivers technical reports and formal papers on test findings. -Installs firewalls, data encryption, and other security measures. -Maintains access by providing information, resources, and technical support. -Ensures authorized access by investigating improper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements. -Updates job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations. -Accomplishes information systems and organization mission by completing related results as needed. '-Builds, deploys, and tracks security measurements for computer systems and networks. -Mitigates security vulnerabilities by implementing applicable solutions and tools. -Performs vulnerability testing, risk analyses, and security assessments. -Collaborates with colleagues on authentication, authorization, and encryption solutions. -Tests security solutions using industry standard analysis criteria. -Responds to information security issues during each stage of a projects lifecycle. -Performs risk assessments and testing of data processing systems. -Establishes system controls by developing framework for controls and levels of access; recommending improvements-Establishes computer and terminal physical security by developing standards, policies, and procedures; coordinates with facilities security; recommends improvements. -Safeguards computer files by performing regular backups; developing procedures for source code management and disaster preparedness; recommends improvements. '-Determines the sensitivity of the data in order to recommend the appropriate security needs. -Develops proposals for, and consider cost effective equipment options to satisfy security needs. -Communicates with the technical team, management team and users companywide if data security is breached. -Designs infrastructure to alert the technical team of detected vulnerabilities. -Evaluates new technologies and processes that enhance security capabilities. -Supervises changes in software, hardware, facilities, telecommunications and user needs. -Defines, implements, and maintains corporate security policies. -Analyzes and advises on new security technologies and program conformance. -Creates, tests, and implements network disaster recovery plans. -Recommends security enhancements and purchases. -Trains staff on network and information security procedures. -Develops security awareness by providing orientation, educational programs, and on-going communication. -Recommends modifications in legal, technical and regulatory areas that affect IT security.

Keywords: information technology golang
Sr. Security Engineer.
[email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=3066581&uid=90e2ea24781c4934a917f63dc5cc860a
[email protected]
View All
02:35 AM 21-Jan-26


To remove this job post send "job_kill 3066581" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.

Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]


Time Taken: 0

Location: ,