Home

Hiring : Cloud Security Architect - Remote at Remote, Remote, USA
Email: [email protected]
From:

Sumit Kumar,

Tanisha Systems Inc

[email protected]

Reply to:   [email protected]

Hi,

My name is Sumit, and I am an Technical Recruiter. Tanisha Systems Inc is a global contingency staffing firm servicing. We have an excellent job opportunity with one of our clients.

Cloud Security Architect

Location: Remote

Job discretion:

Skill & Role:

Requires overall understanding of Security services related processes and technologies:

Data Security

Log Indexing and Correlation platform & SIRT

Threat Intelligence & Forensics

Intrusion system

Anti-virus and anti-spyware console

Audit principles and associated compensating controls

Cloud Security

Identity & Access Management

In depth knowledge of Security Architecture design and implementation

Assist the development of security tool requirements, trials, and evaluations, as well as security operations procedures and processes.

Develop and maintain global policies, standards and procedures to include helping to manage our business partners, setting expectations on roles and responsibilities

Assist Client to define Security requirements based upon Business needs and their Information Security Policy

Designing and implementing the security measures needed to protect data stored on public clouds against unauthorized access, including secure authentication methods, encryption, access control lists, intrusion detection systems, firewalls, and other measures

Designing and developing security architectures that align with an organizations strategic goals

Working with security specialists to design new security protocols as needed, then testing them to ensure that they work as intended

Installing and maintaining security software on company servers, computers, and mobile devices used by employees

Analyzing threats to an organizations security and designing solutions to mitigate those threats

Recommending and implementing new security measures as needed to keep data safe

Identifying new security threats and recommending ways to address them

Plans security systems by evaluating network and security technologies

Prepares system security reports by collecting, analyzing, and summarizing data and trends

Knowledge of PCI, ISO 27002 and o security standards and framework

Designs security models, reviews and approves security configuration and installation of Security devices

Analyze, troubleshoot, and investigate security-related, information systems anomalies based on security platform reporting, network traffic, log files, host-based and automated security alerts

Ensure and enforce security controls in the area of Networks and Applications to drive policy compliance and risk mitigation

Controlling and managing access rights to the information system and assets that manage these information repositories

Security-related Incident handling and registration

Assist the development of security tool requirements, trials, and evaluations, as well as security operations procedures and processes

Improving and maintaining secure development standard

Providing standard gap analysis services to internal business and technology partners.      

Ability to seek out vulnerabilities in IT infrastructures

Protects system by defining access privileges, control structures, and resources

Recognizes problems by identifying abnormalities; reporting violations

Implements security improvements by assessing current situation; evaluating trends; anticipating requirements

Determines security violations and inefficiencies by conducting periodic audits

In-depth knowledge of data protection strategies, network and system vulnerabilities; security tool sets including security event management tools

Provide SIRT support as needed in response to information security related events.

Participate in continuous improvement processes

Doing Threat Management by working on different kind of attacks, Malwares, Viruses, web application attack based on OWASP

Maintain and update relevant system and process documentation and develop ad-hoc reports as needed.

Assist the development of security tool requirements, trials, and evaluations, as well as security operations procedures and processes

Monitors industry security updates, technologies and best practices to improve security management

Sumit kumar

Sr.Technical Recruiter, Tanisha Systems Inc

Phone: 212-729-6543 Ext 369| Email:  [email protected] | 

Address: 99 Wood Ave South Suite # 308,Iselin, NJ 08830

Linkedin: https://www.linkedin.com/in/sumit-kumar-6aa1aa20b/

Keywords: access management active directory information technology New Jersey
[email protected]
View all
Mon Feb 27 16:24:00 UTC 2023

To remove this job post send "job_kill 381856" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 0

Location: ,