Cyber Security Engineer||Onsite at Remote, Remote, USA |
Email: [email protected] |
From: Shiva Chauhan, TEK Inspirations LLC [email protected] Reply to: [email protected] Hello, Hope you are doing well, Please check the below job description and let me know if you have any suitable candidate for the same: Cyber Security Engineer Dallas, TX - Onsite The Sr. Cybersecurity Engineer will be an owner in engineering and architecture level initiatives. They will also need to consult and partner with internal technical staff. This is a hands-on position responsible for helping develop growing enterprise-wide security programs; identifying, and reporting incidents; and leading team initiatives. The perfect candidate will have spent years working with Active Directory, in Windows based environments, and have some basic network security experience. Experience/Qualifications: Strong interest in developing a Cybersecurity/Infosec skillset Deep knowledge of Active Directory and Azure AD Deep knowledge of Azure and Microsoft 365 solutions, including both infrastructure and security components. Deep knowledge of Windows based server networks. Basic understanding of Networks and Network Security (Cisco, Palo Alto, Azure Networks) Dabbled with Linux/Unix (RHEL, Kali) Basic understanding of email systems and mail security (Exchange Online, Mimecast) Basic understanding of system management tools (SCCM, InTune, JAMF) Ability to manage multiple projects simultaneously. Excellent communication and interpersonal skills. Ability to prioritize and organize assignments. Strong verbal and written communication skills. Ability to compartmentalize sensitive information Preferred candidates will have: Microsoft certs, Azure certs, Security , and/or are contemplating CySA , CEH, CISSP. (note, certs are not required) 5 years in a Systems/Network engineer role BS/BA/Associates or relevant field experience Responsibilities: Lead Cybersecurity program level initiatives and related tools' implementation Plan, coordinate and implement security measures to safeguard information in computer files, databases, cloud services, and transmissions against accidental or unauthorized damage, modification or disclosure. Oversee patching and endpoint policy compliance. Monitor vulnerability management and drive remediation efforts. Recommend process and program improvements to enhance organizational security and compliance. Evaluate emerging technologies to meet business requirements. Monitor and enforce security policies and best practices. Develop and enforce Identity Management and Governance policies Maintain compliance and exceptions to information security policies, standards, and procedures. Thanks & Regards, Shiva Chauhan IT Recruiter TEK Inspirations LLC : 13573 Tabasco Cat Trail, Frisco, TX 75035 Email: [email protected] Disclaimer: If you are not interested in receiving our e-mails then please reply with a "REMOVE" in the subject line to [email protected]. And mention all the e-mail addresses to be removed with any e-mail addresses, which might be diverting the e-mails to you. We are sorry for the inconvenience. Keywords: business analyst active directory information technology Texas |
[email protected] View all |
Mon Feb 27 22:00:00 UTC 2023 |