| Urgent Hiring || SECURITY ARCHITECT || WAUKEGAN, IL (Hybrid) || & ONLY at Waukegan, Illinois, USA |
| Email: [email protected] |
|
http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=536271&uid= From: Steve Lee, GVD SYSTEMS LLC [email protected] Reply to: [email protected] Job Title: SECURITY ARCHITECT Location: WAUKEGAN, IL (Hybrid) Duration: 3+ Months 2 rounds of MS Teams interviews Note: TO CONDUCT SECURITY ARCHITECTURE ALIGNMENT FOR PRIVILEGED ACCESS MANAGEMENT AND MICROSOFT 365 E5. EXCELLENT COMMUNICATION SKILLS. Stage 1. Privileged Access Management Assessment and Roadmap: Conduct a review of the current PAM Systems: o Review the current privileged access management systems being used, the type of access controls in place, and the effectiveness of these systems in securing privileged access. o Review the processes for granting, changing, and revoking privileged access to ensure they follow best practices in secure access management. o Review the procedures for handling privileged access requests, including urgency procedures, and incident response procedures in case of a security breach involving privileged access. o Review compliance with relevant industry standards, regulations, and laws concerning privileged access management, such as GDPR, ISO 27001, PCI-DSS, and HIPAA. o Examine the roles and responsibilities of individuals with privileged access, their level of training, and their awareness of security risks and preventive measures. Conduct Gap Analysis and Risk Assessment: o Identify and evaluate potential risks associated with the organization's current privileged access management policies, systems, and practices. o Identify areas with business and technological gaps, assess the risk levels, and recommend mitigation approaches Develop recommendations for improvement: o Develop a set of recommendations to improve the Privileged Access Management posture at Uline. o Create a prioritized list of initiatives for applying these recommendations and the proposed timeline for their implementation Stage 2. M365 E5 Security Assessment and Roadmap: Review current security architecture, standards, and tools: o Review current state documentation for security architecture, standards, processes, and procedures o Conduct interviews with individual SMEs. o Review the business and technical requirements, software products and tools, their licensing and renewal cycles, architecture patterns, and other relevant information in a summary format Review the E5 alignment roadmap and future state: o Assess security software available to the company as part of the E5 license. o Conduct analysis of security features and functionality available under the E5 license for applicability to the company environment, business, and technical requirements, including both on-premises and cloud environments. o Review the areas of overlapping or complementary use with current security portfolio. o Review the opportunities for improving security posture while maximizing the benefits provided by security tools, features, and functionality available under the E5 license. Develop an E5 security implementation roadmap: o Review recommendations for the optimal introduction of security tools included in E5 license. o Review the prioritized roadmap for E5 security implementation o Conduct an executive readout of the recommendations and the roadmap and identify the next steps. Keywords: card microsoft Illinois http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=536271&uid= |
| [email protected] View All |
| 12:36 AM 17-Aug-23 |