Home

Urgent Hiring || SECURITY ARCHITECT || WAUKEGAN, IL (Hybrid) || & ONLY at Waukegan, Illinois, USA
Email: [email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=536271&uid=

From:

Steve Lee,

GVD SYSTEMS LLC

[email protected]

Reply to: [email protected]

Job Title: SECURITY ARCHITECT

Location: WAUKEGAN, IL (Hybrid)

Duration: 3+ Months

2 rounds of MS Teams interviews

Note:

TO CONDUCT SECURITY ARCHITECTURE ALIGNMENT FOR PRIVILEGED ACCESS MANAGEMENT AND MICROSOFT 365 E5.

EXCELLENT COMMUNICATION SKILLS.

Stage 1. Privileged Access Management Assessment and Roadmap:

Conduct a review of the current PAM Systems:

o Review the current privileged access management systems being used, the type of access controls in place, and the effectiveness of these systems in securing privileged access.

o Review the processes for granting, changing, and revoking privileged access to ensure they follow best practices in secure access management.

o Review the procedures for handling privileged access requests, including urgency procedures, and incident response procedures in case of a security breach involving privileged access.

o Review compliance with relevant industry standards, regulations, and laws concerning privileged access management, such as GDPR, ISO 27001, PCI-DSS, and HIPAA.

o Examine the roles and responsibilities of individuals with privileged access, their level of training, and their awareness of security risks and preventive measures.

Conduct Gap Analysis and Risk Assessment:

o Identify and evaluate potential risks associated with the organization's current privileged access management policies, systems, and practices.

o Identify areas with business and technological gaps, assess the risk levels, and recommend mitigation approaches

Develop recommendations for improvement:

o Develop a set of recommendations to improve the Privileged Access Management posture at Uline.

o Create a prioritized list of initiatives for applying these recommendations and the proposed timeline for their implementation

Stage 2. M365 E5 Security Assessment and Roadmap:

Review current security architecture, standards, and tools:

o Review current state documentation for security architecture, standards, processes, and procedures

o Conduct interviews with individual SMEs.

o Review the business and technical requirements, software products and tools, their licensing and renewal cycles, architecture patterns, and other relevant information in a summary format

Review the E5 alignment roadmap and future state:

o Assess security software available to the company as part of the E5 license.

o Conduct analysis of security features and functionality available under the E5 license for applicability to the company environment, business, and technical requirements, including both on-premises and cloud environments.

o Review the areas of overlapping or complementary use with current security portfolio.

o Review the opportunities for improving security posture while maximizing the benefits provided by security tools, features, and functionality available under the E5 license.

Develop an E5 security implementation roadmap:

o Review recommendations for the optimal introduction of security tools included in E5 license.

o Review the prioritized roadmap for E5 security implementation

o Conduct an executive readout of the recommendations and the roadmap and identify the next steps.

Keywords: card microsoft Illinois
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=536271&uid=
[email protected]
View All
12:36 AM 17-Aug-23


To remove this job post send "job_kill 536271" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.

Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]


Time Taken: 9

Location: Waukegan, Illinois