Cybersecurity Sr. Lead / Architect at Frisco, TX or Seattle, WA Remote at Frisco, Texas, USA |
Email: [email protected] |
Cybersecurity Sr. Lead / Architect at Frisco, TX or Seattle, WA Remote Your Headline: Focused and to the point Hi, Hope you are doing well Job title: -Cybersecurity Sr. Lead / Architect Location: - Remote / Frisco, TX Your Headline: Focused and to the point Hi, Hope you are doing well Job title: -Cybersecurity Sr. Lead / Architect Location: - Remote / Frisco, TX or Seattle, WA Rate:-$70/hr mandatory skills set Azure Sentinel, SIEM, SOAR, SOC, Defender, Threat Management are MUST SKILLS Designing & implementing preventive security, Defender policies Implementing threat-hunting & threat-management using Sentinel, ADX, LogAnalytics Azure Sentinel is a MUST Enable Threat Problem Management Azure sentinel Automation Deployment Can runbooks in Azure CUSTOMER platform of choice for most of SIEM/SOAR capability development is Azure; hence that is the area of expertise we will be interested in. Looking for someone who can help develop our threat detection and threat management capabilities for our cloud landscape (Azure, AWS, GCP). This person should be able to lead design and development of threat detection/hunting solutions, threat management solutions and cloud-provider-native features/products. This person should be able to guide and enable team to deliver on preventative security and pre-emptive mitigations. This person will need to be hands-on with actual experience building and operating threat-detection & threat-management practice in a production environment. Designing & implementing preventive security, Defender policies Implementing threat-hunting & threat-management using Sentinel, ADX, LogAnalytics Designing & implementing and operating security incident management process & platform as part of threat management Designing & implementing preventative policies, runbooks/SOPs for resolution, automated resolution framework, and enforcement solutions Enable Threat Problem Management: Aligning other parts of security domain (IDM, IAM, Data security, etc.) with detected/discovered threats or security incidents to ensure shift-left in threat management. o Designing & implementing infra-authentication & authorization, infrastructure automation (infra-as-code, gitops), config management o Designing & implementing policies for data encryption, data access, DB logging, data retention o Designing & implementing for secrets & key management, auto log enablement, log aggregation for DLP/SIEM Best Regards Rahul Kumar Senior Technical Recruiter Email id: [email protected] www.thecroxgroup.com 2023 Milpitas, CA 95035 | New York Web Version Preferences Forward Powered by Mad Mimi A GoDaddy company Keywords: database California Idaho Texas Washington |
[email protected] View all |
Tue Aug 29 20:43:00 UTC 2023 |