Cloud Security Engineer at Malvern, Pennsylvania, USA |
Email: [email protected] |
From: vivek, vyzeinc [email protected] Reply to: [email protected] Title: Cloud Engineer or Cloud Security Engineer Duration: 12+ Months Contract Location: Malvern PA - Hybrid Role - 3 days Onsite and 2 days remote - MUST ------- Manager notes Please find more info from the Manager. weve struggling to find someone sharp, To help us cast a wider net, we wanted to try tweaking our search criteria with the hope of getting someone with great critical thinking and learning agility hoping theyll close any knowledge & experience gaps quickly on the job. Lets try 2 changes: Lets drop the hard requirement for EKS/Kubernetes/K8/AKS experience and downgrade it to just some container/docker exposure. If they have EKS great, its a bonus In addition to the current Vulnerability Mgmt Analyst profile that youre searching on, could you also send us candidates that might match either of these 2 additional profiles (so any of the 3 profiles might work) Cloud Engineer or Cloud Security Engineer DevSecOps SME with cloud experience ------- Responsibilities Provide vulnerability management and secure configuration baseline management oversight and governance for Infosys VM/SCM programs. Adjudicate risk-acceptance ("exception") requests and false positive requests, review VM metrics, shape and govern based on trends being presented to us by Infosys Qualifications Looking for strong AWS experience and security experience - Vulnerability Management, Security Assurance, Cloud Security Engineering, or DevSecOps 1. Working knowledge of security risk oversight, CVSS (Common Vulnerability Scoring System), CVE (Common Vulnerabilities and Exposures), and technical security vulnerability remediation/mitigation 2. Practical experience analyzing cloud infrastructure vulnerability data to understand and communicate risks, concerns and outcomes of decisions 3. Extensive experience working with AWS EC2s (or Azure VMs), as well as Container (Kubernetes / EKS) and image security scanning 4. Preferred knowledge of cloud infrastructure hardening such as validating EC2 Operating Systems against CIS benchmarks, or detecting security misconfigurations with EKS deployments Keywords: information technology Pennsylvania |
[email protected] View all |
Fri Dec 15 01:29:00 UTC 2023 |