Your Life As a Maven:
Configure, implement, document and manage security tools including network security, end-point security, SIEM, DLP, IRM, vulnerability assessment, email, security awareness and training, patch management and IAM solutions
Perform system hardening guidelines for hardware, network and systems software and conduct assessments for gaps.
Research new tools and technologies as requested, evaluate options and provide recommendations.
Perform security investigations and document the findings and recommendations for complex incidents, determining the cause of the security incident, resolution and preserving forensic evidence as needed.
Support third-party audits for SSAE16, SOC 2, ISO 27001, HIPAA, FedRAMP, and other customer-led assessments.
Work with stakeholders to define and drive continuous improvements in security policies, procedures, and technical controls.
Conduct security risk assessment and vulnerability assessments for identified areas and applications and guide stakeholders for remediation of identified risks and vulnerabilities.
Your Expertise:
Bachelor or Masters’s degree in computer science or equivalent.
3 years of deep experience with cybersecurity architecture and engineering.
Knowledge of Google Cloud, AWS, Azure and SaaS environments
Knowledge of networking protocols and technologies and network security architecture and engineering.
In-depth knowledge and experience with end-point security, SIEM, DLP, IRM, vulnerability assessment and patch management solutions.
In-depth understanding of risk and vulnerability mitigation.
Versed in common/emerging attack vectors (such as malware, ransomware, cryptojacking, DOS, etc) and how to protect systems from these attacks.
Knowledge of security standards and guidelines from NIST, CSA and ISO
Hands-on administrative experience with windows server, linux, oracle DB and SQL/Server technologies
Basic knowledge of ITIL methodologies
Basic knowledge and understanding of programming languages (i.e. Java, .Net)
Analytical and problem-solving skills
Ability to prioritize and multi-task to achieve competing goals and target dates
Excellent communication skills
Willingness to learn and improve
Nice to have skills:
Certifications in IT security e.g., CISSP, CISM, CCSP
Good understanding of data privacy and GDPR regulations
Experience with identity and access management and privileged access management
Experience with active directory and group policy management
Experience with Microsoft Azure, Amazon AWS and Google cloud technologies
Your X-Factor:
Aptitude – You have an innate capacity to transition from project to project without skipping a beat.
Communication – You have excellent written and verbal communication skills for coordination across projects and teams.
Impact – You are a critical thinker with an emphasis on creativity and innovation.
Passion – You have the drive to succeed paired with a continuous hunger to learn.
Leadership – You are trusted, empathetic, accountable, and empower others around you.
,
Tagged as: active directory, computer hardware, computer science, customer relations, data privacy, it security, it services, microsoft access, microsoft azure, network security, patch management, problem solving, risk assessment, security risk, security tools, windows server