Hi, One of my Direct Clients is looking for Candidates as per below Job Description. Hence please go through the Job Description given below and let me know your Interest/Opinion with your Updated Resume and connect with me over a Phone Call for our Quick Discussion; if in case, you are not Available and Interested in this Job Role, then your Valuable References would highly be appreciated. JOB DESCRIPTION: JOB TITLE – INFORMATION SECURITY ENGINEER @ REMOTE JOB LOCATION – Denver, CO, USA TYPE OF JOB/EMPLOYMENT – C2C Job Role & C2C Job Role. TYPE OF JOB JOINING – Urgent/Immediate. MUST HAVE/S: - CORE OR SOLID CYBER SECURITY BACKGROUND, Strong All kind of Security & Cloud-Based Access & Solutions Skills, Cloud Computing & Web-Database Solutions & Technologies.
- Cloud Provider Environments; AWS, GCP, OCP, Azure, API. Knowledge of KPIs & Metrics Reporting, Cloud-Security, Platforms & Services. Technical Specifications for Procurement & Implementation of Security Appliances & Software Products.
- Security Coding, Scripting, Multi-Domain Security (SME), Network Concepts, Cloud Computing & Core Infrastructure.
- Deep Knowledge of All Security-Related Technologies & Automations.
- Strong 4+ years working experience in same domain & a Bachelor’s degree is a Must.
Skills & Requirements: Information Security Engineer Do you have technical skills in IT security and a commitment for keeping current with infosec trends? Would you like to work for a truly global organization? Join us as an Cloud Security Engineer. Better requires process, discipline, and simplification We will be looking to you to implement, deploy, and maintain security access solutions and update current identity and security access solutions to include cloud-based solutions. You will research and design security solutions for new technologies across all platforms and environments. You will investigate changes/updates in current security solutions as well as the Cyber security industry and implement best practices in design and delivery. You’ll write technical specifications for procurement and implementation of security appliances and software products. You will write and review policies/procedures for audit and regulatory compliance and recommend procedural changes to enhance the security team. You will identify opportunities to automate/streamline current processes. You’ll provide input for Key Performance Indicators (KPIs) and Metrics reporting. You will participate in audit support activities, as they pertain to Cyber Security and Identity & Access Management for both internal and external audits. You will troubleshoot and resolve security system access issues and answer general inquiries regarding information security practice or security access. You’ll execute scans and reports related to vulnerability and configuration management and participate in IR exercises. For this role, you will bring 2+ years of experience in cybersecurity with a focus on cloud security in an enterprise setting. You’ll have a background as a cloud security engineer or other closely related security engineering role, and strong experience with cloud security, platforms, and services. You’ll have a working knowledge of cloud-native security products and tools in major cloud providers (AWS, GCP, others). Intermediate dev-ops/continuous delivery and automation expertise to manage the transition to DevSecOps. You will have a very strong understanding of networking concepts with an emphasis on security-related technologies, and experience designing and implementing cloud-based security technologies – including but not limited to cloud design, container security, Web & Database protections, IAM protections, Data Protection, log management and alerting, and API security. 1. The Cloud Security Engineer will be responsible for designing, implementing, securing, maintaining, and continuously improving cloud-based systems and networks. They will be responsible for the operations of secure cloud infrastructure, the security platforms and software across a variety of domains and environments. They will install, maintain and upgrade the organization’s cloud computing environment and core infrastructure. 2. Implement, deploy, and maintain security access solutions and update current identity and security access solutions to include the cloud-based solutions. 3. Research and design security solutions for new technologies across all platforms and environments. 4. Investigate changes/updates in current security solutions as well as the Cyber security industry and implement best practices in design and delivery. 5. Answer general inquiries regarding information security practice or security access. 6. Write technical specifications for procurement and implementation of security appliances and software products. 7. Perform required activities to resolve open audit issues. 8. Provide input for Key Performance Indicators (KPIs) and Metrics reporting. 9. Write and review policies/procedures for audit and regulatory compliance, as necessary. 10. Recommend procedural changes to enhance the Security Team. Identify opportunities to automate or streamline current processes. 11. Troubleshoot and resolve security system access issues. Execute scans and reports related to vulnerability and configuration management. Participate in IR exercises. Participate in API security initiatives. Develop security related automation. Bachelor’s degree and four years of experience in Information Technology/Information Services, work. Experience granting role-based access within applications and enforcing a least privilege model. Candidate needs experience in securing, implementing, managing and maintaining solutions in one of the following cloud provider environments: AWS, GCP, OCI or Azure. Understanding of best practices on how to secure those environments as well as staying up with the latest trends and risks to cloud platforms. Proficiency in secure coding/scripting and automation. Desire to grow as a multi-domain security SME. Familiarity with IT Audit lifecycle and frameworks. Familiarity with multiple operating systems and various hardening techniques. Understanding Change Control Practices and experience in building solutions in lab/dev environments, producing test cases, etc. Intermediate understanding of Linux and Windows. Strong understanding of cloud computing concepts. Familiarity with various cybersecurity techniques and principles, such as forensics, threat hunting, penetration testing, threat intelligence, Federated Identity Management, and/or data loss prevention. |