Security Consultant in Remote at Remote, Remote, USA |
Email: [email protected] |
From: Mahmood Bafana, Technogen INC [email protected] Reply to: [email protected] Hi There, I am Mahmood Bafana Senior Talent Acquisition Specialist with TechnoGenInc, we are looking to hire a Talented Professional with below skill set to work with one of our clients and came across your profile and wondering if you might interested or exploring the job market, if so, Please share me your resume at [email protected] and to know more you can reach out to me directly at +1 571-660-1005 Position: Security Consultant Location: Remote (But only local profiles from KY or FL) Duration: Contract Experience: Required Qualifications Bachelor's degree Critical to have proactive collaboration, open team communication and growth mindset 10 + year experience as technical cyber Security Consultant Hands on experience with handling security incidents/SecOps Experience integrating Cyber Security technologies with existing technologies Experience implementing Cyber Security technologies with enterprise-wide impact Must be passionate about contributing to an organization focused on continuously improving consumer experiences Familiarity working with InTune, MS Defender, CyberArk, Qualys (vulnerability scan), Az MFA, Az security tools, ProofPoint, ZScaler, Google Chronicle, ServiceNow. Preferred Qualifications Master's Degree in Technical Field CISSP or CEH or similar certification Description: The Security Consultant determines Security Consultant requirements by evaluating business strategies and requirements. The Security Consultant work assignments are varied and frequently require interpretation and independent determination of the appropriate courses of action. The Security Consultant plans security systems by evaluating network and security technologies; developing security requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; designs public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as hardware and software; adhering to industry standards. Understands department, segment, and organizational strategy and operating objectives, including their linkages to related areas. Makes decisions regarding own work methods, occasionally in ambiguous situations, and requires minimal direction and receives guidance where needed. Follows established guidelines/procedures. Best Regards, Keywords: access management microsoft Arizona Florida Kentucky Security Consultant in Remote [email protected] |
[email protected] View All |
10:40 PM 28-Feb-25 |