Opening for Cybersecurity Architect in Remote at Remote at Remote, Remote, USA |
Email: [email protected] |
Hi, I hope you are doing well, A brief version of the job description is attached below, if you are interested revert to my mail with your updated resume Role: Cybersecurity Architect Location: Remote Duration: Long Term Rate: $80 to 85/hr on C2C Need PP number No opt and Cpt and h1t visas GC Must : They need a Security Architect with end point security experience who need identify the security gap and need to recommend seniors to fix the issues and need to be in application security is must. Mandatory Areas Must Have Skills Cyber Security : 10+ Years Java, frameworks, python, Nodejs : 5+ Years Threat Modelling like STRIDE, PASTA, TRIKE, ATTACK TREE, DREAD, KILL CHAIN, CAPEC : 5+ Years SSL: 8+ Years Firewall policy design: 5+ Years vulnerability analysis & mitigation: 5+ Years Understanding load balancers (ex A10, F5), firewalls (ex CheckPoint), Venafi, MDM (ex - Mobile Iron), Cloud (ex - AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex - Damballa), Privileged Accounts (ex CyberArk), SIEM (ex ArcSight), Log & Event (ex Splunk), Intrusion IDS/IPS (ex Symantec): 5+ Years Cloud Platform (ex PCF, Docker), Scanning (ex Qualys), AppSec (ex - Veracode): 5+ Years Job Description: This position serves as a subject matter expert which drives vision and results to enhance security posture within mobile device, IoT device, enterprise line of business applications, cloud, big data, and core and carrier network technologies as well as and other business units as needed as well as act as a Principal security advisor to cross-functional teams for the successful delivery of projects or services to enterprise customers. Leads information security review of new technologies, designs, and remediation planning efforts. Collaborates with Engineering & Operations Teams to address security vulnerabilities found via PSIRTs, scans or breaches Investigates and/or leads identifying security needs & recommends plans/resolutions. Implements, tests & monitors info security improvements. Significant experience with the analysis of underlying technologies that form the solution necessary for the application of threat identification, analysis, and thread model design. The threat model depicts trust boundary, threat agent(s), threat vector(s), and safeguard(s) necessary to protect person, asset, data, and brand. Significant experience with implementation of various threat modelling approaches pertaining to one or more of the following STRIDE, PASTA, TRIKE, ATTACK TREE, DREAD, KILL CHAIN, CAPEC, Mobile Application threat model, Cyber Threat Tree, and data flow diagram Subject matter expert in multiple facets of network & information security, including Firewall policy design, SSL Certificate management, vulnerability analysis & mitigation, and other topics as assigned. Advanced understanding of IP/Security solutions & technologies applicable to the Wireless Network Architecture. Subject matter expert in all facets of network & information security, including Firewall policy design, SSL Certificate management, vulnerability analysis & mitigation, and other topics as assigned. Ability to create technical specification and requirements and work independently and with no direction/supervision. Able to quickly adapt to new or evolving technologies related to new product & services requiring validation or research. Strong verbal and communication skills with diverse cross functional groups. Ability to present advanced concepts to leadership, peers, and others in subordinate roles. Understanding load balancers (ex A10, F5), firewalls (ex CheckPoint), Venafi, MDM (ex - Mobile Iron), Cloud (ex - AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex - Damballa), Privileged Accounts (ex CyberArk), SIEM (ex ArcSight), Log & Event (ex Splunk), Intrusion IDS/IPS (ex Symantec), Cloud Platform (ex PCF, Docker), Scanning (ex Qualys), AppSec (ex - Veracode) Advance knowledge of Scripting tools (Python/Perl//HTML/PHP) Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI Working knowledge of web application development, RESTful APIs, and skills in Java, frameworks, python, Nodejs. Experience with mobile applications, and handset security. Principal Cybersecurity Engineer Principal Cybersecurity Engineer will help ensure that clients software, systems and infrastructure are designed and implemented to the highest security standards. Performs technical security assessments, code reviews and vulnerability testing to highlight risk and remediate associated findings while helping client teams and partners improve security. Works closely with other client Engineers to design and build proactive methods to enhance our security posture. This position serves as a subject matter expert which drives vision and results to enhance security posture within mobile device, IoT device, enterprise line of business applications, cloud, big data, and core and carrier network technologies as well as and other business units as needed as well as act as a Principal security advisor to cross-functional teams for the successful delivery of projects or services to enterprise customers. Leads information security review of new technologies, designs, and remediation planning efforts. Collaborates with Engineering & Operations Teams to address security vulnerabilities found via PSIRTs, scans or breaches Investigates and/or leads identifying security needs & recommends plans/resolutions. Implements, tests & monitors info security improvements. Significant experience with the analysis of underlying technologies that form the solution necessary for the application of threat identification,analysis, and thread model design. The threat model depicts trust boundary, threat agent(s), threat vector(s), and safeguard(s) necessary to protect person, asset, data, and brand. Significant experience with implementation of various threat modeling approaches pertaining to one or more of the following STRIDE, PASTA, TRIKE, ATTACK TREE, DREAD, KILL CHAIN, CAPEC, Mobile Application threat model, Cyber Threat Tree, and data flow diagram Subject matter expert in multiple facets of network & information security, including Firewall policy design, SSL Certificate management, vulnerability analysis & mitigation, and other topics as assigned. Advanced understanding of IP/Security solutions & technologies applicable to the Wireless Network Architecture. Subject matter expert in all facets of network & information security, including Firewall policy design, SSL Certificate management, vulnerability analysis & mitigation, and other topics as assigned. Ability to create technical specification and requirements and work independently and with no direction/supervision. Able to quickly adapt to new or evolving technologies related to new product & services requiring validation or research. Strong verbal and communication skills with diverse cross functional groups. Ability to present advanced concepts to leadership, peers, and others in subordinate roles. Understanding load balancers (ex - A10, F5), firewalls (ex - CheckPoint), Venafi, MDM (ex - Mobile Iron), Cloud (ex - AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex - Damballa), Privileged Accounts (ex - CyberArk), SIEM (ex - ArcSight), Log & Event (ex - Splunk), Intrusion IDS/IPS (ex - Symantec), Cloud Platform (ex - PCF, Docker), Scanning (ex - Qualys), AppSec (ex - Veracode) Advance knowledge of Scripting tools (Python/Perl//HTML/PHP) Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI Working knowledge of web application development, RESTful APIs, and skills in Java, frameworks, python, Nodejs. Experience with mobile applications, and handset security. -- Keywords: information technology ffive green card Opening for Cybersecurity Architect in Remote at Remote [email protected] |
[email protected] View All |
02:14 AM 04-Mar-25 |