| Urgent | Cybersecurity Architect & Design Engineer | Dallas, TX (Onsite) at Dallas, Texas, USA |
| Email: [email protected] |
|
http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=2234951&uid= Primary skills: Cybersecurity (SOC, Firewall, EDR/DLP, Proxy, WAF,etc) Secondary Skills: IAM/PAM Role: Cybersecurity Architect & Design Engineer Location: Dallas, TX (Onsite) Hands on experience in Design & Architecture of Cybersecurity (SOC, Network Firewall, EDR/DLP,Proxy, PT, Email security) and IAM/PAM/EPM. Cyber Security Architect Roles and Responsibilities 1. Perform architecture design and engineering for the Security Environment, including log monitoring, threat intelligence, anti-virus, encryption and web intrusion prevention, Software and tools used to monitor, scan, test and repair the security of the infrastructure 2. Perform lifecycle engineering of security infrastructure, equipment and software, that are part of, installed on, or used in connection with, the application applicable Security Infrastructure and the processes, tools, infrastructure and other resources necessary and as otherwise required by the Agreement to provide the Security Services 3. Architect, design and engineer a complete security (e.g., cyber security, information security, user security) program that keeps pace with industry best practices and threat levels, including implementation and maintenance of security and threat management and detection tools and processes across the Company IT Environment 4. Provide identity and access management (IAM) program design and engineering services 5. Architect and design capacity planning/analysis as required to meet Companys requirements, including the Service Levels. 6. Develop, document, and maintain security policies, to maintain integrity of the Security Services 7. Architect and engineer Security Services (including Equipment and Software), including anti-virus and anti-malware Software and definitions/signatures, patches, host-based agents, data leak prevention (DLP), web filtering, spam prevention, host-based firewalls, web application firewalls, cloud security products and other monitoring Software, based upon supplier version release keeping the Company IT Environment updated at N release level at all times, subject to Company-approved waivers. 8. Develop controls for security assessments, audits, and internal control testing. 9. Develop information classification parameters within CMDB in accordance with Company security strategies, polices, standards and guidelines. 10. Develop action plan and escalation procedures for any identified potential or real security breaches and reporting of any identified potential or real security breaches 11. Design all Security Infrastructure and cloud security products 12. Design the processes used to manage the introduction of new Security Infrastructure into the Company IT Environment. 13. Provide key leadership and guidance to Company in the development and implementation of security policies as related to the Services. Providing consultative security expertise to Company by making and recommending key decisions in security. 14. Design integration of email filtering solution with Company LDAP/Active Directory for user authentication 15. Provide planning, propose service levels, and draft policy statements 16. Develop standards to maintain compliance within the scope of the Services, which support Companys information security policies; 17. Establish Supplier ISMS standards to managing security risks and improving information security to deliver results in accordance with Companys security requirements and in accordance with Incident Management, Problem Management, Configuration Management, escalation management and Change Management processes 18. Develop a process by which Company may at any time, subject to an agreed upon notification process, perform quality assurance tests (e.g., penetration tests, generating distributed denial of service (DDoS) activities, generating security alarms) of the security processes and security incident response functions by generating security events and monitoring Suppliers response to determine if the appropriate action is taken at each step of the process 19. Maintain all security documentation related to Companys enterprise security architecture for Equipment, Software and networks 20. Support Companys compliance teams with the identification of solutions to meet Companys compliance requirements 21. Develop reporting for audit, compliance and board level meetings as directed by Companys IT leadership Thanks & Regards Adil Musawwir | Technical Recruiter Email: [email protected] Phone: 972 525 9795 Disclaimer: The contents of this e-mail and any attachment(s) are confidential and intended for the named recipient(s) only. E-mail transmission is not guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, destroyed, arrive late or incomplete, or may contain viruses in transmission. The e-mail and its contents (with or without referred errors) shall therefore not attach any liability on the originator or Excelon Solutions LLC or its affiliates. Views or opinions, if any, presented in this email are solely those of the author and may not necessarily reflect the views or opinions of Excelon Solutions LLC or its affiliates. Any form of reproduction, dissemination, copying, disclosure, modification, distribution and / or publication of this message without the prior written consent of authorized representative of Excelon Solutions LLC is strictly prohibited. This communication is intended only for the use of the addressee(s) and contains information that is PRIVILEGED AND CONFIDENTIAL. Unauthorized reading, dissemination, distribution, or copying of this communication is prohibited. -- Keywords: information technology Texas Urgent | Cybersecurity Architect & Design Engineer | Dallas, TX (Onsite) [email protected] http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=2234951&uid= |
| [email protected] View All |
| 12:50 AM 07-Mar-25 |