Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailNot Disclosed
Salary Not Disclosed
1 Vacancy
Dear All
We are looking for two Data Analyst Resources who are based out of Reston Virginia.
These roles are Hybrid Role with 3 Days a week to Reston Office
Data Analyst III
Description:
The Data Encryption Analyst is responsible for implementing a cryptographic inventory process that includes collecting cryptographic configuration settings from network(s) and applications to identify the use of weak settings engage respective asset owners follow-up and track configuration updates.
The Data Encryption Analyst is also responsible for gathering requests for guidance from application teams and working with a cross functional subject matter expert (SMEs) to identify possible solutions and provide guidance.
The person preferably has hands-on experience in configuring TLS including tasks like obtaining a certificate from a trusted CA installing it on the system defining cipher suites and ensuring proper TLS handshake.
Prior experience with encryption key management including implementing policies monitoring compliance and ensuring secure handling of cryptographic materials is preferred.
Required Skills:
2-3 years of experience in collecting encryption configuration settings from a variety of network and application security tools correlate analyze and provide actionable insights.
Strong understanding of cryptographic standards and their use (Encryption Hashing Digital Certificates Digital Signature etc).
Knowledge of data classification encryption and key management.
Experience in working with any of the following tools: ExtraHop Nessus Tenable Wiz Splunk or any other security monitoring tools.
Strong analytical skills using Excel or Power BI and problem-solving skills with attention to detail.
Excellent communication and documentation abilities.
Working experience in cybersecurity data security or data protection operations.
Nice to Have:
Thorough understanding of the Public Key Infrastructure (PKI) secure encryption algorithms modes and the Transport Layer Security (TLS).
Understanding of symmetric and asymmetric encryption and respective use cases.
Familiarity with cryptographic services in AWS Azure and Google Cloud.
Use of scripting languages (e.g. Python) for data manipulation and automation.
Certifications in information security.
Full Time