drjobs IT Security Engineering Advisor Sr

IT Security Engineering Advisor Sr

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Memphis, TN - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Key Responsibilities:

Assess and analyze legacy VM-based applications to determine containerization readiness and approach.

Design and implement Docker container definitions and Kubernetes manifests for legacy apps.

Refactor and package applications for deployment in Azure Kubernetes Service (AKS) AWS ECS or Azure Container Apps.

Collaborate with Cloud Architecture and Application teams to understand dependencies configuration and runtime behaviors.

Set up container registries image versioning and secure container execution.

Assist with integration of new workloads into existing Terraform-based infrastructure as code (nice to have).

Document containerization workflows migration steps and operational runbooks.

Ensure container deployments follow best practices in security observability and scalability.

Required Skills & Experience:

4 years of experience in Cloud Infrastructure or DevOps roles.

Strong hands-on experience with Docker and containerizing legacy applications.

Proficiency in deploying and managing workloads in Azure or AWS (at least one required). Preference to AWS.

Experience with Kubernetes or managed services like AKS ECS or Azure Container Apps.

Understanding of CI/CD workflows and build pipelines.

Familiarity with networking and storage considerations in cloud-native deployments.

Excellent troubleshooting and debugging skills.

Nice to Have:

Exposure to Terraform ARM Templates AWS Cloud Formation tools and infrastructure-as-code methodologies.

Experience with container observability tools (e.g. Prometheus Azure Monitor CloudWatch).

Knowledge of application modernization strategies.

Familiarity with Agile workflows and ServiceNow task tracking.

Soft Skills:

Self-starter with the ability to work independently and manage priorities.

Clear communicator especially in cross-functional settings.

Comfort working in a globally distributed team and documenting work clearly.

PRIMARY PURPOSE: To manage the implementation of security measures to protect company data networks and computer systems. To focus on executing security fundamentals for threat detection investigation and response efforts.

ESSENTIAL FUNCTIONS and RESPONSIBILITIES Engineers implements and monitors security measures for the protection of computer systems networks and information. Identifies and defines system security requirements. Designs computer security architecture and develops detailed cyber security designs. Prepares and documents standard operating procedures and protocols. Configures and troubleshoots security infrastructure devices. Develops technical solutions and new security tools to assist in mitigating security vulnerabilities and automating repeatable tasks. Leads IT groups and business units as necessary in troubleshooting compatibility issues between security tools and business or productivity programs. Performs analysis of suspected malicious code and other software or programs and provides written or verbal analysis to management. Analyzes client and customer needs as required and provides clear and concise reports to leadership. Works closely with management on assigned projects from inception through implementation ensuring adequate internal communication and user involvement is maintained.

ADDITIONAL FUNCTIONS and RESPONSIBILITIES Performs other duties as assigned. Supports the organizations quality program(s). Travels as required.

QUALIFICATIONS Education & Licensing Bachelors degree in Information Systems computer science or related technology field from an accredited college or university preferred. Related technical institute certification preferred. Experience Eight (8) years of encryption technologies/algorithms digital forensics network topologies and access controls experience or equivalent combination of educated and experience required.

Skills & Knowledge

Knowledge of TCP/IP services Knowledge of audit and compliance

Knowledge of vulnerability management

Knowledge of penetration testing

Knowledge of various operating systems

Knowledge of desktop productivity software

Knowledge of Carbon Black Protection

Knowledge of Symantec Endpoint Protection and host data loss prevention

Knowledge of information technology security frameworks

Excellent oral and written communication skills including presentation skills

PC literate including Microsoft Office products

Analytical and interpretive skills

Strong organizational skills

Excellent interpersonal skills Ability to create and complete comprehensive accurate and constructive written reports

Ability to work in a team environment

Ability to meet or exceed Performance Competencies

WORK ENVIRONMENT When applicable and appropriate consideration will be given to reasonable accommodations. Mental: Clear and conceptual thinking ability; excellent judgment troubleshooting problem solving analysis and discretion; ability to handle work-related stress; ability to handle multiple priorities simultaneously; and ability to meet deadlines Physical: Computer keyboarding travel as required Auditory/Visual: Hearing vision and talking

NOTE: Credit security clearance confirmed via a background credit check is required for this position. The statements contained in this document are intended to describe the general nature and level of work being performed by a colleague assigned to this description. They are not intended to constitute a comprehensive list of functions duties or local variances. Management retains the discretion to add or to change the duties of the position at any time.


Employment Type

Full-time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.