*Please strictly adhere to the following resume naming convention: ALL CAPS NO SPACES B/T UNDERSCORES Bill Rate: $80/hr PTNUSGBAMSREQIDCandidateBeelineID i.e. PTNUS9999999SKIPJOHNSON0413 MSP Owner: Tory Robinson Location: San Jose CA 100% Onsite GBaMS ReqID: Security Management Azure AWS Cloud Computing Design and implement security solutions: Architect secure cloud environments and applications on AWS and Azure including network security data encryption and identity and access management. Monitor and respond to threats: Use security tools and platforms (like Microsoft Defender for Cloud) to monitor cloud assets for vulnerabilities and security incidents and then investigate and contain threats. Manage compliance: Ensure that cloud infrastructure adheres to industry standards best practices (like the Microsoft Cloud Security Benchmark) and regulatory requirements. Automate security processes: Develop and implement automated workflows for security tasks such as vulnerability scanning and compliance checks often integrating with CI/CD pipelines. Perform assessments: Conduct regular security assessments vulnerability scans and threat modeling to identify and mitigate risks. |
*Please strictly adhere to the following resume naming convention: ALL CAPS NO SPACES B/T UNDERSCORES Bill Rate: $80/hr PTNUSGBAMSREQIDCandidateBeelineID i.e. PTNUS9999999SKIPJOHNSON0413 MSP Owner: Tory Robinson Location: San Jose CA 100% Onsite GBaMS ReqID: Security Management Azure AWS ...
*Please strictly adhere to the following resume naming convention: ALL CAPS NO SPACES B/T UNDERSCORES Bill Rate: $80/hr PTNUSGBAMSREQIDCandidateBeelineID i.e. PTNUS9999999SKIPJOHNSON0413 MSP Owner: Tory Robinson Location: San Jose CA 100% Onsite GBaMS ReqID: Security Management Azure AWS Cloud Computing Design and implement security solutions: Architect secure cloud environments and applications on AWS and Azure including network security data encryption and identity and access management. Monitor and respond to threats: Use security tools and platforms (like Microsoft Defender for Cloud) to monitor cloud assets for vulnerabilities and security incidents and then investigate and contain threats. Manage compliance: Ensure that cloud infrastructure adheres to industry standards best practices (like the Microsoft Cloud Security Benchmark) and regulatory requirements. Automate security processes: Develop and implement automated workflows for security tasks such as vulnerability scanning and compliance checks often integrating with CI/CD pipelines. Perform assessments: Conduct regular security assessments vulnerability scans and threat modeling to identify and mitigate risks. |
View more
View less