drjobs
Cyber Security
drjobs Cyber Security العربية

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs

Job Location

drjobs

- USA

Monthly Salary

drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Req ID : 2626156

Title : Cyber Security

Location : Edison NJ

(Hybrid 3 days in office 20% travel))

Employment : Fulltime only

Security Architecture

  • Develop security architecture and guiding principles to support information technology initiatives with a focus on cloud.
  • Oversee and drive the design and implementation of security architecture controls in support of compliance requirements.
  • Support security architecture and guiding principles and apply to information technology initiatives.
  • Deliver technical guidance related to enhancing the security posture of information systems solutions.
  • Assist the design and implementation of security architecture controls to meet compliance requirements.

Multi Cloud Security

  • Design and develop public cloud specific security policies standards and procedures Identity and Access Management (SSO SAML) Firewall Management Encryption Key Management Security Incident and Event Management (SIEM) etc. in partnership with Enterprise Architecture Infrastructure DevOps and Application Development teams.
  • Identify and validate security controls for cloud services.
  • Analyze threats and current security controls to identify gaps in current defensive posture.
  • Design security controls for multitier business solutions including the design of applicationlevel access and entitlement management data tenancy and isolation encryption and logging.
  • Researches and creates a comprehensive strategy for cloudnative security (i.e. data classification and categorization; data segmentation; server access control; resourcesbased access control and access control lists; user identity access management and attestation; dataatrest encryption; dataintransit encryption; encryption key management logging auditing and anomaly detection; and rolebased access control).
  • Assists in the integration of development pipelines with secure configuration parameters to remove or reduce known threat vectors and vulnerabilities in infrastructureascode (IaC) and continuous integration/continuous delivery (CI/CD) build configurations and release automation.

IAM

  • Develop IAM technology roadmaps in support of customer vision and strategy.
  • Drive Zero Trust Architecture principles and Passwordless design.
  • Develop proofofconcept prototypes and initial implementation models.
  • Monitor implementation activity to ensure architecture and design principles are upheld.
  • Ensure implementation solutions support architecture objectives (e.g. availability scalability performance security etc.) as appropriate.

Vulnerability Management

  • Vulnerability Assessment: Identify and evaluate security vulnerabilities in current and future products assess their severity and propose mitigation strategies.

Network Security

  • Develop and maintain network security strategy aligning it with business goals and compliance requirements.
  • Design and implement network security architecture including firewalls intrusion detection/prevention systems VPNs and other security technologies.
  • Research evaluate and recommend security solutions products and technologies that can enhance the networks security posture.
  • Partner and conduct security audits and penetration tests to assess the networks security and identify vulnerabilities.

Threat Detection SOC

  • Provide technical leadership for the information security detection response & analysis function.
  • Design and implement a comprehensive SOC strategy ensuring alignment with business objectives and the optimal use of SIEM.
  • Evaluation of capabilities of security technologies like SIEM firewalls IDS/IPS EDR and more focused upon optimizing threat detection and response.
  • Drive strategic recommendations and identify delivery gaps based upon emerging threats.


Qualifications:

  • 10 years of experience in related fields
  • Experience working in three or more domains listed above
  • Preferred domains: Cyber Security Architecture Identity and Access Management and Cloud Security
  • CISSP Certification preferred
  • Strong communications writing and presentation skills
  • Must be open to travel up to 20%

Employment Type

Full Time

Key Skills

  • CCTV
  • Customer Service
  • Communication skills
  • Computer Skills
  • ICD Coding
  • Military Experience
  • Law Enforcement
  • NIST Standards
  • Security
  • DoD Experience
  • RMF
  • Writing Skills
Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.