
Kerberos, Active Directory, LDAP, Excellent understanding of IaaS and virtualization service orientated architecture designed around the delivery and security of Infrastructure components as a service, Understanding of how commodity servers, operating systems and networks function, perform and scale and how to best secure them without drastically impairing performance or functionality, Deep and broad understanding of services and architecture required to build secure Cloud computing platforms; especially using encryption for data at rest and in transit, Identity Management, authorization and authentication expert including using SSL, IPSEC and PKI frameworks for securing and encrypting communications, Deep experience in Internet Protocol (IP), firewalls, encryption, intrusion detection systems, Web filtering, authentication and authorization methodologies, Skilled in data analysis and network security threat analysis and remediation, Deep knowledge of how to develop, implement and enforce security policies both internally and externally, OS: Red Hat Enterprise Linux 6.x / 7.x / Windows Server 2008 R2 / 2012, Minimum 5+ Server Information Security experience, Deep understanding of Linux, network and virtualization security, Software development in complex environments in programming and scripting languages, Strong analytic capabilities and ability to compare between architectures, approaches and solutions, Deep understanding of novel offensive & defensive security methods major advantage, Creative and innovative thinker with good problem-solving skills, independent, self-starter and strong team player, Experience working in large, global and multi-national organizations advantage, Excellent communication skills in Hebrew and English, Define security best practices for our cloud platform and provide guidance to application development teams, Identify security security gaps and provide recommendations to address gaps on both new and existing platforms, Document security policy for our cloud environments and build tools to automate enforcement of policy, Design, test, certify and document new cloud services, environments and systems, Collaborate with business units to help architect secure applications, Mentor other members of the cloud engineering team and broader engineering organization, Follow industry trends and build proof of concepts leveraging new cloud services or latest best practices, Advanced knowledge of cloud technologies. ), Hands on network and systems administration experience, including Linux and Windows Active Directory competence, Familiarity with attack vectors, hacking techniques and tools; basic knowledge in shell/bash scripting and/or Python, 3-5 years experience with Cloud platforms such as Amazon Web Services (AWS), Azure, VMware NSX, Experience representing technical viewpoints to diverse audiences and in making timely and prudent technical risk decisions, Strong interpersonal and communication skills; ability to work in a team environment, Ability to work independently with minimal direction; self-starter/self-motivated, Development of a cloud based architecture, Experience with Transitioning software from a thick client environment to a cloud environment, Function as the system integrator for migrating applications and other pertinent stakeholders in the cloud migration process, Identify and champion process improvements to cloud migration strategies, policies and procedures, Shepherd concepts/strategies through various Agency seniors and boards to approval, Ensure strategies are consistent with the Agencys vision, priorities, enterprise architecture, and CONOPS, Examine current guidance, processes, and tools for sufficiency of the on-going mission/business transformation, Serve as the subject matter expert on Cloud Security for the Security Operations organization, Develop monitoring and protection strategies for the Agencys Cloud environments, Perform assessments of the Agencys security posture and correlate vulnerability data with Cloud topology and architecture to quickly identify risks, Participate in Incident Response teams as a Cloud forensics and incident response subject matter expert, Support Cloud investigation requests through the entire lifecycle of initiation, data collection, analysis, and data production, Work with customers, vendors and NASA centers for problem resolution, Produce reports on Cloud incidents, risks, exploits and vulnerabilities, Develop and maintain comprehensive documentation about the Agency Cloud architecture, capabilities and security posture, Work with the Cloud Service organization and other Agency stakeholders to integrate protection, monitoring, incident response, and security reporting standards into the Agencys Cloud architecture, BS degree in relevant field/technology (or equivalent years of experience) and minimum of 6 years of related experience with a minimum of 4 years of Information Security experience, Ability to obtain a government security clearance - US Citizenship Required, Expert knowledge of NIST controls and FedRAMP, Expert knowledge of current threats to Cloud infrastructure and services, Expert knowledge of network security technologies and their application in Cloud environments, Expert knowledge of cyber security methodologies and security practices, Experience with the AWS GovCloud offering, Experience with Microsoft Azure and other Cloud service providers, Experience securing SaaS applications, leveraging CASB toos, Experience with Cloud automation techniques and scripting, Experience integrating host security tooling into Cloud infrastructure, Experience producing reports and briefs on the current Cloud threat landscape and associated risks, Experience with Cloud automation tools and scripting: Python, Java, Chef, Puppet, Ansible, CISSP, GCIA, CEH, GPEN, OSCP or similar security certifications.
Java, Python, Experience building or maintaining Cloud focused security solutions such as CASB or Tokenization Proxies, Experience with common End-Point security solutions (Antivirus, Application Whitelisting, Host Intrusion Prevention, Forensic Analysis Tools, Advanced Malware Solutions, IOC Sweepers), Experience with PKI and certificate-based authentication, OATH, SAML and SSO capabilities, Experience with common backend analytics solutions (SIEM, Malware Detonation/Analysis, Machine Learning Systems, Insider Threat Solutions), Guide development of security requirements and architect, implement, and evaluate security technologies to protect cloud-based systems, Provide support for technical issues and ensure that all components of security around the cloud are properly implemented, At least six years of hands-on experience in security research or engineering, At least two years of hands-on experience securing cloud-based platforms and services - Prefer expertise in areas of OpenStack, SDN controllers (Contrail), and virtualization (KVM and VMware), Deep understanding of enterprise networks, midpoint, and endpoint security risks both traditional and cloud environments, Experience with security technologies to include one or more of: IDS/IPS, vulnerability scanning/assessment tools, penetration tools, Wireshark/tcpdump, web proxy, network access control system, data loss prevention, antivirus/malware prevention and analysis, correlation and security and event management and visualization platforms and tools, Prefer programming experience for testing/prototyping, automation, and analysis/development of OpenStack APIs in one or more languages to include Python, Node, PHP, or Java - Comfortable with Linux and Microsoft Windows-based systems, You will drive cloud security engineering for our enterprise IT, R&D and Business IT teams in both IaaS and SaaS implementations, You will be an active member of Design & Build IT projects, steering cloud configurations and services towards industry-leading security with your domain expertise, You will actively assess existing cloud implementations, identifying security issues and prioritizing fixes, You will engineer and implement new cloud security tools to feed our analytics-driven Security Operations Center, 8+ year track record of independently driving security projects to success, Experience designing and implementing security solutions to protect cloud implementations, Comprehensive knowledge of multiple IaaS cloud providers such as AWS or Microsoft Azure, Experience in working with SaaS provider such as salesforce.com or SuccessFactors, In-depth knowledge of native and 3rd party cloud security tools. Educating the company on vulnerabilities & exploits with proof of concepts, Experience with the full software or systems development life cycle, including requirements analysis, design, integration, testing, and implementation, Knowledge of TCP/IP networking concepts and technologies, Ability to automate the provisioning and configuration of Cloud-based environments, Experience with AWS in production environments, 2 years of experience designing and implementing network security solutions, including firewalls, intrusion detection, encryption, monitoring, vulnerability scanning, and authentication, Knowledge of federal IT and Cloud security policies, including FISMA, FedRAMP, and NIST 800-53, and applying them to Cloud security architectures, Any Industry security certification such as CEH, Security+, or CISSP Certification, Experience with deploying and administering Splunk or other SIEM tools, Experience with deploying and administering McAfee ePO or other host-based security tools, Experience with deploying and administering Tenable Nessus or other vulnerability scanning tools, Experience with directory service administration, including Active Directory and LDAP, Maintain security solutions including proper operation, patch upgrades and vendor management, Provides engineering oversight and direction for specific security technology, Review existing toolsets, identify operational gaps, and recommends security enhancements, Assist in achieving security architecture compliance on requirements, including: Sarbanes-Oxley, payment card industry standards, HIPAA/HITECH, global data privacy requirements, as well as state and federal regulations, Serves as information security subject matter expert on security solutions; provide advisory and consulting services as needed, Identifies, evaluates, conducts, schedules and leads individual technical analyses functions to ensure all applicable IS security requirements are met, Monitors infrastructure design so that security toolsets are operating effectively, Provides technical lead on individual security projects across multiple technologies including infrastructure, secure electronic data transfer, network security, platform security and application security, Provides expert opinion on business solutions and software prior to purchase, Supports the Security Architect in creating and maintaining the company's security design, Investigate opportunities to update security system capabilities to sustain and enhance network and system security integrity, College degree in Computer Information Systems, Computer Science, Information Systems Management, or equivalent professional experience, A minimum of ten (10) years (in excess of degree requirements stated above) of progressively responsible experience in the management of cybersecurity systems with at least seven (7) years of formal experience in information security, Certification in highly technical information security disciplines such as: CISM, CISSP, CCSP, CCNP, CCDE, CCIE Security, and GIAC, Defense in Depth principles and technology including access/control, authorization, Identification and authentication, public key infrastructure, network, and end point protection, Demonstrated experience applying security risk assessment methodology in support of system development, including threat model development, vulnerability assessments, and resulting security risk analysis, Demonstrated proven track record of communicating and working proactively and professionally with internal and external auditors and other groups responsible for ensuring that the company is properly protecting the interests of its customers, shareholders, and employees, Understanding of network protocols, data flow analysis, and network design and troubleshooting, Business needs with the ability to establish and maintain a high-level of customer trust and confidence in the security team, Application systems, network architecture, multiple platforms and new technologies from a security perspective to include, but not limited to, Firewalls; Intrusion Detection/Protection Systems; Operating Systems (UNIX, Windows); Networking (switches, routers, protocols, etc.
fdmgroup cognizant - Select from thousands of pre-written bullet points.
azure resumes Familiarity with the latest attack trends, tools, and the threat landscape, Excellent communication skills on both technical and non-technical issues, Ability to occasionally travel internationally, and work on US Government engagements, Based on customer requirements, candidates must be a US Citizen, Industry-recognized security certification preferred (CISSP, tool specific certs), Deep technical and security exposure core technologies including, Cloud, Digital, Data Protection, User Management, Digital Mobility, Application Security, Event Management, and CDMSearch Jobs US, Subject matter expert in all facets of Cloud and Cloud security, Must have deep experience with CASB products and understand their guiding principles and fundamentals, Subject matter expert on data loss prevention guiding principles, Exceptional ability to execute and drive change, Experience rolling out and/or running a large scale cloud security program, Strong drive to build a best in class program, Zero tolerance for operational and design oriented security gaps, Absolute self-starter who will take the lead and initiative to find and solution problems, Evidence many examples of having driven positive change, Experience in creating trending, metrics, and management reports, Ability and comfort presenting to Executive Management, This person should think of infrastructure as code.You will work closely with the Development and QA teams on architecture and technologies, Architecture, configuration, operations, and maintenance of infrastructure, network and supporting software related to the infrastructure, Proven track record developing and implementing security tools and technologies and process integrations both on-prem and in cloud-based architectures, Prior experience in a technology company working closely with Product and DevOps engineers on security requirements and implementations.

perl, python, PHP, ruby) and a programming language (e.g.
engineer cloud paperblog oversee administrators ), Virtualization technologies (VMWare, Openstack, AWS, Containers, etc. Create a Resume in Minutes with Professional Resume Templates. This includes enterprise-level design work for system security, cloud security, identity and access management, data protection and many more, Within this team, the Cloud Security Engineer is responsible for reviewing technologies and designing security controls and solutions to reduce the risks to Pearson and its customers.
salary associate 
Knowledge of cloud security services such as AWS Identity and Access Management, Inspector, Cloud formation, VPCs, etc. ), Programming or scripting language knowledge is desired but not required, Exceptional communication and advocacy skills, both verbal and written, with the ability to express complex and technical issues in clear and concise language, Ability to collaborate and communicate effectively and tactfully with both business-oriented executives and technology-oriented personnel, Ability to negotiate compromise between diverse parties with competing equities, Ability to work independently in unstructured situations, Ability to manage multiple projects simultaneously that involve key stakeholders across a globally-distributed and federated enterprise, Ability to travel internationally as required, up to 10%, Review and develop cloud architectures to ensure overlapping layers of security, Design and create security roles and policies, Perform security auditing, incident response, risk analysis and automation for cloud infrastructure, Research, operationalize, and train others in the use of cloud technologies and best practices, Acts as a resource for application teams to adopt cloud architecture and leverage industry leading public cloud providers, Build out logging and monitoring of our cloud solutions, Experience with configuration management (Chef, Puppet), containerization (Docker), and other related DevOps tools (Jenkins, Git), Experience with security architecture of modern cloud technologies, including multi-tenancy, containerization/virtualization, and control plane and automation services, Experience manually testing web applications or enterprise penetration testing, Experience with a scripting language (e.g.
), Experience in a security operations role (logging, monitor, incident response), Work closely with product and platform teams to engineer security controls based upon CISO office policies and standards, Assess and understand Pearsons current cloud security posture and future architecture, providing recommendations for vulnerability remediation and risk reduction, Develop secure cloud-based applications and platforms, Deploy automated security solutions for cloud delivery processes, Develop cloud security solutions to enable production security operations (SOC), Deploy large-scale cloud environments using container and microservice technologies, Develop security capabilities in support of DevOps processes, Perform threat models and risk assessments to characterize the risk and severity posture of large-scale cloud environments, Develop & deploy automated solutions to secure cloud development processes, Craft and evangelize secure cloud platform & product requirements, Serve as a security expert in application development, database and microservice design, container and/or virtual machine technologies, helping project teams comply with enterprise and CISO security policies, industry regulations, and best practices, Research, design, and advocate new technologies, architectures, and security products that will support security requirements for the cloud and cloud-enabled products, Develop secure solutions, based on approved security architectures, Design security configuration guidelines for information technology devices and systems, as well as mechanisms for assessing compliance with the guidelines, Experience with security strategy, with a passion to make security realistic, achievable and interwoven with the business fabric, Experience with a broad range of security technologies, including nextgen firewalls, DLP, NAC, IDS/IPS, IdAM, certificate management, SIEM, endpoint protection, anti-malware, vulnerability management and cloud security, Strong business acumen with the ability to build business cases for technology initiatives and to effectively communicate the value proposition to non-technical stakeholders, Solid working experience of continuous integration practices & tools (Jenkins, Travis CI, etc), Experience designing and implementing encryption solutions such as PKI and encryption at rest technologies, Well-rounded background in network, host, database, and application security, Formal training in and experience using an enterprise architecture methodology (for example, the Zachman Framework or TOGAF), Experience driving a culture of security awareness, Experience administering network devices, databases, and/or web application servers, Professional IT Accreditations (CISM, CCSA, CCSE, JNCIA, CCNA, CISSP, OSCP, CCIE Security, CEH, Security+), Must possess a Bachelors Degree and 10 years of experience, Experience with cloud computing concepts and models, as well as the high-level security issues associated with the cloud, such as encryption, access control, hypervisor security and network security, 2+ years of experience with Cloud security practices, 1+ years of experience with PowerShell Scripting, 1+ years of experience with vulnerability assessments or intrusion detection, Ability to learn new IT skills and concepts quickly, Experience with Amazon Web Services and Microsoft Azure, Experience with Microsoft Visio and PowerPoint, Responsible for architecture, engineering, operations, and cross-platform integration of a range of on-prem and cloud security tools; provide hands-on operational support; maintain up to date documentation of designs and configurations, Oversee cloud monitoring systems and processes, recommend improvements, perform optimization and tuning, as well as ongoing capacity monitoring, Develop cloud monitoring and response use cases and supporting content to augment existing monitoring processes (e.g.
shriresume servers, databases, web servers), providing recommendations for improvement and risk reduction, Provide security subject matter expertise on cloud control implementation for enterprise-scale projects, Serve as a security expert in cloud-based application development, database design, network and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices, Interface effectively with the systems engineering team to implement control security solutions and controls, Design cloud security configuration standards, procedures, and guidelines for platforms, Design and implement mechanisms for assessing bi-modal compliance with the standards, procedures, and guidelines, Identify and execute on opportunities to automate cloud security controls, Design and build controls to address security risks and events as identified, Define clear, concise, and executable standard operating procedures and documentation for any implemented solutions for formal operational handoff, Recognize, adopt, and instill industry leading practices in cloud security engineering throughout the organization, Provide subject matter expertise on, and conduct in-depth security reviews of, new OS, database, middleware, etc.
Its actually very simple. This is an expert/lead technical role, Work closely with enterprise architects, other functional-area architects, engineering, and security specialists to ensure adequate security solutions and controls are in place throughout all IT and cloud systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements, Assess and understand Pearsons current security posture and future architecture, providing a viable solution path to bridge the gap, Assess and understand the current and planned security posture for platforms (e.g. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. JAVA, Objective C), Proficiency in either Mac OS X and/or other flavors of UNIX, Ability to explain networking concepts (routing, ACL, load balancers, SSL/TLS, TCP) in order to provide application architecture feedback, Background in web application development and/or code auditing strongly preferred, Strong verbal & written communication skills, Passion for discovering and researching new vulnerabilities and exploitation techniques, Bachelors degree with 5+ years experience in IT, or electronic security, or Masters degree and 3+ years experience in the same or equivalent experience, Hands-on experience with cloud infrastructure (IaaS, PaaS) design, implementation or maintenance, including experience with well-known platforms (e.g., AWS, SalesForce, Google Cloud, Azure, OpenStack, Responsible for building, maintaining and executing a strategy for securing all elements of the technology infrastructure in partnership with our DevOps & System Engineering teams, Three years of experience in Cybersecurity, Two years of experience with cloud & infrastructure security, Experience with design & architecture using modern design patterns in a cloud environment, Experience with cloud models such as IaaS, PaaS, SaaS and the security implications and requisite control frameworks, Knowledge about how to secure modern server OS (Linux, Windows), desktop OS (Windows, Mac) and mobile OS (Apple iOS, Android), Knowledge of security best practices like least privilege, defense in depth, attack surface analysis, An understanding of modern development processes including agile development, Professional certification in security (for example CISSP), Knowledge of IT governance and operations, Familiarity with security related certifications such as PCI, SoX, ISO27001, Must possess great oral and written communication skills, Ability to communicate complicated technical issues and risks to engineers, project managers and product managers, Master's degree and 15+ years of experience in Information Technology field, Prior experience must include at least 6 years of network or cloud security experience, Must have a significant level of understanding of IP protocol based networks, virtualization technologies, and commonly utilized public and private Cloud solutions, Experience with Windows and/or Unix/Linux Administration and security, Strong logic, analytical, and reasoning skills, Must be US Citizen and eligible for federal clearance, Experience building or maintaining Cloud focused security solutions in various environments, Significant experience with common backend analytics solutions (SIEM, Malware Detonation/Analysis, Machine Learning Systems, Insider Threat Solutions) Vendor technical certification(s) from one or more cloud providers, Experience working directly with service providers and vendors, to evaluate products and offerings, Experience working with diverse commercial and government customers, Currently possess or are eligible to obtain a Top Secret Clearance, Some experience using AWS, Azure or Openstack to build applications, Demonstrated knowledge in scripting and automation, Understanding of IP networking and traffic scaling, Experience with agile development methodologies, rapid application development, and project management, Proven ability to design and present understandable and practical solutions to complex problems, Demonstrated leadership skills in a fast-paced, team-driven environment, Ability to work effectively across internal and external organizations, Previous experience applying security measures to public cloud accounts, Proficient with Python and PowerShell scripting, Proficient with data structuring languages, including XML, JSON, and design of binary data formats, Experience creating and managing projects in revision control, including git and github, Experience with large-scale distributed infrastructures, including technologies for clustering and load balancing, Understanding of Service-Oriented Architectures (SOA and REST), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS), Experience implementing continuous integration and continuous delivery (CI/CD) tools and systems, Specific experience with Docker and Kubernetes, Deep understanding of HTTP, TCP, DNS, UDP, IPv4/IPv6 networking and protocols, Understanding of network database and storage technologies including NoSQL, NAS, and object stores, Understanding of unattended installation and configuration technologies including PXE and Foreman, Experience with Agile, including Scrum, Kanban, You will drive cloud security engineering for our enterprise IT and Business IT teams in both IaaS and PaaS implementations, You will engineer and implement new cloud security tools to feed our DevOps/SecOps processes to ensure the solvency of cloud compute resources, Provide daily, ongoing security oversight of Cloud SecOps operations, to include the security impact of proposed modifications, additions, and technology implementation/refresh operations, Understand system security vulnerabilities and associated threats, and assess the overall security risks to the system, Provide mitigation recommendations to reduce identified security risks, Work directly with internal IT staff and customer to establish and enforce Cloud IT security best practices, protection objectives, process improvements and effective IT security controls, Work with internal security team for vulnerability scanning using approved software tools and ability to automate, Thorough understanding of DevOps ideologies and ability to drive and communicate change supporting DevOps/SecOps methodology within the organization, Serve as the primary interface to governance, compliance, and risk management teams to ensure the system consistently meets the requirements for certification and accreditation.
Sitemap 29