US Citizen
Green Card
H1B Work Permit
Corp-Corp
Contract to Hire
Consulting/Contract
UG :- - Not Required
PG :- - Not Required
No of position :- ( 1 )
Post :- 22nd Jan 2023
Project Details:
They want someone that can come in and hit the ground running with Xsoar.
Xsoar is already installed and running but this person needs to know how to integrate it with other BCBS tools.
Will help create a playbook that they can use going forward.
Must Haves / Required Skills:
Minimum 2 years experience using Palo Alto Xsoar tool.
Experience putting together a "playbook" for Xsoar
More exp with Xsoar is ideal
Description:
Spotlight Notes:
Someone who can hit the ground running with minimal supervision
Will need to work EST hours with the team
2 years experience with xSOAR automation
Handles more complex design, evalutation and testing of the security of systems to ensure that the systems and data integrity of the organization is being maintained and protected against the latest cyber threats.
Major Job Functions/Components
Provide high level technical input into the design, deployment and operation of global IT Security management software and hardware devices focusing on Palo Alto xSOAR
You will provide support to the customer: planning, engineering, implementation, technical resource assessment, consultant task management, and training requirements
You will make recommendations for best commercial business practices from other commercial customers using the Palo Alto xSOAR
You will address all technical problems associated with the Palo Alto xSOAR software and provide support with direct reach back into Palo Alto Technical Support and the Customer Success Team
You will become a Trusted Advisor to the Customer Cyber Security Leader on Palo Alto xSOAR product performance and maintenance issues
You will prepare and deliver documentation to support accurate implementation/operation of new capabilities supporting live operating environments
You will analyze technical/integration requirements and develop technical solutions for Customer review and consideration, and once approved, integrate into the customer's infrastructure
You will be responsible for implementing and maintaing automation playbooks
Review more complex existing applications periodically and new applications prior to installation to ensure that the applications adhere to security policies. Perform detailed risk analysis assessment of applications, networks and systems.
Review and analyze security and privacy exceptions. Work with business partners to resolve security and privacy exceptions
Perform, review, and analyze system compliance monitoring / reporting.
Develop, revise and maintain Standard Operating Procedures and Working Instructions related to IT Security.
Mentor engineers not experienced in the platform
This job description is intended to describe the general responsibilities and type of work being performed by people assigned to this position. The major job functions/components above are the typical functions of the job and are not an exhaustive or comprehensive list of all possible job responsibilities, tasks and duties. Personnel in this position should be aware that the responsibilities, tasks, and duties of the jobholder may differ from those outlined in this job description and various other duties may be assigned as needed.
Hiring Requirements/Qualifications
Education/Experience Bachelors degree and 5 years of information security engineering experience.
In lieu of degree, 6 years of information security engineering experience.
Proficient technical security systems and safeguard knowledge use in a complex system infrastructure including: SIEM, Antivirus, Intrusion Prevention, Network Access control, firewall technologies , encryption based security safeguards and standards, major operating system security configurations data and network encryption technologies and products.
Security technical expertise in one or more of distributed, mainframe, and midrange host environments.
Knowledge of Network security understanding in a multi-protocol LAN/WAN environment including TCP/IP, IPSEC, SSL and HTTP.
Understanding of host and network intrusion detection, and monitoring systems and methodologies.