Required Skills

Cyber Security

Work Authorization

  • US Citizen

  • Green Card

  • H1B Work Permit

Preferred Employment

  • Corp-Corp

  • Contract to Hire

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 22nd Jan 2023

JOB DETAIL

Project Details:

They want someone that can come in and hit the ground running with Xsoar.

Xsoar is already installed and running but this person needs to know how to integrate it with other BCBS tools.

Will help create a playbook that they can use going forward.

 

Must Haves / Required Skills:

Minimum 2 years experience using Palo Alto Xsoar tool.

Experience putting together a "playbook" for Xsoar

More exp with Xsoar is ideal

 

 

Description:

Spotlight Notes:

Someone who can hit the ground running with minimal supervision

Will need to work EST hours with the team

2 years experience with xSOAR automation

 

Handles more complex design, evalutation and testing of the security of systems to ensure that the systems and data integrity of the organization is being maintained and protected against the latest cyber threats.

 

Major Job Functions/Components

Provide high level technical input into the design, deployment and operation of global IT Security management software and hardware devices focusing on Palo Alto xSOAR

You will provide support to the customer: planning, engineering, implementation, technical resource assessment, consultant task management, and training requirements

You will make recommendations for best commercial business practices from other commercial customers using the Palo Alto xSOAR

You will address all technical problems associated with the Palo Alto xSOAR software and provide support with direct reach back into Palo Alto Technical Support and the Customer Success Team

You will become a Trusted Advisor to the Customer Cyber Security Leader on Palo Alto xSOAR product performance and maintenance issues

You will prepare and deliver documentation to support accurate implementation/operation of new capabilities supporting live operating environments

You will analyze technical/integration requirements and develop technical solutions for Customer review and consideration, and once approved, integrate into the customer's infrastructure

You will be responsible for implementing and maintaing automation playbooks

Review more complex existing applications periodically and new applications prior to installation to ensure that the applications adhere to security policies. Perform detailed risk analysis assessment of applications, networks and systems.

Review and analyze security and privacy exceptions. Work with business partners to resolve security and privacy exceptions

Perform, review, and analyze system compliance monitoring / reporting.

Develop, revise and maintain Standard Operating Procedures and Working Instructions related to IT Security.

Mentor engineers not experienced in the platform

This job description is intended to describe the general responsibilities and type of work being performed by people assigned to this position. The major job functions/components above are the typical functions of the job and are not an exhaustive or comprehensive list of all possible job responsibilities, tasks and duties. Personnel in this position should be aware that the responsibilities, tasks, and duties of the jobholder may differ from those outlined in this job description and various other duties may be assigned as needed.

 

Hiring Requirements/Qualifications

Education/Experience Bachelors degree and 5 years of information security engineering experience.

In lieu of degree, 6 years of information security engineering experience.

Proficient technical security systems and safeguard knowledge use in a complex system infrastructure including: SIEM, Antivirus, Intrusion Prevention, Network Access control, firewall technologies , encryption based security safeguards and standards, major operating system security configurations data and network encryption technologies and products.

Security technical expertise in one or more of distributed, mainframe, and midrange host environments.

Knowledge of Network security understanding in a multi-protocol LAN/WAN environment including TCP/IP, IPSEC, SSL and HTTP.

Understanding of host and network intrusion detection, and monitoring systems and methodologies.

 

Company Information