Required Skills

Cyber Security

Work Authorization

  • US Citizen

  • Green Card

  • EAD (OPT/CPT/GC/H4)

  • H1B Work Permit

Preferred Employment

  • Corp-Corp

  • W2-Permanent

  • W2-Contract

  • Contract to Hire

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 22nd May 2024

JOB DETAIL

Firewalls (functionality and maintenance)

Office 365 Security

VSX

Endpoint Security

In-depth knowledge of:

cybersecurity principles, practices, technologies, and standards.

Hands-on experience with security tools, such as SIEM, IDS/IPS, antivirus, and vulnerability assessment tools.

7+ years of experience in Cybersecurity.

Extensive experience with Linux, macOS, and Windows internals.

Proficiency in EDR technologies and evasion techniques.

Sound understanding of the Software Development Life Cycle.

Hands-on experience with network security, encryption, threat modeling, discovery, vulnerability, and penetration testing.

Responsibilities:

 

•             Lead the charge in identifying cyber risks and offering insightful recommendations for enhancement.

 

•             Strategize and oversee operational activities including threat monitoring, incident response, and vulnerability management, alongside identity and access management systems.

 

•             Evaluate and recommend enhancements for security architecture and configuration of IAM systems.

 

•             Develop, implement, and maintain robust cybersecurity measures to fortify our service infrastructure and safeguard our data.

 

•             Craft and maintain custom security tools and scripts to streamline security assessments and red teaming activities.

 

•             Stay abreast of the latest security threats, vulnerabilities, and attack techniques, researching and experimenting with new tools and methodologies to bolster our defenses.

 

•             Plan, execute, and analyze complex attack scenarios to emulate advanced threat actors, contributing to the refinement of tactics, techniques, and procedures used by adversaries.

 

•             Build, deploy, and manage security tools, automating security processes using Python or other languages.

 

•             Develop and maintain comprehensive security documentation and communicate security updates to employees and stakeholders.

 

•             Conduct tabletop exercises with internal stakeholders, drawing insights to recommend improvements based on lessons learned.

Company Information