Required Skills

Cyber Security

Work Authorization

  • US Citizen

  • Green Card

Preferred Employment

  • Corp-Corp

  • W2-Permanent

  • W2-Contract

  • Contract to Hire

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 24th Oct 2024

JOB DETAIL

  • Identifying and mitigating complex IT technical threats to computer systems, networks, and data.
  • Using technical IT tools and IT software to monitor, analyze, and defend against cyber-attacks.
  • Monitoring and analyzing network traffic, configuring firewalls, intrusion detection/prevention systems and conducting vulnerability assessments.
  • Managing and protecting endpoints such as desktops, laptops, servers, and mobile devices from malware, ransomware, and other threats.
  • Investigating security incidents, identifying root causes, and implementing corrective actions to prevent future occurrences.
  • Utilizing SIEM tools to collect, correlate and analyze security event data for threat detection and responses.
  • Monitoring and analyzing emerging threats, vulnerabilities, and attack vectors to proactively defend against cyber threats.
  • Performing Penetration testing.
  • Keeping abreast of the latest security, privacy, and regulatory concerns and best practices impacting third party risk management.
  • Advising the agency on any changes requested by third parties to security and privacy provisions of agreements or contracts.
  • Collaborating with IT project management and operational teams to design secure cloud infrastructure plans and services.
  • Performing analysis on the security of all cloud services, including but not limited to: AWS, Microsoft Azure, Google, etc.
  • Providing subject matter expertise on cloud security, automation, and virtualization.
  • Developing, documenting, and validating policies, processes, and procedures relating to a variety of cloud concepts and standards.
  • Developing cloud security metrics to analyze risks and identify potential opportunities to reduce vulnerabilities.
  • Collaborating with all parties and the city?s Cyber Command Center to obtain cloud solution dispositions and update agency inventory lists.

Company Information