Required Skills

Cyber Security Engineer

Work Authorization

  • US Citizen

  • Green Card

  • EAD (OPT/CPT/GC/H4)

  • H1B Work Permit

Preferred Employment

  • Corp-Corp

  • W2-Permanent

  • W2-Contract

  • Contract to Hire

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 3rd Jul 2025

JOB DETAIL

  • Good knowledge of Identity Access Management (IAM), SAML, Federation, Privilege Access Management (PAM), and MFA technologies.
  • Data Security (Cryptography and Encryption).
  • Knowledge of advanced Auditing and Log Management.
  • Security vulnerabilities scanning tools.
  • Knowledge of Cloud Access Broker Services (CASB) and configuration based on best practices.
  • Data Loss Prevention (DLP) tools and configuration based on best practices.
  • User behavior monitoring.
  • Data analysis of Network, Cloud, and Endpoint data.
  • Centralized management of next generation firewalls and intrusion detection and prevention systems (IDS/IPS).
  • Provide oversight and assess security controls for IaaS, PaaS, and SaaS services, while collaborating with system integrators and Client teams to deliver reliable and scalable security capabilities.
  • Optimization of security tools and controls.
  • Oversee and lead the implementation of all security solutions, develop technical, and reference architectures throughout the project duration.
  • Perform as a subject matter expert on cloud technologies, build, and recommend security infrastructure from scratch and raise security risks in a timely manner.
  • Develop security requirements for complex internet facing applications and associated infrastructure components.
  • Responsible for assessing and reviewing end-to-end secure integrations including web services and APIs.
  • Work closely with Client security team and third party system integrators on security engineering related issues and resolving the issues without affecting the overall project delivery timelines.
  • Monitors information systems for security incidents and vulnerabilities; develops monitoring and visibility capabilities; reports on incidents, vulnerabilities, and trends.
  • Analyzes trends, news, advisories, and changes in threat and conduct security assessments with risk mitigation plans.
  • Review vulnerability management reports and follow-up with technical stakeholders on remediation efforts.
  • Responds to information system security incidents, including investigation of, countermeasures to, and recovery from computer-based attacks, unauthorized access, and policy breaches; interacts and coordinates with incident responders.

Company Information