Required Skills

Cyber Security Engineer

Work Authorization

  • US Citizen

  • Green Card

  • EAD (OPT/CPT/GC/H4)

  • H1B Work Permit

Preferred Employment

  • Corp-Corp

  • W2-Permanent

  • W2-Contract

  • Contract to Hire

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 15th Jul 2025

JOB DETAIL

• Good knowledge of Identity Access Management (IAM), SAML, Federation, Privilege Access Management (PAM), and MFA technologies. • Data Security (Cryptography and Encryption).
• Knowledge of advanced Auditing and Log Management.
• Security vulnerabilities scanning tools.
• Knowledge of Cloud Access Broker Services (CASB) and configuration based on best practices.
• Data Loss Prevention (DLP) tools and configuration based on best practices.
• User behavior monitoring. • Data analysis of Network, Cloud, and Endpoint data.
• Centralized management of next generation firewalls and intrusion detection and prevention systems (IDS/IPS).
• Provide oversight and assess security controls for IaaS, PaaS, and SaaS services, while collaborating with system integrators and Client teams to deliver reliable and scalable security capabilities.
• Optimization of security tools and controls.
• Oversee and lead the implementation of all security solutions, develop technical, and reference architectures throughout the project duration.
• Perform as a subject matter expert on cloud technologies, build, and recommend security infrastructure from scratch and raise security risks in a timely manner.
• Develop security requirements for complex internet facing applications and associated infrastructure components.
• Responsible for assessing and reviewing end-to-end secure integrations including web services and APIs.
• Work closely with Client security team and third party system integrators on security engineering related issues and resolving the issues without affecting the overall project delivery timelines.
• Monitors information systems for security incidents and vulnerabilities; develops monitoring and visibility capabilities; reports on incidents, vulnerabilities, and trends.
• Analyzes trends, news, advisories, and changes in threat and conduct security assessments with risk mitigation plans. • Review vulnerability management reports and follow-up with technical stakeholders on remediation efforts.
• Responds to information system security incidents, including investigation of, countermeasures to, and recovery from computer-based attacks, unauthorized access, and policy breaches; interacts and coordinates with incident responders.

Company Information