Job Description :
Required
Experience with IAM solutions, deployments, and technologies (SAML, Kerberos, LDAP/AD, etc as well as encryption mechanisms, key/certification management, and practical deployments
Experience with solutions/technologies for host-based security, OS hardening, DLP, and endpoint monitoring / patch management
Experience with Firewalls, IDS/IPS, VPN, and other network security components from an evaluation, deployment assessment, and audit perspective
Vulnerability Assessment, Penetration Testing, and Threat Modeling background with experience using numerous tools/technologies/methodologies like Appscan etc.
Knowledge and experience in designing database and data lake architectures
Knowledge of OWASP Top 10 and SANS Top 25 and how to effectively remediate vulnerabilities associated with each
Working knowledge of mainstream development languages (e.g. C/C++, Java, Ruby, Python, etc and an understanding of associated vulnerabilities
Detailed knowledge and experience of application, network, and platform vulnerabilities; ability to explain these to technical management
Proactive approach toward engaging with stakeholders, undertaking security architecture/design reviews, and documenting all findings
Ability to handle multiple concurrent assessments, formulate and adhere to timelines and deliverables
Ability to articulate technology/business risks to technical and non-technical audiences
9+ years of relevant work experience, including client-facing roles and working with large organizations
Desired
Experience with asset discovery and security analytics
Knowledge and experience with cyber kill chain, defense in depth, and similar concepts
Knowledge and experience with various standards (PCI/DSS, SOX, HIPAA etc
Bachelors in Computer Science or equivalent degree/work experience
CISSP, CISA, SANS GCIH or GCFA, CISM, CCSK, CEH, OSCP certifications a plus


Client : ARICENT

             

Similar Jobs you may be interested in ..