Job Description :
Role : Info Security Sr Advisor
Duration : Long Term
Location : Indianapolis, IN/Remote
Interview: Phone and Skype  

Initially remote and then onsite.  

Skills: 1. Automation of security guardrails as provided by architecture teams2. Work with application teams to identify security automation for cloudEnvironments3. Automation of IAM permissions4. Automation of security reviews in service catalog5. Setting up Netskope IaaS to automate security config reviews6. Cloud Security backend process automation Cloud Security OperationsSecurity Admin & SupportAWS backgroundArchitecture Cloud experience• (AWS/Azure) – Cloud Solution Architecture• Security Background• CertifiedSecurity Analyst Sr• Assurance• Experience in an Information Assurance or Audit Role – Security Admin/Assurance• AWS and Security backgroundInformation Security Advisor Sr – Automation Experience (AWS)• Extensive experience with Python and/or Application Development – Development Role• AWS or Azure background• Security Background Job description: If this job is assigned to any Government Business Division entity, the applicant and incumbent fall under a ''sensitive position'' work designation and may be subject to additional requirements beyond those associates outside Government Business Divisions. Requirements include but are not limited to more stringent and frequent background checks and/or government clearances, segregation of duties principles, role specific training, monitoring of daily job functions, and sensitive data handling instructions. Associates in these jobs must follow the specific policies, procedures, guidelines, etc. as stated by the Government Business Division in which they are employed.Develops, recommends, and implements enterprise information security policies, technical standards, guidelines, procedures, and other elements of an infrastructure necessary to support information security in compliance with established company policies, regulatory requirements, and generally accepted information security controls. Responsible for the selection and delivery of strategic network security, access control and secure transaction/messaging solutions. Primary duties may include, but are not limited to: leads system and network architecture support for information and network security technologies; leads development and execution of risk assessment methodologies to fit business, regulatory, and technical environment considerations; leads the development of requirements, system architecture, and software design of security products and services; leads the development of strategies for discovery, evaluation and response to new networking attacks; develops security incident response plans and strategies. Provides trouble resolution and serves as point of technical escalation on complex problems. Creates presentations and seeks IT management approval and acceptance of significant replacements or reconfigurations of major security systems serving the Enterprise. Sets vendor strategy and direction. May be assigned to project teams for technical consultation to business partners and developers. Designs & engineers comprehensive access management and network security technical solutions based on business requirements and defined technology standards; works with architecture to update technology direction & strategy. Develops reports supporting strategy and direction for management. Capable of serving as technical merger & acquisition lead. Acts as a subject matter expert among peers, with manager and senior management. Must be capable of providing top-tier support for 5 or more of the information security technology common body of knowledge skill sets: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security. Requires BS/BA in related field; 8+ years experience in systems administration and security aspects of information systems, computer networking, telecommunications, systems development and management; significant experience with multiple technical and business disciplines required.; or any combination of education and experience, which would provide an equivalent background. Advanced knowledge and understanding of industry-accepted data processing controls and concepts as applied to access management and network security technologies, hardware, software, data, network communications, and people. Security Certifications: CISSP and other advanced technical security certifications (e.g. Information Systems Security Architecture Professional, Info