Job Description :
Title: Information Security Engineer Duration: 1 Year + Location: Media, Pennsylvania Job Description Working knowledge of information security concepts and technologies such as: least privilege, networking, network segmentation, firewalls, IPS\IDS, network analyzers, encryption technologies, proxies, etc. Proven work experience as a system engineer or system security engineer Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocols Cloud security (AWS - Azure) architecture, environment, and WAF experience Experience with container management and containerization technology. Experience on Authentication, Single Sign-On Infrastructure (AD, Azure AD, VDS, Ping Federate); Experience implementing multi-factor authentication, single sign-on, identity management or related technologies Extensive experience on authentication and authorization strategies using SAML/OpenID/OAuth; Extensive experience in usage related Identity & Access Management & defining standards around data at & data in transit - encryption, authorization, authentication, and security mechanisms, especially the foundational elements of the Public Key Infrastructure. Experience in building and maintaining security controls Detailed technical knowledge of application, network, database and operating system security Hands on experience in security systems, controls and concepts Experience with network security and networking technologies Working knowledge of sub netting, DNS, encryption technologies and standards, VPNs, VLANs, VoIP and other network routing methods Network and web related protocols (TCP/IP, UDP, IPSEC, HTTP, HTTPS, routing protocols, etc Advanced Persistent Threats (APT), phishing and social engineering, network access controllers (NAC), gateway anti-malware and enhanced authentication Thorough understanding of the latest security principles, techniques, and protocols Certified in one or more of the following preferred: CISSP, CISA, CISM, CEH, technology specific (proxy, data loss prevention, firewall, etc Project Description: Engineer and implement security measures for the protection of computer systems, networks and information. Maintain awareness of information security policies, standards and requirements. Stay current on information security trends and risks. Drive identification and definition of system security requirements. Develop and document cloud, automation, and API security requirements. Analyze, design, develop, and continually evolve modern software-defined infrastructure and application patterns. Analyze cloud architecture and application vulnerabilities using cloud-native tools. Continuously evaluate the organization's existing cloud infrastructure security practices and help to define, standardize and measure security-related activities. Support cloud certification activities such as system hardening, vulnerability testing and scanning. Work closely with development, infrastructure and information security teams in an agile workflow to promote and mature DevOps methodologies. Design computer security architecture and develop detailed cyber security designs (network, applications, software development, operating system, virtualization, cloud, automation, etc) with input from various stakeholders (Information Security, IT, etc) while working in a hybrid cloud/traditional data center environment. Prepare and document designs, architectures, configuration standards, standard operating procedures and protocols. Act as an advisor to internal teams enabling them to build and design products securely and efficiently. Develop technical solutions to help mitigate security vulnerabilities and automate repeatable tasks to reduce the risk of fraud, abuse and misuse. Communicate technical application security concepts to employees, including developers, architects, and managers. Assess the security posture, develop risk profiles, specify security requirements, and identify mitigation measures to safeguard public facing Web applications. Streamline usage of security technologies in a dynamic environment through automation and orchestration platforms.