Job Description :
* Understands business objectives and problems, identifies alternative solutions, performs studies and cost/benefit analysis of alternatives.
* Analyses user requirements, procedures, and problems to automate processing or to improve existing computer system: Confers with personnel of organizational units involved to analyse current operational procedures, identify problems, and learn specific input and output requirements, such as forms of data input, how data is to be; summarized, and formats for reports. Writes detailed description of user needs, program functions, and steps required to develop or modify computer program.
* Reviews computer system capabilities, specifications, and scheduling limitations to determine if requested program or program change is possible within existing system.
Additional job details and special considerations :
* Supports TIERS Operations, AWS Cloud Migration and TIERS Cloud Migration's Authority to Connect project by applying information security threat intelligence to identify and exploit vulnerabilities within different environments.
* Daily you will perform analysis of on-prem, and cloud security and operations related to security.
* Our ideal candidate has experience working in a large operations and development environments and is knowledgeable about custodian artifacts that are regulatory requirements.
* In this role you will assist IT operations and development teams to meet industry standards and be proficient with the latest cybersecurity software.
* Daily interacts with all aspects of IT responsible for the management of DevSecOps.
* Requires knowledge of infrastructure in IT operations including understanding of databases and system administration.
* This position may be required to come to the office once a week or more.
CANDIDATE SKILLS :
* Coordinates and executes security policies and controls, as well as assess vulnerabilities within the company.
* Experience with data and network security processing, security systems management, and security violation investigation.
* Daily performs analysis of on-prem and cloud security operations and works with DevSecOps teams with delivery of security related activities including audits, documentation, and reporting.
* Understands regulatory requirements, has in-depth knowledge of industry standards and trends, and is proficient with the latest cybersecurity software.
* Works with DevSecOps and custodians.
* Experience with managing various projects and ability to plan and oversees all aspects of the projects.
* Strong ability to identify problems/issues, analyse and evaluate alternatives and recommend/implement effective solutions.
* Orchestrate calls to include, but not limited to project kick-off calls, notification of high/critical findings during the testing process, and close out calls to review test findings, evidence, process steps to reproduce, and remediation recommendations.
* Experience implementing security measures to protect computer systems, networks, and data.
* Information security analysts are expected to stay up to date on the latest intelligence, including hackers methodologies, in order to anticipate breaches.* Experience working with Archer GRC, Dynatrace, Splunk, Imperva Web Application Firewall, Qualys and MS Office tools.
Regards,
VIJAY KUMAR A
Contact: +1 Ext 119
vkm
Cynosure Technologies, LLC
2401 Fountain View D, STE 502, Houston TX 77057
https://tinyurl.com/3nsr5jjm
#AWS #SECURITY #CYBERSECURITY #CLOUD #TEXASINTEGRATEDELIGIBILITYREDESIGNSYSTEM #SAPQM #SAPTM #staffing #recurting #staffingServices #StateofTexas #Texas #GSM
|