Hello!
Greetings from QNC Consulting!
We have an urgent requirement for the below position. Please go through the job description and let me know you’re interested.
POSITION DETAILS:
Job Role: Application Security Specialist
Location: Whitehouse station NJ
Duration: Longterm
JD:
• 6 to 8 years of experience in consulting/Implementation experience around Data Protection & Identity and Access Management solutions
• Hands on experience in performing 3rd party tool based automatic sensitive data discovery (Database, File shares / Sharepoint)
• Good hands on experience in developing Powershell scripts (Windows) / Shell scripts (Linux)
• Hands on experience in implementation of Identity and Access Management solutions
• Hands on experience in Windows Active Directory and configuring Roles / Groups / Access Permissions
• Good knowledge around Data Classification and Data Governance
• Familiarity in Data Classification and Data Governance tools like Titus / BoldenJames & Varonis
• Good communication skills
• Good in interfacing with clients (Client interaction / customer stakeholder management)
• Plan / Analyze the requirements to develop/customize script (PowerShell) for File Share enumeration.
• In parallel evaluate feasibility of leveraging existing Microsoft SysInternal tools like ShareEnum for file share mining (name, location, permissions, files, size etc.) or the feasibility of customizing the existing Microsoft sysinternal tools
• Obtain Active Directory dump (users, groups, org-group, manager etc.) or Query Active Directory
• Correlate File Share mining with AD group to arrive at scan priority for shares
• Identify Red data (sensitive data) scan prioritization criteria (based on AD group, file types/numbers etc.)
• Identify dormant Files Shares & flag for Archival
• Continue the scan and correlation of fileshares with the department
• Perform scanning of the file shares as per priority
• Remediate unmanaged flagged file share permissions
• Personal – file share drives should not be shared with others
• Unmanaged – permissions should be granted through AD groups
• Public - Reach out to the business groups with the next steps for remediation
• Prepare plan for Phase 2 (initial certification & remediation and OIM integration)"
No comments:
Post a Comment