Monday, December 16, 2024

Cloud Security Architect (Systems Analyst- 3) Need local to Texas

Hello, 

Hope you are doing well.


We do have a role for a Cloud Architect (Systems Analyst 3) with our client. Below I have shared the detailed job description. Let me know if you would be interested to discuss further about this role.


Position: Cloud Security Architect (Systems Analyst- 3)

Need local to Texas

Remote

Duration: 6-12 Months


Supports TIERS Operations, AWS Cloud Migration and TIERS Cloud Migration's Authority to Connect project by applying information security threat intelligence to identify and exploit vulnerabilities within different environments. On a daily basis you will perform analysis of on-prem and cloud security and monitor security operations including security architecture reviews. Our ideal candidate understands regulatory requirements, has in-depth knowledge of industry standards and trends, and is proficient with the latest cybersecurity software. On a daily basis interacts with all aspects of IT responsible for the management of DevSecOps.


II.  CANDIDATE SKILLS AND QUALIFICATIONS


Minimum Requirements:


8 Required Coordinates and executes security policies and controls, as well as assess vulnerabilities within the company.

8 Required Experience with data and network security processing, security systems management, and security violation investigation.

8 Required On a daily basis performs analysis of on-prem and cloud security and monitor security operations including security architecture reviews.

8 Required Understands regulatory requirements, has in-depth knowledge of industry standards and trends, and is proficient with the latest cybersecurity software.

8 Required In-depth knowledge of AWS Cloud Security.

8 Required Experience with managing various projects and ability to plan and oversees all aspects of the projects.

8 Required Strong ability to identify problems/issues, analyze and evaluate alternatives and recommend/implement effective solutions.

8 Required Orchestrate calls to include, but not limited to project kick-off calls, notification of high/critical findings during the testing process, and close out calls to review test findings, evidence, process steps to reproduce, and remediation recommendations.

8 Required Experience implementing security measures to protect computer systems, networks and data. Information security analysts are expected to stay up to date on the latest intelligence, including hackers’ methodologies, in order to anticipate breaches.

8 Required Extensive experience with working with and implementing NIST 800-37, NIST 800-53, MARS-E controls, POA&Ms, and developing Corrective Action Plans.

8 Required Review violations of computer security procedures and discuss procedures with HHSC/TIERS Security team. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.

8 Required In depth knowledge and hand on experience on AWS platform.

8 Required Experience with Security web application firewalls.

8 Required Experience with managing conflict and resolving issues at managerial levels.

8 Required Experience with reviewing and coordinating audit responses, evidence gathering, and plan of actions. Experience collaborating with IT departments to coordinate audit responses.

5 Preferred Skilled information technology professional with advanced experience developing and implementing IT policy, standards and procedures.

4 Preferred Experience in delivering technical training in cloud‐ based technology is a plus.

4 Preferred Experience providing Windows and Linux operating system and application support.

4 Preferred Experience with information security risk assessments.

4 Preferred Experience with security governance and documentation and security plan documents.

3 Preferred Experience ITIL - ticketing using Remedy and ServiceNow.

3 Preferred Ability to training staff on network and information security procedures, processes and information safeguarding.

3 Preferred Experience working with Archer GRC, Dynatrace, Splunk, Imperva Web Application Firewall, Qualys and MS Office tools.


Thanks & Regards


Raghu Kumar

M9 Consulting, Inc

E-Verified | Women Owned | Minority Certified Business

Phone: 512-515-9004 | Email: raghu@m9consulting.com

URL: www.m9consulting.com


No comments:

Post a Comment