Overview
Remote
$50 - $60
Contract - Independent
Contract - W2
Contract - 1 Year(s)
Able to Provide Sponsorship
Skills
Amazon Web Services
ArcSight
Brand
CheckPoint
Cloud Computing
Communication
Cyber Security
CyberArk
Data-flow Diagrams
Docker
F5
Facets
FireEye
Firewall
HTML
IDS
IPS
IPsec
Information Security
Intrusion Detection
Network
Node.js
PHP
Payment Card Industry
Perl
Python
Qualys
RESTful
Regulatory Compliance
Research
SIEM
SSL
Sarbanes-Oxley
Scripting
Shell
Splunk
Supervision
Symantec
Thread
Threat Modeling
Vulnerability Assessment
Web Development
Wireless Networking
Microsoft Azure
Mobile Applications
Mobile Device Management
MobileIron
Modeling
Java
Leadership
Malware Analysis
Management
Master Data Management
Job Details
Mandatory Areas Must Have Skills :
Cyber Security : 10+ Years
Java, frameworks, python, Nodejs : 5+ Years
Threat Modelling like STRIDE, PASTA, TRIKE, ATTACK TREE, DREAD, KILL CHAIN, CAPEC : 5+ Years
SSL: 8+ Years
Firewall policy design: 5+ Years
vulnerability analysis & mitigation: 5+ Years
Understanding load balancers (ex A10, F5), firewalls (ex CheckPoint), Venafi, MDM (ex - Mobile Iron), Cloud (ex - AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex - Damballa), Privileged Accounts (ex CyberArk), SIEM (ex ArcSight), Log & Event (ex Splunk), Intrusion IDS/IPS (ex Symantec): 5+ Years
Cloud Platform (ex PCF, Docker), Scanning (ex Qualys), AppSec (ex - Veracode): 5+ Years
JOB DESCRIPTION:
* Leads information security review of new technologies, designs, and remediation planning efforts.
* Collaborates with Engineering & Operations Teams to address security vulnerabilities found via PSIRTs, scans or breaches
* Investigates and/or leads identifying security needs & recommends plans/resolutions. Implements, tests & monitors info security improvements.
* Significant experience with the analysis of underlying technologies that form the solution necessary for the application of threat identification, analysis, and thread model design. The threat model depicts trust boundary, threat agent(s), threat vector(s), and safeguard(s) necessary to protect person, asset, data, and brand.
* Significant experience with implementation of various threat modelling approaches pertaining to one or more of the following STRIDE, PASTA, TRIKE, ATTACK TREE, DREAD, KILL CHAIN, CAPEC,
* Mobile Application threat model, Cyber Threat Tree, and data flow diagram
* Subject matter expert in multiple facets of network & information security, including Firewall policy design, SSL Certificate management,
* vulnerability analysis & mitigation, and other topics as assigned.
* Advanced understanding of IP/Security solutions & technologies applicable to the Wireless Network Architecture.
* Subject matter expert in all facets of network & information security, including Firewall policy design, SSL Certificate management, vulnerability analysis & mitigation, and other topics as assigned.
* Ability to create technical specification and requirements and work independently and with no direction/supervision. Able to quickly adapt to new or evolving technologies related to new product & services requiring validation or research.
* Strong verbal and communication skills with diverse cross functional groups. Ability to present advanced concepts to leadership, peers, and others in subordinate roles.
* Understanding load balancers (ex A10, F5), firewalls (ex CheckPoint), Venafi, MDM (ex - Mobile Iron), Cloud (ex - AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex - Damballa), Privileged Accounts (ex CyberArk), SIEM (ex ArcSight), Log & Event (ex Splunk), Intrusion IDS/IPS (ex Symantec),
* Cloud Platform (ex PCF, Docker), Scanning (ex Qualys), AppSec (ex - Veracode)
* Advance knowledge of Scripting tools (Python/Perl/Shell/HTML/PHP)
* Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI
* Working knowledge of web application development, RESTful APIs, and skills in Java, frameworks, python, Nodejs.
* Experience with mobile applications, and handset security.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.