cyber threats by implementing and maintaining security controls Monitoring systems for suspicious activity measures. : Implement and manage security technologies and controls, including firewalls, intrusion solutions. Design, implement, and maintain security controls and configurations within AWS environments Identity and Access Management (IAM), Security Groups, Network Access Control Lists (NACLs), Key Management Service Hub, AWS Config, and AWS CloudTrail); cloud security controls and compliance frameworks, such as AWS Well-Architected
Manage security technologies and controls, firewalls, intrusion detection / prevention systems (IDS / ensure timely resolution Design and implement security controls, configurations, and solutions to mitigate remediation actions Design and implement security controls and configurations within AWS environments Identity and Access Management (IAM), Security Groups, Network Access Control Lists (NACLs), Key Management Service investigations in AWS environments Integrate security controls and practices into the software development
knowledge of Infrastructure security architectures, vulnerabilities and controls including Active Directory Penetration Testing and/or simulating of security events for controlled testing and validating of infrastructure problem-solving skills. Analyze information to identify security control and/or capability gaps that impacts the organization's
Ensure proper data access, permissions, and security controls Collaborate with cross-functional teams to
practices and standards, security risks and controls in security and IT, and IT control frameworks IT audit
security patches and ensuring that proper security controls are present on endpoint resources. Provision advantageous. Sound knowledge of Information Security controls, concepts, and best practices is required
Responsibilities: Analyze information to identify security control and/or capability gaps that impacts the organization's knowledge of Infrastructure security architectures, vulnerabilities and controls including Active Directory Penetration Testing and/or simulating of security events for controlled testing and validating of infrastructure Advanced experience in configuring/managing security controls such as Firewall, IDS/IPS, EDR, NDR, UTM,
p>
technologies, practices and standards, security risks and controls in the areas of security and IT Good