Cybersecurity Architect :: TX Hybrid

Let Us Help You!
Helping You Realize Your Business Goals!

Hi,

 

I hope you’re doing well!

 

Please look at the requirements below, let us know of your interest, and send us your updated resume to shravan@spiceorb.com

 

Role: Principal Cybersecurity Engineer/ Jr Cybersecurity Architect

Location – Bellevue WA, Overland Park KS, Frisco TX, Ravinia GA, or Herndon VA – Hybrid

Domain Experience (If any) – Telecom Preferred but not mandatory

Must Have Skills

Cyber Security : 10+ Years

Java, frameworks, python, Nodejs : 5+ Years

Threat Modelling like STRIDE, PASTA, TRIKE, ATTACK TREE, DREAD, KILL CHAIN, CAPEC : 5+ Years

SSL: 8+ Years

Firewall policy design: 5+ Years

vulnerability analysis & mitigation: 5+ Years

Understanding load balancers (ex – A10, F5), firewalls (ex – CheckPoint), Venafi, MDM (ex – Mobile Iron), Cloud (ex – AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex – Damballa), Privileged Accounts (ex – CyberArk), SIEM (ex – ArcSight), Log & Event (ex – Splunk), Intrusion IDS/IPS (ex – Symantec): 5+ Years

Cloud Platform (ex – PCF, Docker), Scanning (ex – Qualys), AppSec (ex – Veracode): 5+ Years

This position serves as a subject matter expert which drives vision and results to enhance security posture within mobile device, IoT device, enterprise line of business applications, cloud, big data, and core and carrier network technologies as well as and other business units as needed as well as act as a Principal security advisor to cross-functional teams for the successful delivery of projects or services to enterprise customers.

• Leads information security review of new technologies, designs, and remediation planning efforts.

• Collaborates with Engineering & Operations Teams to address security vulnerabilities found via PSIRTs, scans or breaches

• Investigates and/or leads identifying security needs & recommends plans/resolutions. Implements, tests & monitors info security improvements.

• Significant experience with the analysis of underlying technologies that form the solution necessary for the application of threat identification,analysis, and thread model design. The threat model depicts the trust boundary, threat agent(s), threat vector(s), and safeguard(s) necessary to protect a person, asset, data, and brand.

• Significant experience with implementation of various threat modeling approaches pertaining to one or more of the following STRIDE, PASTA, TRIKE, ATTACK TREE, DREAD, KILL CHAIN, CAPEC,

• Mobile Application threat model, Cyber Threat Tree, and data flow diagram

• Subject matter expert in multiple facets of network & information security, including Firewall policy design, SSL Certificate management,

Thanks & Regards

Shravan

[email protected]

linkedin.com/in/shravan-kumar-91b72087

Submit Your Resume

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Most Voted
Newest Oldest
Inline Feedbacks
View all comments