Read JD First || C2C || GCP Cloud Architect || Cleveland, OH (Onsite)

Hello Partner,

Greetings of the day!

 

Fully Onsite: Need To Go 5 Days Onsite Every week.  

Only: USC/GC/GC-EAD/H4-EAD

NO – H1-B/OPT

 

Client: Key-Bank

Title: GCP Cloud Architect

Job Location: Cleveland, OH (Onsite)

Job Duration: 12 Months Can Be Extended

Alignment: C2C

 

Please find the JD below:

 

Mandatory Skills – If any mandatory skill is missing results in resume rejection.

<![if !supportLists]>·       <![endif]>GCP Architecture (Design & Implementation)

<![if !supportLists]>·       <![endif]>GCP Identity and Access Management (IAM)

<![if !supportLists]>·       <![endif]>Prisma Cloud

<![if !supportLists]>·       <![endif]>Role-Based Access Controls (RBAC)

 

Experience:

<![if !supportLists]>·       <![endif]>Proven experience as a GCP Cloud Architect with a strong focus on security and compliance.

<![if !supportLists]>·       <![endif]>Hands-on experience with GCP IAM, Prisma Cloud, and RBAC.

<![if !supportLists]>·       <![endif]>Experience working collaboratively with Cloud Foundations teams to implement secure cloud solutions.

 

Roles and Responsibility:

<![if !supportLists]>·       <![endif]>Architectural Design: Design and implement secure, scalable, and resilient GCP architectures tailored to business needs, ensuring compliance with industry best practices and security standards.

<![if !supportLists]>·       <![endif]>Security Controls: Develop, implement, and manage GCP security controls, including encryption, firewalls, and intrusion detection systems, to protect sensitive data and resources.

<![if !supportLists]>·       <![endif]>Policy Administration: Administer and enforce security policies and procedures across GCP environments, ensuring robust governance and compliance.

<![if !supportLists]>·       <![endif]>Identity and Access Management (IAM): Oversee GCP Identity and Access Management, including user authentication, authorization, and role-based access controls (RBAC), to ensure secure access to cloud resources.

<![if !supportLists]>·       <![endif]>Secure-in-Place Strategies: Implement and manage secure-in-place strategies to safeguard data at rest and in transit within the GCP environment.

<![if !supportLists]>·       <![endif]>Prisma Cloud Alert Remediation: Monitor and respond to Prisma Cloud alerts, perform threat analysis, and implement remediation actions to mitigate security risks.

<![if !supportLists]>·       <![endif]>Workload Identity Federation: Manage and integrate Workload Identity Federation to streamline access management for workloads running on GCP.

<![if !supportLists]>·       <![endif]>Continuous Improvement: Stay updated with the latest security trends, GCP services, and industry best practices to continuously enhance the organization’s security posture.

<![if !supportLists]>·       <![endif]>Collaboration: Work closely with cross-functional teams, including DevOps, IT, and application development, to ensure security is integrated into the cloud infrastructure and application lifecycle.

<![if !supportLists]>·       <![endif]>Documentation and Training: Develop comprehensive documentation for security policies, procedures, and architectures. Provide training and guidance to internal teams on GCP security best practices.

 

 

 

 

 

 

With Regards, 

Abhinav Pratap

Talent Acquisition Specialist

PRO IT, Inc. 

E-Mail: [email protected]  

 

A logo with text and hands  Description automatically generated with medium confidence

www.proit-inc.com

******************************************************************************************************************************************************************************** 

Note: We respect your Online Privacy. This is not unsolicited mail. Under Bills.1618 Title III passed by the 105th U.S. Congress this mail cannot be considered unsolicited as long as we include Contact information and a method to be removed from our mailing list. If you are not interested in receiving our e-mails, then please reply with a “REMOVE” in the subject line at [email protected] and mention all the e-mail addresses to be removed with any e-mail addresses, which might be diverting the e-mails to you. We are sorry for the inconvenience. 

 ********************************************************************************************************************************************************************************

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments