Send me resume local to GA with attache DL.
Job Title: Sr. Cloud Devops Engineer
Location: 1030 Delta Boulevard Atlanta, GA 30354 (hybrid)
Duration: 13+ Contract with possible extension/conversion
Visa: USC,GC,H4
Notes:
- Candidates need to have Data encryption, firewall, data management, security breach, vulnerability check, intrusion , incidence response experience, Application Security backgrounds, i.e DAST, SAST, VeraCode, Synk, Fortify, GitLab Ultimate or Wiz.
- Focus on the below skills:
- 1. Container Security & Experience:
- • Priority is on candidates with strong container security experience (e.g., Kubernetes, OpenShift).
- • Additional focus on cloud experience, though it’s secondary if the candidate excels in container security.
- 2. DevOps with Security Focus:
- • Looking for candidates with a solid DevOps background, combined with security knowledge (particularly rare but desired).
- • Experience with CICD pipeline, GitLab security, and container-related security.
- 3. Skill Combination:
- • Ideal candidates will have a mix of container security, cloud exposure, and DevOps/security experience.
- • While they don’t need all the skills, strong proficiency in at least two of these areas is crucial.
- 4. Security Knowledge:
- • General understanding of security best practices is essential.
- • Security certifications (e.g., Security+) are a plus, but not mandatory.
- • Candidates must demonstrate knowledge of why security is critical in relevant areas.
Job Description:
- Analyze the information security environment and assist with the development of security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure.
- Work with the technical team to recover data after a security breach.
- Configure and install firewalls and intrusion detection systems.
- Develop automation scripts to handle and track incidents.
- Investigate intrusion incidents, conduct forensic investigations, and mount incident responses.
- Deliver technical reports and formal papers on test findings.
- Install firewalls, data encryption, and other security measures.
- Maintain access by providing information, resources, and technical support.
- Ensure authorized access by investigating improper access, revoking access, reporting violations, monitoring information requests, and recommending improvements.
- Update job knowledge by participating in educational opportunities, reading professional publications, maintaining personal networks, and participating in professional organizations.
- Accomplish information systems and organization missions by completing related results as needed.
- Build, deploy, and track security measurements for computer systems and networks.
- Mitigate security vulnerabilities by implementing applicable solutions and tools.
- Perform vulnerability testing, risk analyses, and security assessments.
- Collaborate with colleagues on authentication, authorization, and encryption solutions.
- Test security solutions using industry-standard analysis criteria.
- Respond to information security issues during each stage of a project’s lifecycle.
- Perform risk assessments and testing of data processing systems.
- Establish system controls by developing frameworks for controls and levels of access, and recommend improvements.
- Establish computer and terminal physical security by developing standards, policies, and procedures; coordinate with facilities security; and recommend improvements.
- Safeguard computer files by performing regular backups, developing procedures for source code management and disaster preparedness, and recommending improvements.
- Determine the sensitivity of the data to recommend appropriate security needs.
- Develop proposals for cost-effective equipment options to satisfy security needs.
- Communicate with the technical team, management team, and users companywide in case of data security breaches.
- Design infrastructure to alert the technical team of detected vulnerabilities.
- Evaluate new technologies and processes that enhance security capabilities.
- Supervise changes in software, hardware, facilities, telecommunications, and user needs.
- Define, implement, and maintain corporate security policies.
- Analyze and advise on new security technologies and program conformance.
- Create, test, and implement network disaster recovery plans.
- Recommend security enhancements and purchases.
- Train staff on network and information security procedures.
- Develop security awareness by providing orientation, educational programs, and ongoing communication.
- Recommend modifications in legal, technical, and regulatory areas that affect IT security.
Thanks & Regards,
Vishal Kashyap
Technical Recruiter
Email- Vishal@sourceinfotechs.com |
806, New Castle, Wilmington, DE, US, 19801
LinkedIn- https://www.linkedin.com/in/vishal-kashyap-4b18962a8/
Read more:
Daily Updated top 2000k+ VENDOR LISTS
Top 500+ USA JOBS HOTLIST
More Corp to corp hotlist
Join linkedin 58000+ US Active recruiters Network
Join No.1 Telegram channel for daily US JOBS and Hotlist Updated
