Cloud DevOps Engineer| Hybrid| local to GA

Send me resume local to GA with attache DL.

Job Title: Sr. Cloud Devops Engineer

Location: 1030 Delta Boulevard Atlanta, GA 30354 (hybrid)

Duration: 13+ Contract with possible extension/conversion

Visa: USC,GC,H4

Notes:

  • Candidates need to have Data encryption, firewall, data management, security breach, vulnerability check, intrusion , incidence response experience, Application Security backgrounds, i.e DAST, SAST, VeraCode, Synk, Fortify, GitLab Ultimate or Wiz.
  • Focus on the below skills:
  • 1. Container Security & Experience:
  • • Priority is on candidates with strong container security experience (e.g., Kubernetes, OpenShift).
  • • Additional focus on cloud experience, though it’s secondary if the candidate excels in container security.
  • 2. DevOps with Security Focus:
  • • Looking for candidates with a solid DevOps background, combined with security knowledge (particularly rare but desired).
  • • Experience with CICD pipeline, GitLab security, and container-related security.
  • 3. Skill Combination:
  • • Ideal candidates will have a mix of container security, cloud exposure, and DevOps/security experience.
  • • While they don’t need all the skills, strong proficiency in at least two of these areas is crucial.
  • 4. Security Knowledge:
  • • General understanding of security best practices is essential.
  • • Security certifications (e.g., Security+) are a plus, but not mandatory.
  • • Candidates must demonstrate knowledge of why security is critical in relevant areas.

Job Description:

  • Analyze the information security environment and assist with the development of security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure.
  • Work with the technical team to recover data after a security breach.
  • Configure and install firewalls and intrusion detection systems.
  • Develop automation scripts to handle and track incidents.
  • Investigate intrusion incidents, conduct forensic investigations, and mount incident responses.
  • Deliver technical reports and formal papers on test findings.
  • Install firewalls, data encryption, and other security measures.
  • Maintain access by providing information, resources, and technical support.
  • Ensure authorized access by investigating improper access, revoking access, reporting violations, monitoring information requests, and recommending improvements.
  • Update job knowledge by participating in educational opportunities, reading professional publications, maintaining personal networks, and participating in professional organizations.
  • Accomplish information systems and organization missions by completing related results as needed.
  • Build, deploy, and track security measurements for computer systems and networks.
  • Mitigate security vulnerabilities by implementing applicable solutions and tools.
  • Perform vulnerability testing, risk analyses, and security assessments.
  • Collaborate with colleagues on authentication, authorization, and encryption solutions.
  • Test security solutions using industry-standard analysis criteria.
  • Respond to information security issues during each stage of a project’s lifecycle.
  • Perform risk assessments and testing of data processing systems.
  • Establish system controls by developing frameworks for controls and levels of access, and recommend improvements.
  • Establish computer and terminal physical security by developing standards, policies, and procedures; coordinate with facilities security; and recommend improvements.
  • Safeguard computer files by performing regular backups, developing procedures for source code management and disaster preparedness, and recommending improvements.
  • Determine the sensitivity of the data to recommend appropriate security needs.
  • Develop proposals for cost-effective equipment options to satisfy security needs.
  • Communicate with the technical team, management team, and users companywide in case of data security breaches.
  • Design infrastructure to alert the technical team of detected vulnerabilities.
  • Evaluate new technologies and processes that enhance security capabilities.
  • Supervise changes in software, hardware, facilities, telecommunications, and user needs.
  • Define, implement, and maintain corporate security policies.
  • Analyze and advise on new security technologies and program conformance.
  • Create, test, and implement network disaster recovery plans.
  • Recommend security enhancements and purchases.
  • Train staff on network and information security procedures.
  • Develop security awareness by providing orientation, educational programs, and ongoing communication.
  • Recommend modifications in legal, technical, and regulatory areas that affect IT security.

Thanks & Regards,

Vishal Kashyap

Technical Recruiter

Email- Vishal@sourceinfotechs.com |

806, New Castle, Wilmington, DE, US, 19801

LinkedIn- https://www.linkedin.com/in/vishal-kashyap-4b18962a8/

Read more:

Daily Updated top 2000k+ VENDOR LISTS

Top 500+ USA JOBS HOTLIST

top staffing companies in usa

Updated bench sales hotlist

More Corp to corp hotlist

Join linkedin 58000+ US Active recruiters Network

Join No.1 Telegram channel for daily US JOBS and Hotlist Updated

Leave a Reply

Your email address will not be published. Required fields are marked *