Cyber Security Architect
  • EATEAM INC
115 Days Ago
NA
NA
Sylmar-CA
8-12 Years
Required Skills: Azure Cloud Security Architect, Security controls on AKS Cluster, Active Directory, MFA, API's and ADB2C
Job Description
Title : Cyber Security Architect
Location : Sylmar, CA ( Day 1 onsite )
Hire Type-Contract
 
 
Job Description:
  • Looking for Azure Cloud Security Architect
  • The person should have good understanding in system threat modeling.
  • Experience performing threat modeling and design reviews to assess security implications and mitigating controls for the security solutions.
  • Should be good in documenting, taking the screen shots of the system and able to deliver quality security documents of the system.
  • Should have very good understanding of cyber security related concepts(Just example the way Authorization and Authorization work etc.,). Because this understating is necessary to deliver quality documents.
  • He may not have system design skills of security but should be able to understand the existing system and able to manage the operations.
  • Shall have experience on security monitoring on platform and application level.
  • Expertise in Azure security , in-depth understanding of their service catalogs, security offerings and automation opportunities
  • Deep experience on implementing security controls on AKS Cluster, Active Directory , MFA, API’s and ADB2C.
  • Experience on control plane and data plane security implementation.
  • Good knowledge on zero trust security architecture.
  • Knowledge and implementation experience on mTLS and azure managed identity, 
 
Apart from above points, candidate must be good with below skills.
 
Security Risk Management Plan      -
                  Task Tools and Lifecycle Phases      -
                 Cybersecurity Bill of Material           –
                  Approach for Threat Modeling        
                           Asset Identification                -
                           Application Overview            
                           Decompose the Application    -
                           Identification of Threats         -
                           Threat Mapping (STRIDE)      -
                           Risk Rating and Tools            -
                           Report                                   -
Security Risk Analysis                     -
                           Ex:- CVSS 3.0 / 3.1
                  Security Risk Evaluation                  -
                  Security V & V Activities                  -
                  Residual Security Risk Analysis       -
                  Traceability Matrix                          -
                  Security Risk Management Report  

Jobseeker

Looking For Job?
Search Jobs

Recruiter

Are You Recruiting?
Search Candidates