Hello,


*Greetings!*



This is *Avanish* from *NLB Services*. We are a global recruitment company
with a specialization in hiring IT professionals.  One of our clients is
seeking a *Senior PKI Security Engineer *in *Atlanta, GA 30354 (Hybrid)**.*



*Position: **Senior PKI Security Engineer*

*Location: **Atlanta, GA 30354 (Hybrid)*

*Type: Contract*



*Job Description:*



*Summary:-*

Security professionals with extensive hands-on experience on PKI technology
and market trends, assess the impact of emerging security threats on the
enterprise risk level, recommend technology direction and/or adjustments to
incorporate in the business plans. Consults with other members of team,
client, and end users to identify PKI requirements and develop requirements
documentation.


*Professional Summary:-*

   - High performing and self-motivated, extensive professional experience
   in designing, implementing and managing PKI and security solutions.
   - Solid understanding of PKI concepts and security properties.
   - Support PKI-based products (including Web servers and certification
   authorities) and Common PKI-based protocols (including SSL and TLS, HTTPs,
   or LDAPs).
   - Experience with certificate authority (CA) implementation in
   compliance with the Federal PKI (FPKI) Common Policy Authority.
   - Review, patch, the Red Hat Certificate System source code for defects.
   - Develop Red Hat Certificate System source code to implement new
   capability.
   - Strong expertise in PKI Engineering Support and troubleshooting.
   - Experience with HSM design and implementation.
   - Working knowledge with OSI layer 2-7 security tactics and different
   kinds of attacks.
   - Demonstrated abilities in working with team to deliver projects to
   clients within specified timeframe and as per specifications.



*Responsibilities:-*

   - Support and mature Delta’s PKI (Public Key Infrastructure) program,
   including strategy, governance, implementation, operations, and continuous
   alignment with compliance and regulatory requirements.
   - Engage with system owners, business teams, and IT stakeholders in
   strategic discussions to provide best in class PKI security strategy and
   industry guidance to maximize long-term business objectives.


*Technical Skills Details:-*

   - Good working experience with scripting platforms (PowerShell, Batch,
   Json, Python, YAML, etc)
   - Expert in PKI design, implementation, administration, and provisioning
   in AWS. Extensive experience in AWS PKI services: KMS, CloudHSM, ACM,
   CloudFront, Secrets Manager, CloudTrail
   - Experience with PKI-based products (including Web servers and
   certification authorities) and Common PKI-based protocols (including SSL
   and TLS, HTTPs, or LDAPs).
   - A solid understanding of Public Key Infrastructure (PKI) including
   technology, standards, and implementations, with experience managing,
   configuring, or supporting a PKI certificate authority
   - Experience with certificate authority (CA) implementation in
   compliance with the Federal PKI (FPKI) Common Policy Authority.
   - Conduct technical research and set cloud security direction and
   strategy
   - Experience in automating certificate renewal and certificate life
   cycle management.
   - Experience with Microsoft's PKI Technologies and latest Windows and
   Linux server platforms.
   - Experience with integration of Venafi with Microsoft PKI Technologies
   and Public PKI Providers.
   - Experience on IBM Mainframe platforms Encryption (TKE, UKO, SGKLM,
   etc).
   - Experience in areas such as identity management, provisioning,
   authentication, authorization, certification/governance, monitoring along,
   including HSPD-12 compliance.
   - Experience developing and implementing IT Contingency Plans.
   - Strong communication skills.
   - Strong attention to detail.
   - Keen diagnostic and problem solving skills.


*Technical/Professional Certifications & Skills (Preferred)*

   - Bachelor’s Degree in Information Security, Computer Science, or
   related field.
   - 5+ years of professional experience in PKI, Venafi, digital
   certificates management, IBM-Mainframe, Scripting and Information Security
   domains.
   - Experience with Agile software development methodologies.
   - Preferred one or more certifications: CISSP, AWS Cloud Certificates,
   CISM or other Cyber Security related certification.



*Responsibilities:-*

   - Responsible for the design, testing, evaluation, implementation,
   support, management, and deployment of security systems/devices used to
   safeguard the organization’s information assets.
   - Also responsible for analysing the information security environment
   and assisting with the development of security measures to safeguard
   information against accidental or unauthorized modification, destruction,
   or disclosure.
   - Works with the technical team to recover data after a security breach.
   - Configures and installs firewalls and intrusion detection systems.
   - Develops automation scripts to handle and track incidents.
   - Investigates intrusion incidents, conducts forensic investigations and
   mounts incident responses.
   - Delivers technical reports and formal papers on test findings.
   - Installs firewalls, data encryption, and other security measures.
   - Maintains access by providing information, resources, and technical
   support.
   - Ensures authorized access by investigating improper access; revoking
   access; reporting violations; monitoring information requests by new
   programming; recommending improvements.
   - Updates job knowledge by participating in educational opportunities;
   reading professional publications; maintaining personal networks;
   participating in professional organizations.
   - Accomplishes information systems and organization mission by
   completing related results as needed.
   - Builds, deploys, and tracks security measurements for computer systems
   and networks.
   - Mitigates security vulnerabilities by implementing applicable
   solutions and tools.
   - Performs vulnerability testing, risk analyses, and security
   assessments.
   - Collaborates with colleagues on authentication, authorization, and
   encryption solutions.
   - Tests security solutions using industry standard analysis criteria.
   - Responds to information security issues during each stage of a
   project’s lifecycle.
   - Performs risk assessments and testing of data processing systems.
   - Establishes system controls by developing framework for controls and
   levels of access; recommending improvements
   - Establishes computer and terminal physical security by developing
   standards, policies, and procedures; coordinates with facilities security;
   recommends improvements.
   - Safeguards computer files by performing regular backups; developing
   procedures for source code management and disaster preparedness; recommends
   improvements.
   - Determines the sensitivity of the data in order to recommend the
   appropriate security needs.
   - Develops proposals for, and consider cost effective equipment options
   to satisfy security needs.
   - Communicates with the technical team, management team and users
   companywide if data security is breached.
   - Designs infrastructure to alert the technical team of detected
   vulnerabilities.
   - Evaluates new technologies and processes that enhance security
   capabilities.
   - Supervises changes in software, hardware, facilities,
   telecommunications and user needs.
   - Defines, implements, and maintains corporate security policies.
   - Analyses and advises on new security technologies and program
   conformance.
   - Creates, tests, and implements network disaster recovery plans.
   - Recommends security enhancements and purchases.
   - Trains staff on network and information security procedures.
   - Develops security awareness by providing orientation, educational
   programs, and on-going communication.
   - Recommends modifications in legal, technical and regulatory areas that
   affect IT security.



*Thanks & Regards,*

*Avanish Pandey*

*---------------------------------------*

*Next Level Business Services, Inc.*

*avanish.pan...@recruiter.nlbtech.com*
<avanish.pan...@recruiter.nlbtech.com>

*(904) 290-8616  || **LinkedIn*
<https://www.linkedin.com/in/avanish-pandey-83897493/>

-- 
You received this message because you are subscribed to the Google Groups 
"Powerbuilder Assignments" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to powerbuilder-assignments+unsubscr...@googlegroups.com.
To view this discussion visit 
https://groups.google.com/d/msgid/powerbuilder-assignments/CAM%3D5NfV29rZpJa3bvstZhDMyzrD22etYVraG3tjE6mBmH9Ubeg%40mail.gmail.com.

Reply via email to