What are the responsibilities and job description for the Cyber Security Architect position at VTekis Consulting LLP?
Company Description
We provide Recruitment and Staffing services to many industries and domain through our innovative and customized solutions and passionate commitment to research. Ability to understand the hiring strategies, availability of talent and compensation benchmarking makes us proud hiring partner for various industries. We work as trusted business partners and always strive to deliver the most value and highest return on investment for our clients. We are highly trained business professionals with strong understanding of clients need. We work closely with the leading staffing trade associations, training, and research organizations to ensure we are knowledgeable of the latest industry trends and technologies.
Job Description
Job Description:
- Looking for Azure Cloud Security Architect
- The person should have good understanding in system threat modeling.
- Experience performing threat modeling and design reviews to assess security implications and mitigating controls for the security solutions.
- Should be good in documenting, taking the screen shots of the system and able to deliver quality security documents of the system.
- Should have very good understanding of cyber security related concepts(Just example the way Authorization and Authorization work etc.,). Because this understating is necessary to deliver quality documents.
- He may not have system design skills of security but should be able to understand the existing system and able to manage the operations.
- Shall have experience on security monitoring on platform and application level.
- Expertise in Azure security , in-depth understanding of their service catalogs, security offerings and automation opportunities
- Deep experience on implementing security controls on AKS Cluster, Active Directory , MFA, API’s and ADB2C.
- Experience on control plane and data plane security implementation.
- Good knowledge on zero trust security architecture.
- Knowledge and implementation experience on mTLS and azure managed identity,
Apart from above points, candidate must be good with below skills.
Security Risk Management Plan -
Task Tools and Lifecycle Phases -
- Cybersecurity Bill of Material –
Approach for Threat Modeling
Asset Identification -
Application Overview
Decompose the Application -
Identification of Threats -
Threat Mapping (STRIDE) -
Risk Rating and Tools -
Report -
Security Risk Analysis -
Ex:- CVSS 3.0 / 3.1
Security Risk Evaluation -
Security V & V Activities -
Residual Security Risk Analysis -
Traceability Matrix -
Security Risk Management Report
Regards,
Mohammed Ilyas,
PH - 229-264-4024 or Text - 229-469-1455 or you can share the updated resume at Mohammed@vtekis. com
Additional Information
All your information will be kept confidential according to EEO guidelines.