Hello,
*Greetings!* This is *Avanish* from *NLB Services*. We are a global recruitment company with a specialization in hiring IT professionals. One of our clients is seeking a *Senior PKI Security Engineer *in *Atlanta, GA 30354 (Hybrid)**.* *Position: **Senior PKI Security Engineer* *Location: **Atlanta, GA 30354 (Hybrid)* *Type: Contract* *Job Description:* *Summary:-* Security professionals with extensive hands-on experience on PKI technology and market trends, assess the impact of emerging security threats on the enterprise risk level, recommend technology direction and/or adjustments to incorporate in the business plans. Consults with other members of team, client, and end users to identify PKI requirements and develop requirements documentation. *Professional Summary:-* - High performing and self-motivated, extensive professional experience in designing, implementing and managing PKI and security solutions. - Solid understanding of PKI concepts and security properties. - Support PKI-based products (including Web servers and certification authorities) and Common PKI-based protocols (including SSL and TLS, HTTPs, or LDAPs). - Experience with certificate authority (CA) implementation in compliance with the Federal PKI (FPKI) Common Policy Authority. - Review, patch, the Red Hat Certificate System source code for defects. - Develop Red Hat Certificate System source code to implement new capability. - Strong expertise in PKI Engineering Support and troubleshooting. - Experience with HSM design and implementation. - Working knowledge with OSI layer 2-7 security tactics and different kinds of attacks. - Demonstrated abilities in working with team to deliver projects to clients within specified timeframe and as per specifications. *Responsibilities:-* - Support and mature Delta’s PKI (Public Key Infrastructure) program, including strategy, governance, implementation, operations, and continuous alignment with compliance and regulatory requirements. - Engage with system owners, business teams, and IT stakeholders in strategic discussions to provide best in class PKI security strategy and industry guidance to maximize long-term business objectives. *Technical Skills Details:-* - Good working experience with scripting platforms (PowerShell, Batch, Json, Python, YAML, etc) - Expert in PKI design, implementation, administration, and provisioning in AWS. Extensive experience in AWS PKI services: KMS, CloudHSM, ACM, CloudFront, Secrets Manager, CloudTrail - Experience with PKI-based products (including Web servers and certification authorities) and Common PKI-based protocols (including SSL and TLS, HTTPs, or LDAPs). - A solid understanding of Public Key Infrastructure (PKI) including technology, standards, and implementations, with experience managing, configuring, or supporting a PKI certificate authority - Experience with certificate authority (CA) implementation in compliance with the Federal PKI (FPKI) Common Policy Authority. - Conduct technical research and set cloud security direction and strategy - Experience in automating certificate renewal and certificate life cycle management. - Experience with Microsoft's PKI Technologies and latest Windows and Linux server platforms. - Experience with integration of Venafi with Microsoft PKI Technologies and Public PKI Providers. - Experience on IBM Mainframe platforms Encryption (TKE, UKO, SGKLM, etc). - Experience in areas such as identity management, provisioning, authentication, authorization, certification/governance, monitoring along, including HSPD-12 compliance. - Experience developing and implementing IT Contingency Plans. - Strong communication skills. - Strong attention to detail. - Keen diagnostic and problem solving skills. *Technical/Professional Certifications & Skills (Preferred)* - Bachelor’s Degree in Information Security, Computer Science, or related field. - 5+ years of professional experience in PKI, Venafi, digital certificates management, IBM-Mainframe, Scripting and Information Security domains. - Experience with Agile software development methodologies. - Preferred one or more certifications: CISSP, AWS Cloud Certificates, CISM or other Cyber Security related certification. *Responsibilities:-* - Responsible for the design, testing, evaluation, implementation, support, management, and deployment of security systems/devices used to safeguard the organization’s information assets. - Also responsible for analysing the information security environment and assisting with the development of security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure. - Works with the technical team to recover data after a security breach. - Configures and installs firewalls and intrusion detection systems. - Develops automation scripts to handle and track incidents. - Investigates intrusion incidents, conducts forensic investigations and mounts incident responses. - Delivers technical reports and formal papers on test findings. - Installs firewalls, data encryption, and other security measures. - Maintains access by providing information, resources, and technical support. - Ensures authorized access by investigating improper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements. - Updates job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations. - Accomplishes information systems and organization mission by completing related results as needed. - Builds, deploys, and tracks security measurements for computer systems and networks. - Mitigates security vulnerabilities by implementing applicable solutions and tools. - Performs vulnerability testing, risk analyses, and security assessments. - Collaborates with colleagues on authentication, authorization, and encryption solutions. - Tests security solutions using industry standard analysis criteria. - Responds to information security issues during each stage of a project’s lifecycle. - Performs risk assessments and testing of data processing systems. - Establishes system controls by developing framework for controls and levels of access; recommending improvements - Establishes computer and terminal physical security by developing standards, policies, and procedures; coordinates with facilities security; recommends improvements. - Safeguards computer files by performing regular backups; developing procedures for source code management and disaster preparedness; recommends improvements. - Determines the sensitivity of the data in order to recommend the appropriate security needs. - Develops proposals for, and consider cost effective equipment options to satisfy security needs. - Communicates with the technical team, management team and users companywide if data security is breached. - Designs infrastructure to alert the technical team of detected vulnerabilities. - Evaluates new technologies and processes that enhance security capabilities. - Supervises changes in software, hardware, facilities, telecommunications and user needs. - Defines, implements, and maintains corporate security policies. - Analyses and advises on new security technologies and program conformance. - Creates, tests, and implements network disaster recovery plans. - Recommends security enhancements and purchases. - Trains staff on network and information security procedures. - Develops security awareness by providing orientation, educational programs, and on-going communication. - Recommends modifications in legal, technical and regulatory areas that affect IT security. *Thanks & Regards,* *Avanish Pandey* *---------------------------------------* *Next Level Business Services, Inc.* *[email protected]* <[email protected]> *(904) 290-8616 || **LinkedIn* <https://www.linkedin.com/in/avanish-pandey-83897493/> -- You received this message because you are subscribed to the Google Groups "Powerbuilder Assignments" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion visit https://groups.google.com/d/msgid/powerbuilder-assignments/CAM%3D5NfV29rZpJa3bvstZhDMyzrD22etYVraG3tjE6mBmH9Ubeg%40mail.gmail.com.
