Hello,


*Greetings!*



This is *Avanish* from *NLB Services*. We are a global recruitment company
with a specialization in hiring IT professionals.  One of our clients is
seeking a *Senior PKI Security Engineer *in *Atlanta, GA 30354 (Hybrid)**.*



*Position: **Senior PKI Security Engineer*

*Location: **Atlanta, GA 30354 (Hybrid)*

*Type: Contract*



*Job Description:*



*Summary:-*

Security professionals with extensive hands-on experience on PKI technology
and market trends, assess the impact of emerging security threats on the
enterprise risk level, recommend technology direction and/or adjustments to
incorporate in the business plans. Consults with other members of team,
client, and end users to identify PKI requirements and develop requirements
documentation.


*Professional Summary:-*

   - High performing and self-motivated, extensive professional experience
   in designing, implementing and managing PKI and security solutions.
   - Solid understanding of PKI concepts and security properties.
   - Support PKI-based products (including Web servers and certification
   authorities) and Common PKI-based protocols (including SSL and TLS, HTTPs,
   or LDAPs).
   - Experience with certificate authority (CA) implementation in
   compliance with the Federal PKI (FPKI) Common Policy Authority.
   - Review, patch, the Red Hat Certificate System source code for defects.
   - Develop Red Hat Certificate System source code to implement new
   capability.
   - Strong expertise in PKI Engineering Support and troubleshooting.
   - Experience with HSM design and implementation.
   - Working knowledge with OSI layer 2-7 security tactics and different
   kinds of attacks.
   - Demonstrated abilities in working with team to deliver projects to
   clients within specified timeframe and as per specifications.



*Responsibilities:-*

   - Support and mature Delta’s PKI (Public Key Infrastructure) program,
   including strategy, governance, implementation, operations, and continuous
   alignment with compliance and regulatory requirements.
   - Engage with system owners, business teams, and IT stakeholders in
   strategic discussions to provide best in class PKI security strategy and
   industry guidance to maximize long-term business objectives.


*Technical Skills Details:-*

   - Good working experience with scripting platforms (PowerShell, Batch,
   Json, Python, YAML, etc)
   - Expert in PKI design, implementation, administration, and provisioning
   in AWS. Extensive experience in AWS PKI services: KMS, CloudHSM, ACM,
   CloudFront, Secrets Manager, CloudTrail
   - Experience with PKI-based products (including Web servers and
   certification authorities) and Common PKI-based protocols (including SSL
   and TLS, HTTPs, or LDAPs).
   - A solid understanding of Public Key Infrastructure (PKI) including
   technology, standards, and implementations, with experience managing,
   configuring, or supporting a PKI certificate authority
   - Experience with certificate authority (CA) implementation in
   compliance with the Federal PKI (FPKI) Common Policy Authority.
   - Conduct technical research and set cloud security direction and
   strategy
   - Experience in automating certificate renewal and certificate life
   cycle management.
   - Experience with Microsoft's PKI Technologies and latest Windows and
   Linux server platforms.
   - Experience with integration of Venafi with Microsoft PKI Technologies
   and Public PKI Providers.
   - Experience on IBM Mainframe platforms Encryption (TKE, UKO, SGKLM,
   etc).
   - Experience in areas such as identity management, provisioning,
   authentication, authorization, certification/governance, monitoring along,
   including HSPD-12 compliance.
   - Experience developing and implementing IT Contingency Plans.
   - Strong communication skills.
   - Strong attention to detail.
   - Keen diagnostic and problem solving skills.


*Technical/Professional Certifications & Skills (Preferred)*

   - Bachelor’s Degree in Information Security, Computer Science, or
   related field.
   - 5+ years of professional experience in PKI, Venafi, digital
   certificates management, IBM-Mainframe, Scripting and Information Security
   domains.
   - Experience with Agile software development methodologies.
   - Preferred one or more certifications: CISSP, AWS Cloud Certificates,
   CISM or other Cyber Security related certification.



*Responsibilities:-*

   - Responsible for the design, testing, evaluation, implementation,
   support, management, and deployment of security systems/devices used to
   safeguard the organization’s information assets.
   - Also responsible for analysing the information security environment
   and assisting with the development of security measures to safeguard
   information against accidental or unauthorized modification, destruction,
   or disclosure.
   - Works with the technical team to recover data after a security breach.
   - Configures and installs firewalls and intrusion detection systems.
   - Develops automation scripts to handle and track incidents.
   - Investigates intrusion incidents, conducts forensic investigations and
   mounts incident responses.
   - Delivers technical reports and formal papers on test findings.
   - Installs firewalls, data encryption, and other security measures.
   - Maintains access by providing information, resources, and technical
   support.
   - Ensures authorized access by investigating improper access; revoking
   access; reporting violations; monitoring information requests by new
   programming; recommending improvements.
   - Updates job knowledge by participating in educational opportunities;
   reading professional publications; maintaining personal networks;
   participating in professional organizations.
   - Accomplishes information systems and organization mission by
   completing related results as needed.
   - Builds, deploys, and tracks security measurements for computer systems
   and networks.
   - Mitigates security vulnerabilities by implementing applicable
   solutions and tools.
   - Performs vulnerability testing, risk analyses, and security
   assessments.
   - Collaborates with colleagues on authentication, authorization, and
   encryption solutions.
   - Tests security solutions using industry standard analysis criteria.
   - Responds to information security issues during each stage of a
   project’s lifecycle.
   - Performs risk assessments and testing of data processing systems.
   - Establishes system controls by developing framework for controls and
   levels of access; recommending improvements
   - Establishes computer and terminal physical security by developing
   standards, policies, and procedures; coordinates with facilities security;
   recommends improvements.
   - Safeguards computer files by performing regular backups; developing
   procedures for source code management and disaster preparedness; recommends
   improvements.
   - Determines the sensitivity of the data in order to recommend the
   appropriate security needs.
   - Develops proposals for, and consider cost effective equipment options
   to satisfy security needs.
   - Communicates with the technical team, management team and users
   companywide if data security is breached.
   - Designs infrastructure to alert the technical team of detected
   vulnerabilities.
   - Evaluates new technologies and processes that enhance security
   capabilities.
   - Supervises changes in software, hardware, facilities,
   telecommunications and user needs.
   - Defines, implements, and maintains corporate security policies.
   - Analyses and advises on new security technologies and program
   conformance.
   - Creates, tests, and implements network disaster recovery plans.
   - Recommends security enhancements and purchases.
   - Trains staff on network and information security procedures.
   - Develops security awareness by providing orientation, educational
   programs, and on-going communication.
   - Recommends modifications in legal, technical and regulatory areas that
   affect IT security.



*Thanks & Regards,*

*Avanish Pandey*

*---------------------------------------*

*Next Level Business Services, Inc.*

*[email protected]*
<[email protected]>

*(904) 290-8616  || **LinkedIn*
<https://www.linkedin.com/in/avanish-pandey-83897493/>

-- 
You received this message because you are subscribed to the Google Groups 
"Powerbuilder Assignments" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/d/msgid/powerbuilder-assignments/CAM%3D5NfV29rZpJa3bvstZhDMyzrD22etYVraG3tjE6mBmH9Ubeg%40mail.gmail.com.

Reply via email to