Help design and build security and observability tools to monitor the security of our client’s cloud infrastructure.
• Identify, evaluate, and communicate cloud-related risks and vulnerabilities, provide i
• Monitor for attacks, intrusions and unusual, unauthorized, or illegal activities.
• Contribute to the development of operational and security automation and integration processes and procedures.
• Recommending security configuration standards for cloud services to include, but not limited to, AWS, AZURE, Google.
• Work closely with stakeholders on integration of security
architecture into overall enterprise architecture.
• Track and report on the effectiveness of cloud information
security technology, controls, processes, and polices.
Support and participate in Information Security projects and initiatives, including application security and vulnerability testing, gap analyses, etc.
• Setup or enhance an advanced analytics tools to determine emerging threat patterns and vulnerabilities.
• Work with Global Operations Engineers to review and assess cloud network, server, and service architecture.
• Monitor and respond to security events and i
• Coordinate with SOC team on all security events and i
• Design and perform POCs and to facilitate service selection.
• Plan, implement and direct Cloud related SOC Infrastructure and
security projects.
• Act as L2/L3 Cloud support for security related issues.
• Train SOC analysts on Cloud security and Cloud processes.
Implementing a disaster recovery plan and a business continuity plan to prevent data loss for IaaS and PaaS environment.
• Manage Security Tools such as Qualys, Hackuity, Cloudflare, SIEM, ELK, Centreon, Microsoft Defender 365 etc.
• Working and collaborating with operation teams to identify security issues and apply best practices in cloud security.
• Troubleshooting and solving issues with cloud-based environment, Linux OS, and Windows OS.
• Deployment of cloud-based infrastructures.
• Install security measures and operate software to protect
systems and information infrastructure, including firewalls and
data encryption programs.
• Check firewalls and data encryption technologies to determine
when a replacement is needed.
• Research security enhancements and make recommendations
to management.
• Suggest security enhancement methods to the organization
management or the IT staff.
• Provide vulnerability reports to clients and other teams.
• Lead the scru
“My business would not be able to go forward if it was not for them”
Gaurab - Adhikari
SEE MORE REAL RESULTSOnlinejobs.ph "ID Proof" indicates if "they are who they say they are".
It DOES NOT indicate skill level.
ID Proof scores are 0 - 99 with 99 being the best. It is calculated based on dozens of data points.
It's intended to help employers know who they're talking to is real, and not a fake identity.