This will be a 12-month contractual position.
Responsibilities:
- Work with partners to identify and resolve security weaknesses in the environments which could pose risk to the company.
- Fix detected vulnerabilities to maintain a high-security standard.
- Work closely with teams of engineers chartered with building, scaling, deploying and maintaining manufacturing infrastructure, application services, data and logging pipelines
- Monitor, analyze and investigate all related security alerts in the environment to identify the root cause.
- Conducting security audits & assessments for cloud & manufacturing environments.
- Operational support to security related requests and projects implementations.
- Enhance the security posture of manufacturing infrastructure on site, at third party sites, and in cloud environments.
Requirements:
- Experience conducting security audits & assessments for cloud & manufacturing environments.
- Experience working with Qualys, Microsoft Defender for Endpoint or other endpoint security and vulnerability scanning solutions.
- Experience with analyzing and investigating security alerts or breaches to identify the root cause.
- Experience with identity and access management, including monitoring for abuse of permissions by authorized system users
- Experience with verifying the security of third-party vendors and collaborating with them to meet security requirements.
- 4 to 6+ years of hands-on experience in at least one of the following areas in large production environments:
- Security hardening and monitoring of Linux or Windows/AD systems and associated services and applications.
- Configuration management tools including Terraform, Ansible, Chef.
- Experience working with aws cloud platforms is highly desired.
- Experience using platforms and tools like MDE, Wazuh, Osquery, Wireshark, Zeek, Suricata.
- Knowledge of the following areas
- TCP/IP network fundamentals and common network services.
- Experience in analyzing a wide variety of network and host security logs to detect and resolve security issues
- Applied cryptography including PKI, SSL, and key management