Accrete Macro Solutions LLC is hiring for Infrastructure Solutions Architect in Dimondale, MI. This role will be Hybrid. Minimum 8 years of experience with 2 years of CyberArk and 6 or more years privileged access / account security experience. Interested consultant apply as soon as possible. https://lnkd.in/g5cd8D-p
Accrete Macro Solutions LLC’s Post
More Relevant Posts
-
Experienced IT Recruiter l Connecting Top Talent with Leading Companies | Driving Success in the Tech Industry
Role : Splunk L3 SOC Analyst Location : Iselin NJ (Day 1 Onsite) Hire Type : Contract What you’ll do • Deployment and configuration of Splunk platform (Enterprise) / Splunk Cloud. • Demonstrate Splunk Core capabilities to prospective clients. • Optimize Splunk platform architecture for large-scale and distributed deployments. • Adopt best practices and development standards, deploying the same. • Develop and fine tune Splunk security monitoring rules along with writing Splunk Alert Detection Strategy (ADS) templates • Develop and customize Splunk apps and dashboards, building advanced visualizations. • Analyzing and triaging security alerts generated by the SOC tools, making informed decisions on the appropriate response. • Responding to security incidents, taking appropriate actions to contain, mitigate, and remediate security threats. • Collaborating with other members of the SOC team, as well as internal and external stakeholders, to resolve complex security incidents. • Keeping up to date with the latest cybersecurity threats, trends, and technologies to improve the efficiency and effectiveness of incident response. • Documenting security incidents, responses, and related information in accordance with established procedures. • Mentoring and training lower-level SOC technicians on the use of the SOC tools and incident response best practices Thanks & Regards Asad Saeed – Technical Recruiter Email: asad@digitaldhara.com I (609) 701-2164 #Splunk #SOCAnalyst #Cybersecurity #IncidentResponse #SecurityMonitoring #ThreatDetection #SecurityIncidents #SOC #InfoSec #SplunkDeployment #SecurityOperations #ThreatHunting #DataAnalysis #DataVisualization #SecurityAlerts #SecurityIncidentResponse #SplunkApps #Dashboards #CyberThreats #SecurityBestPractices #SecurityTools #SOCteam #CyberDefense #DataIntegration #ThreatIntelligence #MITREframework #MLTK #PythonScripting #ShellScripting
To view or add a comment, sign in
-
Experienced IT Recruiter l Connecting Top Talent with Leading Companies | Driving Success in the Tech Industry
Role : Splunk L3 SOC Analyst Location : Iselin NJ (Day 1 Onsite) Hire Type : Contract What you’ll do • Deployment and configuration of Splunk platform (Enterprise) / Splunk Cloud. • Demonstrate Splunk Core capabilities to prospective clients. • Optimize Splunk platform architecture for large-scale and distributed deployments. • Adopt best practices and development standards, deploying the same. • Develop and fine tune Splunk security monitoring rules along with writing Splunk Alert Detection Strategy (ADS) templates • Develop and customize Splunk apps and dashboards, building advanced visualizations. • Analyzing and triaging security alerts generated by the SOC tools, making informed decisions on the appropriate response. • Responding to security incidents, taking appropriate actions to contain, mitigate, and remediate security threats. • Collaborating with other members of the SOC team, as well as internal and external stakeholders, to resolve complex security incidents. • Keeping up to date with the latest cybersecurity threats, trends, and technologies to improve the efficiency and effectiveness of incident response. • Documenting security incidents, responses, and related information in accordance with established procedures. • Mentoring and training lower-level SOC technicians on the use of the SOC tools and incident response best practices Thanks & Regards Asad Saeed – Technical Recruiter Email: asad@digitaldhara.com I (609) 701-2164 #Splunk #SOCAnalyst #Cybersecurity #IncidentResponse #SecurityMonitoring #ThreatDetection #SecurityIncidents #SOC #InfoSec #SplunkDeployment #SecurityOperations #ThreatHunting #DataAnalysis #DataVisualization #SecurityAlerts #SecurityIncidentResponse #SplunkApps #Dashboards #CyberThreats #SecurityBestPractices #SecurityTools #SOCteam #CyberDefense #DataIntegration #ThreatIntelligence #MITREframework #MLTK #PythonScripting #ShellScripting
To view or add a comment, sign in
-
Recruitment Lead - Technical Recruiter | Healthcare Recruiter | 360 Recruiter | Talent Hunter | Headhunter Talent Acquisitionist | Recruitment Consultant | Talent Acquisition Head at Top Tech Consulting
Urgently hiring for junior Security Engineer for one Task i mention task also: Tasks in Other of Priority ========================== 1) Troubleshooting windows hosts in Reduced Funtionality Mode (RFM) 2)Automate Hide duplicate hosts from CS Console using either python or powershell. 2) Need to add audit logs for prevention policy (who is modifying the policies and when) 3) Review all Exclusion list and implement exclusion list in the applicable host group (example: exclusion list associated with Citrix will be applicable to VDI host group) 4) Automate Hide duplicate hosts from CS Console (I manually run two py scripts every Thursday morning, I have not found a solution to automate these scripts as Falcon allowed to download max 5000 hosts and only allowed to remove 100 hosts at a time) 5)Keep Avaya user Group and PCI group for HoAutomate Hide duplicate hosts from CS Console (I manually run two py scripts every Thursday morning, I have not found a solution to automate these scripts as Falcon allowed to download max 5000 hosts and only allowed to remove 100 hosts at a time)st Firewall 6) IT team is also reporting hosts have to be in Global Protect VPN to communicate with Falcon Cloud, need to investigate and issue needs to be resolved - Sarbhika 7) Need to investigate who removed Ansible hosts from the host group. This happened when CrowdStrike updated their portal. Also want to learn the following tools practically - wiz - qualys - splunk if any one intrested ping me #junior security engineer #securityengineering #security
To view or add a comment, sign in
-
#jobalert #openrequirements Title: Senior Cyber Systems Administrator. Location: Crownsville, MD 21032 Duties and Responsibilities: Configuration management and control of maintenance architectural/design/functional changes to Splunk Enterprise, ES and SOAR. Provide knowledge and execution of platform hardening using standards such as STIGs or CIS Benchmarks. Coordinate with various system owner support groups to gather and analyze requirements, propose implementation and integrations solutions, and plan and coordinate/execute system deployment tasks/projects to successful closure. Gap assessment and analysis of security solutions and recommendation of improvement initiatives. Architecture and design with future growth in mind to ensure a balance between scalability, performance, stability, reliability, and agility. Implementation, administration, maintenance, troubleshooting, root cause analysis, and break-fix support of security tools. Education and Years of Experience: At least ten (10) years of hands-on experience in LAN/Network Administration. At least five (5) years of Technical Lead experience on system management /deployment projects with a focus on Linux based OS. At least five (5) years of progressive experience in enterprise and security architecture, design, implementation, and support. Bachelor’s degree from an accredited college or university with a major in Computer Science, Information Systems, Engineering or related scientific or technical discipline. Industry recognized security certification, IAT Level II/III (preferred). Required Skills/Certifications: Self-starter, able to gather requirements, plan, execute system deployment efforts. Able to perform gap analysis and initiate and execute architectural and design improvements. System architecture, engineering, or administration experience. Customer-oriented with excellent issue follow-through and resolution abilities. Excellent written and oral communication, and presentation skills. Ability to effectively work both autonomously as well as on a team. Outstanding interpersonal skills, strong work ethic, and self-motivated. Utilize tools and analytical skills to plan and execute technical changes. Desired Skills: Experience with the following tools: Splunk/ES/Phantom, Palo Alto Panorama, Tanium, Thycotic Secret Server, Shodan, RiskSense, Security IQ, ServiceNow, Tenable SC/ TenableIO, Plixer Scrutinizer. Experience architecting and multi-tier system/applications i.e Splunk ES and Phantom. Experience analyzing and implement security architecture best practices. Experience with Windows, Linux, Database, and Web Apps system administration. Scripting in Pearl/Python/Bash/PowerShell etc. Experience in project task technical analysis, planning, and estimation. Experience with technology capabilities market research, technical analysis/review, and recommendation. Send your profile to pravardhan@data-solutions.org #commentforbetterreach #maryland
To view or add a comment, sign in
-
Experience required: 6-12 yrs Follow and share with your network for more updates. If this interests you, DM me your skillset and CV details. #sailpoint #aws #network #security #forgerock #saviynt #cyberark #beyondtrust #cyberark #cryptography #splunk #SOC #ping #email #security #endpoint #governance #compliance #hiring #jobalert #currentopenings #currentlyhiring #helloconnections 🔔 📣
To view or add a comment, sign in
-
-
Highly recommended opportunity at a highly recommended company! Benefits include "generous equity". It's a good time to get on board, now more than ever. 🚀 📈 #IAM #Identity #AccessManagement #MobileSecurity iVerify Rocky Cole #opportunity #hiring #cybersecurity #informationsecurity #Engineer #generous #equity
Rocky Cole is looking for to hire someone who is an absolute wizard with IAM solutions, specifically Azure AD and Okta. This person can be either an engineer with hands on keyboard, or a product manager who knows all the secret 'hacks' of Okta and the MFST Graph API. Responsibilities: - Build remediation features via integrations into Identity providers like Okta and Azure - Create integrations from the iVerify product suite into external providers - Research and develop a deep understanding on how identity and device management providers operate and integrate with external systems - Conduct regular audits and assessments to identify and mitigate potential security risks - Be responsible for helping to grow our systems according to industry standards and best practices Full JD: https://lnkd.in/gub9NWQy
To view or add a comment, sign in
-
One of our client is hiring Urgent profiles needed Please share profiles @ harish.prathap@idctechnologies.com. Position: CyberArk Sr. – Build and Support / Ops Lead Locations: Alpharetta, GA (Day 1 Onsite) Following will be CyberArk Sr. Lead responsibilities: Work on EFTPS Build activities. Target System on-boarding Single Point of Contact for support services Lead the complete operations team on technical front Respond to the email’s for any advisory task. On-call support with the aligned support team member. Debugging the issues Provide the onsite support for Major/Minor upgrade. Perform RCA’s DR Failover drills Define any new policies in the PAM Solution Break glass password retrieval Update documentation as and when required Any new server Account Addition /Deletion for existing types of integrations. Adding users in the group and opening of firewall port request. Troubleshooting of operational issues like: Authentication Failure (LDAP user’s/application Internal users like appuser and gwuser) End point target server connectivity issue Password change/verification failure on Scheduled task OS (Windows/Unix/Database) level Login accounts PAM Daily scheduled backup failure DC to DR data replication failure PAM Email notification related configuration In an unforeseen event or in case the issue is not resolved via L3 team, log PAM support ticket with OEM and follow up for timely resolution. To perform drills related to: DC-DR DR-DC Fall-back Vault Restoration Business continuity with DR environment Manage policies configured in the PAM solution Creating new policies · Consider up to 50 target systems consisting of 25 Linux (Multiple Flavors), 10 Windows & 15 N/w or security devices · Build and test framework for: o New Server On-boarding o User/ Admin Provisioning process for least privilege usage · Create standard operating procedure documents that can be used as guides to continue onboarding of remaining systems · Target system on-boarding onto EFTPS environment Reporting & Platform Maintenance: · Response to performance alerts and warnings · Log monitoring and analysis per instance · Coordination with other resolver groups per instance · Trend analysis · Knowledge Management · Health Monitoring Check-up · Continuous Service Improvement · Impact analysis report as & when required · Reporting : o ITSM Reporting o Performance Reporting · Executive Reporting · Adhoc Reports Ticket Management: · Incident Management · Service Request Management · Problem ticket Management · Resolve Problems or liaise with CyberArk or Infrastructure teams for resolution #cybercrime #cyberark #c2crequirements #c2cvendors #c2cjobs #c2chotlist #c2crequirement #c2cavailable #c2crecruiters
To view or add a comment, sign in
-
Hello Benchsales, #immediatehiring Job Role : CyberArk Sr. – Build and Support / Ops Lead Location :Dallas, TX (Day 1 Onsite) C2C, Duration : 6-12 Months Job Description : Following will be CyberArk Sr. Lead responsibilities: • Work on EFTPS Build activities. • Target System on-boarding • Single Point of Contact for support services • Lead the complete operations team on technical front • Respond to the email’s for any advisory task. • On-call support with the aligned support team member. • Debugging the issues • Provide the onsite support for Major/Minor upgrade. • Perform RCA’s • DR Failover drills • Define any new policies in the PAM Solution • Break glass password retrieval • Update documentation as and when required • Any new server Account Addition /Deletion for existing types of integrations. • Adding users in the group and opening of firewall port request. • Troubleshooting of operational issues like: a. Authentication Failure (LDAP user’s/application Internal users like appuser and gwuser) b. End point target server connectivity issue c. Password change/verification failure on i. Scheduled task ii. OS (Windows/Unix/Database) level Login accounts d. PAM Daily scheduled backup failure e. DC to DR data replication failure f. PAM Email notification related configuration • In an unforeseen event or in case the issue is not resolved via L3 team, log PAM support ticket with OEM and follow up for timely resolution. • To perform drills related to: a. DC-DR b. DR-DC Fall-back c. Vault Restoration • Business continuity with DR environment • Manage policies configured in the PAM solution • Creating new policies Consider up to 50 target systems consisting of 25 Linux (Multiple Flavors), 10 Windows & 15 N/w or security devices Build and test framework for: New Server On-boarding User/ Admin Provisioning process for least privilege usage Target system on-boarding onto EFTPS environment Reporting & Platform Maintenance: Response to performance alerts and warnings Log monitoring and analysis per instance Coordination with other resolver groups per instance Trend analysis Knowledge Management Health Monitoring Check-up Continuous Service Improvement Impact analysis report as & when required Reporting : ITSM Reporting Performance Reporting Executive Reporting Adhoc Reports Ticket Management: Incident Management Service Request Management Problem ticket Management Resolve Problems or liaise with CyberArk or Infrastructure teams for resolution Please Share Resumes to vmarella@esharpedge.com #jobdescriptions #jobdescription #urgentopening #urgentrequirement #urgenthiring #cyberark #Build #Support #lead #usajobs #c2crequirements #resume #experience #database #job #development #c2cjobs #c2cusajobs #c2crequirements
To view or add a comment, sign in
-
Companies need a #mainframe #security architect, someone tasked with securing, managing, and ensuring consistency in monitoring for #vulnerabilities or threats. Enterprise security leaders at most orgs don’t tend to have deep mainframe expertise. That's why hiring a specialized security architect is so crucial. Prioritize having them in the org chart.
Why You Need a Mainframe Security Architect - KRI Security
https://www.krisecurity.com
To view or add a comment, sign in