Bloom is growing its IT department and seeking an Identity and Access Management Engineer (Remote) to join our team. This pivotal position entails overseeing identity and access management capabilities for both on-premises and cloud assets. The chosen candidate will forge connections across Bloom to ensure compliance with control standards and security protocols. We are looking for someone who champions best practices in identity and access management, proficiently developing and deploying solutions for both cloud and on-premises environments to enhance enterprise-level identity management. Additionally, the ideal candidate will provide technical guidance and mentorship to junior team members. Learn more about this opportunity and apply through the link provided. https://lnkd.in/gZkie_CP
Bloom’s Post
More Relevant Posts
-
Hi, This is Zeny recruitment specialist. I'm looking for a Technical Support Engineer who can start ASAP. This is permanent work from home. The salary budget is 1800 to 2500 USD net pay a month depending on your skills and years of experience. If you're interested kindly send me your updated at zbricenio@thyzen.net JD Assist clients thru phone or email and escalate to on-site technician if needed. Assist clients having issues with their line of business software. SERVER ISSUES: • Remote desktop related issues • Remote desktop server nonresponsive troubleshooting • Fslogix related login errors. • Services not working issues. NETWORK ISSUES: • Server network disconnection issues. • Workstation’s network issues. • Firewall rules alteration and reboot. • Wifi network troubleshooting. • VPN software issues. VIRTUALIZATION ISSUES: • ESXI hosted machines troubleshooting • Host down troubleshooting • Increase/decrease datastore storage. SERVER ADMINISTRATION: • Responsible for creating and termination of AD accounts. • Security/Distribution group administration. • File/Folder shares permission management. • Server patches update for tax software. • Respond to servers going offline/non-responsive OFFICE 365 ADMINISTRATION • Create and Terminate User email account. • Resolution of User infected/breached email account. • Management of 365 Spam definitions. • Usage of powershell scripts to manage calendars/contacts/online archive. • Reset passwords and setup of MFA for accounts. EMAIL FILTERING SYSTEM • Scan/search of possible malicious emails. • Placing of email sender on either blocked/allowed list. • Email investigation for possible spam messages. • Use of Connectwise Manage for ticketing system and Kaseya/Connectwise manage for machine management. • Diagnose and troubleshoot workstation’s hardware issues and report it OEM.
To view or add a comment, sign in
-
Startup Advisor, Cybersecurity, Entrepreneur/Investor, Flight Paramedic Please note, LinkedIn is not the best way to contact me as I check it once every few weeks or so. Please use email or call me if urgent.
I'm hiring, preferably from my direct network, for two (2) - 4 month contracts to augment my team with a Sr. Security Architect and a Security Technical Program Manager. This is a very cool, but fast moving project implementing cybersecurity across an organization for a very cool project. The architect's responsibilities: - Cloud Security Design and Implementation: - Develop and enforce tailored security policies for cloud environments, maintaining tools and practices like identity management and data encryption. - Design cloud network security architectures that enhance defense strategies. - Security Observability and Monitoring: Manage observability tools to monitor security events across platforms, analyze logs for threat detection, and continually refine monitoring practices. Network Security Enhancement: - Architect and maintain secure network infrastructure, implement security measures like firewalls and IDS, and conduct regular security assessments. - Secure Application Design: - Collaborate with engineering to embed security in application development, conduct security reviews, and promote secure coding practices. - Collaboration and Leadership: Provide expert guidance and mentorship, collaborate with stakeholders for unified security strategies, and lead key security initiatives. and the STPM: Program Coordination and Management: - Oversee security program execution, aligning with strategic objectives, and coordinate resources across teams and vendors for optimal outcomes. - Monitor progress, address issues, and adapt plans to evolving requirements. Vendor and Stakeholder Engagement: - Serve as the primary liaison between internal teams and external security vendors, managing the SOC and incident response relationships effectively. - Lead regular discussions to share updates, discuss progress, and resolve conflicts. Incident Response Planning and Execution: - Develop and refine incident response plans and conduct training drills to ensure preparedness. - Direct incident response activities, ensuring efficient mitigation and communication during events. Compliance and Reporting: - Ensure security measures comply with relevant laws and standards, and manage related documentation. - Report regularly on program status and effectiveness, maintaining transparency with stakeholders. Continuous Improvement: - Solicit feedback to evaluate security measures and apply improvements strategically. - Keep abreast of industry trends to continuously advance the security strategy.
To view or add a comment, sign in
-
PenTesters, PowerShell and the Black Box =============================== The following may not interest only PenTesters, but Cybersecurity Project Managers as well........ When hiring a PenTester for a Windows Boxes CyberSec Related Projects, there is no need to set at her/his shoulders and watch/Report what it has been done. Start instead a very useful PowerShell cmdlet (start-transcript) and you will get not only the history of commands typed/Executed by the consultant (Get-History) but the results of the commands as well. At the end, stop the recording with (Stop-Transcript) command and you will get a File with all the recording stuff. A File/report which can be added to the history of the project for future use.
To view or add a comment, sign in
-
-
Passionate PM specializing in small teams and new ventures -- I'll help you get your startup started.
My friends in #devops #kubernetes #kubernetessecurity #ciam and #identitymanagement should check this out.
I'm hiring again, for various things, but particularly: - Kubernetes networking (security experience preferred but not required) - Bootstrapping PKI from the ground up, both for use internally but also as-a-service - Product security nerds LMK if you or anyone you know is interested in these things!
To view or add a comment, sign in
-
We're URGENTLY Hiring: Software Composition Analysis Specialist Security Lit 🚀 Day to Day Responsibility 👇🏾 ➡️Conducting Software Scans: Regularly run scans on the software codebase using SCA tools to identify vulnerabilities and compliance issues with software components. This might include analyzing both in-house and third-party/open-source software elements. ➡️Analyzing Scan Results: Review and interpret the results from the SCA tools. This involves assessing the identified vulnerabilities for their severity, impact, and the urgency of remediation. ➡️Updating Software Bill of Materials (SBOM): Maintain and update the SBOM, ensuring it accurately reflects all the software components in use, including versions and dependencies. ➡️Collaboration with Development Teams: Work closely with software developers to communicate findings from the SCA process. This may involve advising on the secure use of third-party components and assisting in remediation strategies. ➡️Remediation Tracking and Management: Follow up on the remediation process for identified vulnerabilities, ensuring that they are addressed in a timely manner. This might include re-scanning components post-remediation to confirm that vulnerabilities have been effectively resolved. Apply 👉🏽 https://lnkd.in/gmBdm-6v
To view or add a comment, sign in
-
-
What Do IT Professionals Do and Why Are They Important? by kato 0757629876 IT professionals provide virus protection to a business’ systems. They perform backups to provide high security to important business data. IT professionals set up firewalls and protect devices and systems from hackers and other attacks. They troubleshoot technical problems in computer systems ensuring smooth performance. Businesses can thrive on high-quality IT support systems as they provide a seamless experience to customers. With so many aspects of your business dependent on the digital world, the importance of IT in business is evident. Hiring a team of good IT professionals can do wonders for your business..
To view or add a comment, sign in
-
-
Are you a Software Developer? 🚀 Please read this post! Hiring managers need Secure Software Developers - developers that know how to code securely. Yes! Not only is it part of the top 5 sought after skills that companies are looking for in great software experts, but the world needs you *now* to improve cybersecurity: 🔵 34% of software requirements are related in some way to security and compliance. 🔵 Up to 75% of all software projects have failed because of security failures. 🔵 The Department of Homeland Security in the US estimates that 90% of software vulnerabilities can be traced back to defects in design and software coding. 🔵 A quarter of developers (24%) say they do not have enough time to integrate secure coding at the start of a project. Sources: CodeNinja Inc., U.S. Department of Homeland Security, Security Compass, Geneca
To view or add a comment, sign in
-
-
I'm #hiring :) We're building the first ever Android Security Operations team (ASO or Android SecOps for short) based in Bangalore, India. I'm hiring one manager that will report to me (a security-focused SWE), who in turn will manage the rest of the team, who I'm also hiring for (two more security-focused SWEs and a TPM). This is an amazing opportunity to be part of building a team from the ground up in a growing location, working hand in hand with our U.S. and EMEA Android Security teams. The ASO team will be responsible for ensuring the smooth day to day operations of critical programs across the Android vulnerability pipeline, including our Android Vulnerability Reward Program, Vulnerability Management Program, Security Design Reviews Program, Security Release / Android Security Bulletin Program, and more! If you want real world experience with Android Security, and to be part of the team that squishes security bugs to protect 3B+ users across the planet, now's your time to shine :) If you're interested, feel free to DM me for more info, send people my way you think might be interested, re-post this post, and of course -- apply! Manager of the team - security-focused SWE and people manager: https://lnkd.in/gGc-VU5Q Individual contributor security-focused SWE: https://lnkd.in/gUrZsWzh Individual contributor security-focused SWE: https://lnkd.in/g7q3-TRX Individual contributor security-focused Technical Program Manager: https://lnkd.in/g-8kM4GD UPDATE: Thanks everyone for all the interest! My inbox is blowing up, so adding some FAQs here that'll hopefully help with common questions :) Where? The positions are all in Bangalore, hybrid (in-office Tues/Wed/Thurs, WFH Mon and Fri). Who would I work with? The manager of the team (first job post linked) reports to me, and you'd work with the rest of my team (technical program managers and security engineers mostly based in the U.S.), as well as the broader Android Security team. What would I work on? Practically speaking, the SWE roles entail things like reviewing incoming vulnerability reports to the Android VRP to analyze them and determine their severity based on the "Android Severity Guidelines" (you can Google that one ;P). You'd also perform security design reviews (consult on how to design new features, well, securely :)), consult with feature teams to advise them in the security space, analyze common threads of vulns / root cause analysis to identify potential platform level mitigations, and more. The TPM role is on the hook for ensuring everything runs smoothly across the Android vulnerability pipeline, and gets to be hands on with all of our programs, including ensuring vulns are found and fixed, and patches are efficiently shipped to the Android ecosystem. Where do I sign up? Apply at the link! What skills do I need? Consider what was mentioned above, and check the job postings, but experience with Android, Java, C, C++ is helpful.
To view or add a comment, sign in
-
-
Why Penetration testing and Red-Team operations are important to any size company. The average cost of a data breach being either from the web or from physical access to a company's building is around 4.5 million US dollars. Cleaning up a data breach involves extensive planning and action to fix. Every company when hit with a data breach has to report it to the public which can ruin their reputation and customer trust. Hiring a Penetration testing company to make sure systems are secure and having then preform a Red-Team operation on the company's building is vital to having a successful reputation and keeps valuable customer information secure. Penetration testing averages out to 4,000 to 15,000 US dollars for a thorough checkup on your systems to ensure they are secure. Wouldn't you rather pay that than 4.5 million?
To view or add a comment, sign in