Leading AI-driven Global Supply Chain Solutions Software Product Company and one of Glassdoor\xe2\x80\x99s \xe2\x80\x9cBest Places to Work\xe2\x80\x9d
Seeking a Sr. Cloud Infrastructure Vulnerability Consultant who would be responsible for Cloud Security Posture Management (CSPM), identifying security vulnerabilities including misconfigurations across cloud infrastructures, including Infrastructure as a Service (IaaS), Software as a Service (Saas), and Platform as a Service (PaaS).
This candidate would also be responsible for Cloud Workload Protection (CWP), to provide continuous discovery and monitoring of vulnerabilities in the workloads deployed in the cloud infrastructure.
The candidate will be directly responsible for vulnerability management and threat management of the overall infrastructure and information assets.
Scope:
Core responsibilities to include assessing and promoting remediation for all the assets in the Infrastructure as a Service (IaaS) and Software as a Service (Saas).
Candidate will be a key member of the centralized information security team.
What you\xe2\x80\x99ll do:
Perform vulnerability scans and report findings for On-prem and Cloud networks.
Publish the vulnerability status reports to senior management and track remediation.
Define and participate in the implementation of On-prem and Cloud architecture and security controls.
Proactive identification of threats and risk remediation.
Discover the assets in the cloud infrastructure to identify and continuously monitor for security vulnerabilities and misconfigurations.
Discover and continuously monitor for vulnerabilities in cloud workloads including dockers, Kubernetes, and containers.
Create golden images for virtual machines, dockers and containers to be spun up for the business.
Maintain security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs.
Upgrade security systems by monitoring security environment; identifying security gaps; evaluating and implementing enhancements.
Participate in and assist with incident response team, as appropriate.
Generate metrics for the Management as needed.
Prepare system security reports by collecting, analyzing, and summarizing data and trends.
What we are looking for:
9-12 year of proven experience in Information security or Vulnerability Management and at least 3 years of experience in Cloud security; a Master\xe2\x80\x99s degree can be substituted for experience.
Extensive experience in public cloud infrastructure such as Microsoft, Google, or AWS.
Strong expertise in Vulnerability and Threat Management, gathering and condensing threat intelligence into actionable and meaningful communication materials.
Bachelor\xe2\x80\x99s degree in information security or Information Technology or Computer Science or related fields or from STEM
Deep and diverse experience architecting and implementing network security designs. Expert in network security, system security and endpoint security.
Through understanding security vulnerabilities and misconfigurations in the cloud infrastructure.
Thorough understanding of native cloud solutions like dockers, containers, Kubernetes, VDIs, cloud storage, cloud infrastructure, etc.
Familiarity with security frameworks and regulatory requirements such as NIST, ISO 27001/2, and SSAE-18.
Proven experience in cloud security posture management tools like Microsoft Defender, Wiz, Tenable, Aqua Security, Prisma Cloud, Lacework, Scribe Security, etc.
Proven experience with products dealing with vulnerability management services which include Retina, Qualys, Nessus, Nexpose, etc.
Practical experience with the development, implementation, and management of security-related technologies (i.e., SIEM, WAF, AV, Firewalls, Internet-facing services).
Excellent customer service including strong written and oral communication skills.
Knowledge of security network devices (firewalls, switches, SIEM, Antivirus, cryptography, etc.) and other security networking hardware/software tools.
Demonstrated understanding of information security concepts, standards, practices, including but not limited to firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management and event monitoring/reporting.
Certifications such as CCSK, CCSP, GCSA, Microsoft Certified Azure Security Engineer Associate, CISSP or equivalent.
Results-focused and attention to detail.
Our Values
If you want to know the heart of a company, take a look at their values. Ours unite us. They are what drive our success \xe2\x80\x93 and the success of our customers. Does your heart beat like ours? Find out here:
is our strategy for fostering an inclusive environment we can be proud of. Check out Blue Yonder\'s inaugural which outlines our commitment to change, and our celebrating the differences in all of us in the words of some of our associates from around the world.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.