Position Title: Cloud Security Engineer

Department: R&D

Responsibilities

  • Primary goal: Making sure our application, is enterprise grade protected while allowing for fast and agile development effort using cutting edge automation, as little manual work as possible and inventing new techniques for SaaS security technology
  • Help plan and carry out an organization’s information security strategy. will develop a set of security standards and best practices for the organization, and recommend security enhancements to management as needed.
  • Will develop strategies to respond to and recover from a security breach. Information Security Engineers are also responsible for educating the workforce on information security through training and building awareness.
  • Conducts periodic scans of networks and production to find any vulnerability. Conduct and be responsible for periodic penetration testing (internal and external)
  • Must constantly monitor their organization’s networks and systems for security breaches or intrusions. They install software that helps to notify them of intrusions, and watch out for irregular system behavior
  • Leads incident response activities to minimize the impact. Afterwards, they lead a technical and forensic investigation into how the breach happened and the extent of the damage. They prepare reports of their findings to be reported to management 

Experience Requirements

  • Strong programming skills (scripting and/or OO languages) - Must.
  • Pen-Testing skills and proven experience
  • Knowledge of risk assessment tools, technologies and methods
  • Experience designing secure networks, systems and application architectures
  • Knowledge of disaster recovery, computer forensic tools, technologies and methods
  • Experience planning, researching and developing security policies, standards and procedures
  • Professional experience in a system administration role supporting multiple platforms and applications
  • Ability to communicate network security issues to peers and management
  • Ability to read and use the results of mobile code, malicious code, and anti-virus software

 

Apply for this Job

* Required
File   X
File   X