This job post is closed and the position is probably filled. Please do not apply. Work for Cloud Technology Partners and want to re-open this job? Use the edit link in the email when you posted the job!
\n\n* Analyze and design security solutions for applications and infrastructure, and provide expertise and consulting to clients.\n\n* Identify and document information security risks and propose mitigating controls\n\n* Will be responsible for understanding complex business IT needs, requirements, and projects scopes, with a focus on information security requirements.\n\n* Research, design, and develop new information security controls for clients\n\n* Assess current IT environments and make recommendations to increase security\n\n* Assist clients in troubleshooting and resolving information security issues\n\n* Author project and support documentation and diagrams\n\n* Implement security solutions.\n\n\n\n\nSkills & Requirements\n\n\n* Assessed, developed and implemented, operationalized and documented comprehensive security technologies and processes.\n\n* Secure software development, data protection, cryptography, key management, identity and access management (IAM), network security (VPNs) within SaaS, IaaS, PaaS, and other cloud environments.\n\n* Architected solutions within Amazon Web Services (AWS) and other cloud providers and SOA for cloud-based services.\n\n* Worked with cloud security and governance tools, cloud access security brokers (CASBs), and server virtualization technologies.\n\n* Performed security design/architecture reviews, code reviews, and penetration tests of large applications, systems and/or networks.\n\n* Worked on large scale cloud based services (including SaaS, PaaS, IaaS) and understand security challenges involve in deploying Cloud Applications.\n\n* Created and maintained security policies and procedures, managing the protection of information systems and assets.\n\n* Performed threat modeling and design reviews assessing security implications and requirements introducing new technologies.\n\n* Hand-on experience with multiple security technologies such as Firewalls, Intrusion Detection/Prevention Systems, Vulnerability Scanning, WAF, Wireless LAN, NAC, DLP, DDoS Mitigation, WAN security, SIEM, Content Filtering, Cloud Security gateways, Secure Proxies, SSL crypto solutions.\n\n* Solid understanding of a range of compliance, regulatory and legal requirements and relevant principles, best practices and standards across multiple industries. Preferred industries: financial services, telecommunications. Examples would include: PCI, SOX, GLBA, CSA, PCI, NIST, ISO, IEEE, FedRAMP, HIPAA and TCG.\n\n* Have working knowledge of common and industry standard cloud-native/cloud-friendly authentication mechanisms (OAuth, OpenID, SAML, Ping, Okta, etc) and key management (Safenet, Vormetric, other).\n\n\n\n\nAdded Bonus:\n\n\n* Cloud security and/or architecture related certifications - AWS Certified Solutions Architect or Certified DevOps Engineer\n\n\n\n\n\n* Sense of humor\n\n\n \n\n#Salary and compensation\n
No salary data published by company so we estimated salary based on similar jobs related to InfoSec, Architecture, DevOps, Crypto, Amazon, Cloud and Legal jobs that are similar:\n\n
$70,000 — $120,000/year\n
\n\n#Benefits\n
๐ฐ 401(k)\n\n๐ Distributed team\n\nโฐ Async\n\n๐ค Vision insurance\n\n๐ฆท Dental insurance\n\n๐ Medical insurance\n\n๐ Unlimited vacation\n\n๐ Paid time off\n\n๐ 4 day workweek\n\n๐ฐ 401k matching\n\n๐ Company retreats\n\n๐ฌ Coworking budget\n\n๐ Learning budget\n\n๐ช Free gym membership\n\n๐ง Mental wellness budget\n\n๐ฅ Home office budget\n\n๐ฅง Pay in crypto\n\n๐ฅธ Pseudonymous\n\n๐ฐ Profit sharing\n\n๐ฐ Equity compensation\n\nโฌ๏ธ No whiteboard interview\n\n๐ No monitoring system\n\n๐ซ No politics at work\n\n๐
We hire old (and young)\n\n