
11 tips for good meeting etiquette Follow these standard rules for proper meeting etiquette: 1. Be punctualIn meeting etiquette Being...
Negotiable
Computer/IT
09/20/2024
Closes:
09/30/2026
Pune, Maharashtra
Views: 20
Introduction:
We are seeking a talented and experienced Google Cloud Platform (GCP) Cloud Security Architect to join our team. In this role, you will be responsible for designing and implementing security solutions for our GCP environment, ensuring the protection of our cloud infrastructure and applications. You will collaborate closely with engineering, operations, and compliance teams to integrate security controls seamlessly across all cloud services.
Key Responsibilities
Requires overall understanding of Security services related processes and technologies:GCP CloudGCP cloud native securityData SecurityLog Indexing and Correlation platform & SIRTIntrusion systemAnti-virus and anti-spyware consoleAudit principles and associated compensating controlsCloud SecurityIdentity & Access Management
Years of experience needed –
12+ years on IT Security with 3+ years’ experience on GCP cloud security
Technical Skills:
Requires overall understanding of Security services related processes and technologies:
GCP CloudGCP cloud native securityData SecurityLog Indexing and Correlation platform & SIRTIntrusion systemAnti-virus and anti-spyware consoleAudit principles and associated compensating controlsCloud SecurityIdentity & Access ManagementIn depth knowledge of Security Architecture design and implementationHands on experience on GCP Cloud securityArchitecture , design and configuration experience on native Security controls in GCP ( GCP Mandiant ,GCP KMS, Cloud Armor and Google Security Command Centre)Must be hands on with Python and Terraform.Assist the development of security tool requirements, trials, and evaluations, as well as security operations procedures and processes.Develop and maintain global policies, standards and procedures to include helping to manage our business partners, setting expectations on roles and responsibilitiesAssist Client to define Security requirements based upon Business needs and their Information Security PolicyDesigning and implementing the security measures needed to protect data stored on public clouds against unauthorized access, including secure authentication methods, encryption, access control lists, intrusion detection systems, firewalls, and other measuresDesigning and developing security architectures that align with an organization’s strategic goalsWorking with security specialists to design new security protocols as needed, then testing them to ensure that they work as intendedInstalling and maintaining security software on company servers, computers, and mobile devices used by employeesAnalyzing threats to an organization’s security and designing solutions to mitigate those threatsRecommending and implementing new security measures as needed to keep data safeIdentifying new security threats and recommending ways to address themPlans security systems by evaluating network and security technologiesPrepares system security reports by collecting, analyzing, and summarizing data and trendsKnowledge of PCI, ISO 27002 and o security standards and frameworkDesigns security models, reviews and approves security configuration and installation of Security devicesAnalyze, troubleshoot, and investigate security-related, information systems’ anomalies based on security platform reporting, network traffic, log files, host-based and automated security alertsEnsure and enforce security controls in the area of Networks and Applications to drive policy compliance and risk mitigationControlling and managing access rights to the information system and assets that manage these information repositoriesSecurity-related Incident handling and registrationAssist the development of security tool requirements, trials, and evaluations, as well as security operations procedures and processesImproving and maintaining secure development standardProviding standard gap analysis services to internal business and technology partners.Ability to seek out vulnerabilities in IT infrastructuresProtects system by defining access privileges, control structures, and resourcesRecognizes problems by identifying abnormalities; reporting violationsImplements security improvements by assessing current situation; evaluating trends; anticipating requirementsDetermines security violations and inefficiencies by conducting periodic auditsIn-depth knowledge of data protection strategies, network and system vulnerabilities; security tool sets including security event management toolsProvide SIRT support as needed in response to information security related events.Participate in continuous improvement processesDoing Threat Management by working on different kind of attacks, Malwares, Viruses, web application attack based on OWASPMaintain and update relevant system and process documentation and develop ad-hoc reports as needed.Assist the development of security tool requirements, trials, and evaluations, as well as security operations procedures and processesMonitors industry security updates, technologies and best practices to improve security managementExperience with GCP is preferred
Certifications Needed:
Relevant Cloud Architect Certification.
Job conquers helped me to prepare for interview by providing mentorship for the topics that I needed to prepare for.
Job Conquers helped me to get my dream job .
Thank you Job Conquers
Job Conquers helped me prepare amazing resume that caught recruiters attention.
Thank you JC

11 tips for good meeting etiquette Follow these standard rules for proper meeting etiquette: 1. Be punctualIn meeting etiquette Being...

Preparing for an interview requires more effort than just Googling a list of common interview questions (though, yes, you should...

What is time management?Time management is planning how to efficiently use and deliberately control the time you spend to maximize...
Use Our Job Posting Service to Attract the Best Candidates!
Copyright © 2024 All Rights Reserved by JobConquers | Designed & Developed by TechNextHub