Vacancy expired!
Req ID: 150962
NTT DATA Services strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now.We are currently seeking a Cyber Security Authentication Technology Analyst - Client Location Specific to join our team in Irving, Texas (US-TX), United States (US).This Position is currently a temporary remote position, and will eventually be required to work onsite at the client's location in either Irving, TX OR Newcastle, DE (pending your location). This is due to following certain Covid -19 protocols and restrictions, as well as following guidance from the client on when they plan to return back to their physical office. If selected, please know you will need to be flexible to these expectations. Role Responsibilities: Cyber Security Services is seeking a highly motivated candidate for the position of Technology Analyst for providing L2 support for the Authentication and Data Security Infrastructure. He/she will be expected to oversee the Operations related work and projects, Security assessment, COB testing, maintenance of documentation and inventories, integration of Infrastructure and tools under global operational model, Manage the production problems, root cause analysis/resolution for system issues, defects, and minor enhancements, perform on-call support as required, perform risk control self-assessment tests and exercises, supporting project transition, operations, and technology. This candidate should be a technical leader with excellent communication skills and in-depth background in UNIX & Wintel technologies.Candidate is expected to have a firm grasp of system administration, network protocols, networking issues and solutions, system monitoring, databases, and storage. The candidate may act as a member of quick-response project task-support team and will often work under demanding deadlines, operating as team member as well as independently to resolve complex problems. Applicant may be asked to initially focus on compliance-related projects which may include but not limited to the following tasks: sync-up of inventories, coordination efforts related to as well as implementation of certificate renewals and migration efforts, COB test coordination efforts, coordination of required environment scans and tests and the implementation of any remediation required for resulting vulnerabilities.Additional RESPONSIBILITIES and ATTRIBUTES:• Provide Technical Application Support Leadership for the Security Infrastructure and Applications• Production and UAT Environment Troubleshooting expertise• Capacity, performance and Stability reporting and Management• Lead initiative to develop/improve scripts and other programs for system monitoring and maintenance• Provide Technical Mentoring• Lead Operations-related projects and Security assessment for the infrastructure associated with the applications in scope• Leadership Skills to Document and do knowledge transfer to other team members• Be responsible to assess the risk and associated impact of all operational issues and change events and react quickly to escalate to technology management in a timely manner when required• Work closely with the infrastructure team to ensure the operational requirements are met during application integrations• Continuously keep the Knowledge Share repository up to date• Strong interpersonal and communication skills• Strong analytical skills and attention to detail• Ability to work across all levels of the organization• Proven ability to work with demanding global partners within aggressive timelines; solid problem solving, analytical and technical abilitiesRequired Qualifications:- 3+ Years Cyber Security Experience
- 2+ years Unix Experience (ed. Command Line experience)
-
- Hands on experience with Unix scripting, SQL and ability to write complex queries ; Unix command line experience
- Team oriented problem solving; Ability to work in a dynamic environment with multiple competing priorities
- Good written and verbal communication , Detail- Oriented
- Working knowledge in Key and certificate encryption, life cycle and end to end communication
- Knowledge of Security tools and hands-on experience with some of the following technologies is an added advantage
- Security Infrastructure technologies Such as Cisco ISE, Entrust, Token Technologies, Single Sign On, Powerbroker, Unix Security tools, PKI Infrastructure, Cloud IAM
- Linux, Red Hat, Solaris, AIX, Windows Server and other Unix based operating systems
- Web Servers (Apache, IIS, Sun One Web servers)
- Application Servers (WebLogic, WebSphere)
- Databases (Oracle, SQL server, Sybase)
- Understanding of Programming languages (Java, Perl, C/C,)
- Thorough understanding of security, network architectures and protocols
- Familiarity of Compliance and risk management frameworks and methodologies (ISO27002, SDLC)
- Certifications (CISSP, ITIL, CCNA/CCNP, CEH, Redhat, Solaris, MCSE)
- Passion for continuous learning
Vacancy expired!