Home

SECURITY ARCHITECT || Location - Remote -WAUKEGAN, IL || Visa - USC, GC , H1B at Waukegan, Illinois, USA
Email: [email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=810555&uid=

From:

Mohit Joshi,

Exarca Inc

[email protected]

Reply to:   [email protected]

Role : SECURITY ARCHITECT

Location : Remote - WAUKEGAN, IL

Visa : USC, GC , H1B

Duration : 3+ months   

Interview : Video Call

TO CONDUCT SECURITY ASSESMENT FOR PRIVILEGED ACCESS MANAGEMENT (PAM) AND M365 E5

A client of ours, a $10B company is looking for a Security Architect to conduct Security Architecture Assessment for Privileged Access Management (PAM) and M365 E5. This should be a really Enterprise Security Guru who is capable of telling the Clients Security Team including the top Security Architects what to do!!!

Originally a 3-month project, it is likely will be extended to continue with policies implementation and oversight and guidance on implementing proper security policies and procedures.

EXCELLENT COMMUNICATION SKILLS ARE A MUST!!! PLEASE DO NOT SEND US ANY CANDIDATES WITH POOR COMMUNICATION SKILLS!!!

Stage 1. Privileged Access Management Assessment and Roadmap:

Conduct a review of the current PAM Systems:

o               Review the current privileged access management systems being used, the type of access controls in place, and the effectiveness of these systems in securing privileged access.

o             Review the processes for granting, changing, and revoking privileged access to ensure they follow best practices in secure access management.

o              Review the procedures for handling privileged access requests, including urgency procedures, and incident response procedures in case of a security breach involving privileged access.

o              Review compliance with relevant industry standards, regulations, and laws concerning privileged access management, such as GDPR, ISO 27001, PCI-DSS, and HIPAA.

o     Examine the roles and responsibilities of individuals with privileged access, their level of training, and their awareness of security risks and preventive measures.

  Conduct Gap Analysis and Risk Assessment:

o             Identify and evaluate potential risks associated with the organization's current privileged access management policies, systems, and practices.

o             Identify areas with business and technological gaps, assess the risk levels, and recommend mitigation approaches

             Develop recommendations for improvement:

o             Develop a set of recommendations to improve the Privileged Access Management posture at the company.

o             Create a prioritized list of initiatives for applying these recommendations and the proposed timeline for their implementation

Stage 2. M365 E5 Security Assessment and Roadmap:

             Review current security architecture, standards, and tools:

o             Review current state documentation for security architecture, standards, processes, and procedures

o             Conduct interviews with individual SMEs.

o             Review the business and technical requirements, software products and tools, their licensing and renewal cycles, architecture patterns, and other relevant information in a summary format

             Review the E5 alignment roadmap and future state:

o             Assess security software available to the company as part of the E5 license.

o             Conduct analysis of security features and functionality available under the E5 license for applicability to the company environment, business, and technical requirements, including both on-premises and cloud environments.

o             Review the areas of overlapping or complementary use with current security portfolio.

o             Review the opportunities for improving security posture while maximizing the benefits provided by security tools, features, and functionality available under the E5 license.

             Develop an E5 security implementation roadmap:

o             Review recommendations for the optimal introduction of security tools included in E5 license.

o             Review the prioritized roadmap for E5 security implementation

o             Conduct an executive readout of the recommendations and the roadmap and identify the next steps.

Mohit Joshi

Senior Technical Recruiter

Exarca Inc.

101 E. Park Blvd., Suite 600, Plano, TX - 75074

Landline:   +14699830493 Ext: 493

Email     :  

[email protected]
||

www.exarcainc.com

LinkedIn :   www.linkedin.com/in/mohit-joshi-925974219/

Keywords: information technology green card Illinois Texas
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=810555&uid=
[email protected]
View All
11:49 PM 31-Oct-23


To remove this job post send "job_kill 810555" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]


Time Taken: 31

Location: Waukegan, Illinois