Insider Threat Information Systems Security – Senior Data Analyst
to manage multiple projects and deadlines in a fast-paced environment. Current CISSP, CRISC, CISM, CISA, CEH, or DoD 8570 IAM...
to manage multiple projects and deadlines in a fast-paced environment. Current CISSP, CRISC, CISM, CISA, CEH, or DoD 8570 IAM...
automation using IAM best practices, GCP Organization Policies, and Terraform checks. Work with security and compliance teams... Platform Only) Maintain stability of a pre-existing AWS environment by performing tasks such as: Reviewing IAM roles...
, including packaging and environment management Strong DevOps skillset, including AWS (Lambda, ECS, EC2, S3, IAM, RDS, SAS, SNS...
, Glue, Lambda, SNS, SQS, Step Functions, EventBridge, API Gateway, Load Balancers, and Aurora DB Implement IAM, KMS..., including: S3, Glue, IAM, KMS Lambda, SNS, SQS Step Functions, EventBridge API Gateway, Load Balancers Aurora DB...
Expert-level proficiency in AWS services (EC2, S3, RDS, VPC, Lambda, IAM, CloudWatch, etc.). Solid understanding and working... best practices, identity and access management (IAM), security groups, network ACLs, and data protection principles Working...
services. Manage and optimize environments for Azure Arc, Azure IAM, and Entra Active Directory. Ensure email security...
and access: AD to Entra ID (Azure AD), IAM planning, tenant transitions, user/device migration approaches • Device/user migration... Additional Skills (Preferred) If you have several of these, you’ll stand out: M365 / Azure / Identity • M365 and Azure: IAM, AD...
, subnets, and security groups. Adopt cloud security best practices, including IAM. Implement serverless computing and event...
and automated tests for PAM and KSM functionality Perform integration testing across cloud providers (AWS, Azure, GCP), IAM... with IAM solutions such as Okta, Ping Identity or Active Directory Working knowledge of operating systems (Windows, Linux...
and agent workflows with AI/ML teams Configure and manage IAM, VPCs, CloudWatch monitoring, logging, and security controls...-source models) Strong understanding of IAM, cloud infrastructure, monitoring, and security practices Experience building...