Cyber Security Engineers

at Saligram Systems
Location Atlanta, GA
Date Posted July 10, 2021
Category Default
Job Type Contractor

Description

Job: Cyber Security Engineers

Duration: 3 months

REMOTE

Senior Cyber Security Engineering resources with subject matter expertise in industry best practices associated with the configuration, implementation, and management of security related technologies, processes, programs, hands on experience and extensive knowledge in supporting an Information

Technology infrastructure.

1.2 Statement of Work shall provide services as specified for the project Security Engineering Services as described below.

More detailed work items are listed in the following sections.

1.3 Project Scope As part of this engagement,

The priorities will be based on the direction of the Information security leadership and are subject to change based on their preferences to include: Network Security and Configuration Management:

Evaluate and assess the current network security architecture (LAN/WAN) with a focus on Palo Alto, Cisco, Gigamon and FireEye device configurations. Assess current state management of devices, World Wrestling Entertainment, Security Engineering Services 2 configuration and management documentation, standard operating procedures, monitoring, logging, and auditing capabilities. Assess and validate the alignment of supporting processes and associated documentation with actual practices, identify and document any gaps and/or areas for improvement. Provide comprehensive recommendations to address any findings.

Assist in developing configuration and management documents, identify tools or feature sets not fully utilized, configured and/or integrated.

Assist in the maturing and documenting of defined processes and addressing any ad hoc or informal processes.

Evaluate purchased products, services, and contract terms. Identify and document any lapse in maintenance or support services.

Document any identified gaps or risks and provide comprehensive recommendations to address any findings.

Remote Access Security:

Evaluate and assess the current remote access security architecture, with a focus on Palo Alto’s Global Protect (VPN) and Host Information Profile (HIP) feature sets.

Assess current configurations and current state management. Identify and document any Palo Alto feature sets not properly configured or underutilized. Review configurations and management documentation, standard operating procedures, monitoring, logging, and auditing capabilities.

Assess and validate the alignment of supporting processes and associated documentation with actual practices, identify and document any gaps and/or areas for improvement.

Provide comprehensive recommendations to address any findings.

Assist in developing configuration and management documents. Assist in the maturing and documenting of defined processes and addressing any ad hoc or informal processes.

Evaluate purchased products, services, and contract terms. Identify and document any lapse in maintenance or support services.

Document any identified gaps or risks and provide comprehensive recommendations to address any findings.

Authentication and Authorization Security:

Evaluate and assess the current platforms supporting authentication and authorization specifically focused on DUO (2FA), Okta (SSO) and integration with Active Directory (AD).

Evaluate and assess processes associated with security operations, including access controls, log reviews, alerts, and notifications.

Validate the alignment of supporting processes and associated documentation with actual practices, identify and document any gaps and/or areas for improvement.

Provide comprehensive recommendations to address any findings.

Assist in developing configuration and management documents as it relates to security operations. Assist in the maturing and documenting of defined processes and addressing any ad hoc or informal processes. Email Security: Evaluate and assess the current platforms supporting email security with a focus on FireEye’s Threat Protection (ETP) and Mimecast. Validate the alignment of supporting processes and associated World Wrestling Entertainment, Security Engineering Services 3 documentation with actual practices, identify and document any gaps and/or areas for improvement. Provide comprehensive recommendations to address any findings.

Assist in developing configuration and management documents as it relates to security operations.

Assist in the maturing and documenting of defined processes and addressing any ad hoc or informal processes.

Evaluate purchased products, services, and contract terms. Identify and document any lapse in maintenance or support services. Document any identified gaps or risks and provide comprehensive recommendations to address any findings.

Identity and Privilege Access Security:

Evaluate and assess the current platforms supporting Privilege Access Management (PAM) and Password Management/Vaulting with a focus on BeyondTrust and Keeper.

Validate the alignment of supporting processes and associated documentation with actual security practices, identify and document any gaps and/or areas for improvement.

Provide comprehensive recommendations to address any findings.

Assist in developing configuration and management documents as it relates to security operations.

Assist in the maturing and documenting of defined processes and addressing any ad hoc or informal processes.

Endpoint Security:

Evaluate and assess the current platforms supporting Endpoint Protection and Endpoint Detect & Response (EDR) with a focus on Cylance and Carbon Black. Validate the alignment of supporting processes and associated documentation with actual security practices, identify and document any gaps and/or areas for improvement. Provide comprehensive recommendations to address any findings.

Assist in developing configuration and management documents as it relates to security operations. Assist in the maturing and documenting of defined processes and addressing any ad hoc or informal processes.

Endpoint Configuration Management:

Evaluate and assess the endpoint (Workstation, Laptops and Servers) configurations from a security operations perspective and as it relates to endpoint protection, endpoint detect and response, patch management and asset management.

Evaluate and access the successful deployment of Mangine Engine’s Desktop Central (For Windows) and JAMF (For Mac) associated with Cylance and Carbon Black installations.

Evaluate and access WWE’s capabilities to identify issues or configurations preventing full deployment/coverage of the four (4) security tools.

Evaluate and access the current security operations as it relates to the asset management platform (Axonius).

Validate the alignment of supporting processes and associated documentation with World Wrestling Entertainment, Security Engineering Services

Drop files here browse files ...