Cloud Architect

C2C
  • C2C
  • Anywhere

Job Title :  Cloud Architect
Location : Tampa, FL 

with 7+ years of experience with a Cloud Security Posture Management platform (Wiz preferably, Good to have – Orca, Prisma)
● Proven experience designing and implementing secure cloud architectures in AWS or Azure
● 7+ Hands on experience with a Cloud Security Posture Management platform (Wiz, Orca, Prisma)
● Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), or equivalent certification preferred.
● In-depth knowledge of cloud security best practices, standards, and regulations (e.g., CSA, NIST (800-53), GDPR, HIPAA).
● Strong understanding of networking, identity and access management (IAM), encryption, and other security technologies relevant to cloud environments.
● Excellent analytical and problem-solving skills, with the ability to assess complex security risks and develop effective mitigation strategies.
● Strong communication and collaboration skills, with the ability to effectively interact with cross-functional teams and clients.
● Identify, define and document and implement security system requirements for AWS and Azure utilizing Wiz. 
● Focus will be on preventative, detective and auto-remediating controls.
● Develop and execute test plans and produce quantitative results.
● Leverage broad knowledge of information security technologies, techniques, processes, and prepare to grow that knowledge within one or more security engineering domains.
● Drive complex technical information security projects to ensure on-time delivery.
● Identify and raise risks or potential vulnerabilities at all stages of the security- engineering process.
● Think outside the box to develop multiple solutions to complex problems.
● Work closely with a diverse set of stakeholders with varying priorities to debate and negotiate paths forward.
● Contribute to existing test suites (integration, regression, and performance), analyze test reports, identify any test issues/errors, and triage the underlying cause.
● Document and communicate required information for deployment, maintenance, support, and business functionality.
● Identify gaps in information security standards adherence and work with appropriate partners to develop plans to close gaps.
 

 

 

Regards,
Ankit |Technical Recruiter |KK Associates LLC
Contact: (469) 215-2333
Email Id: ankitkumar.s@kksoftwareassociates.com
URL: www.kksoftwareassociates.com
www.linkedin.com/in/ankit-shukla-19152a231
 


From:
ankit,
kkassociates
ankitkumar.s@kksoftwareassociates.com
Reply to:   ankitkumar.s@kksoftwareassociates.com