Skip directly to search

Skip directly to content

 

Timisoara

Security Consultant

Infrastructure
 
 

Responsibilities

• Identify and document information security risks and propose mitigating controls and process improvements
• Investigate and respond to security incidents
• Monitor networks and systems for potential threats
• Research, design, and develop new information security controls
• Actively research, evaluate, and drive next generation security technologies and solutions to solve the organizations needs
• Manage solution development and deployment that adhere to best practices

 

Qualifications and Experience

• Previously assessed, developed and implemented, operationalized, and documented comprehensive security technologies and processes
• Hands-on experience with multiple security technologies such as antivirus software, intrusion detection, firewalls, EDR solutions, Web- and E-Mail Security Gateway Solutions
• Hands-on experience with common Firewalls and Web-Application Firewalls
• Advanced Knowledge of the MITRE ATT&CK Framework and implementation of mitigation Security Controls
• Prior experience with Security- and Event-Management Tools, such as, but not limited to Azure Sentinel, Arcsight ESM, Crowdstrike, Splunk
• Prior experience with secure software development, data protection, cryptography, key management, identity and access management (IAM), network security (VPNs) within SaaS, IaaS, PaaS, and other cloud environments
• Solid understanding of a range of compliance, regulatory, and legal requirements and relevant principles, best practices, and standards across multiple industries (e.g., PCI, SOX, GLBA, CSA, PCI, NIST, ISO, IEEE, FedRAMP, HIPAA, and TCG)

 

Additional Information

Required Qualifications
• 5+ years of relevant security experience
• Bachelor’s in Computer Science, Information Security, Business, Management, Information Technology, or related field
• Previous security experience with a variety of security technologies
Preferred Qualifications
• Certifications including but not limited to: CISSP – Certified Information Systems Security Professional, CISM – Certified Information Security Manager, ISSAP – Information Systems Security Architecture Professional, CEH – Certified Ethical Hacker

We are listening

How would you rate your experience with Endava so far?

We would appreciate talking to you about your feedback. Could you share with us your contact details?