TECHNOGEN, Inc. is a Proven Leader in providing full IT Services, Software Development and Solutions for 15 years.
TECHNOGEN is a Small & Woman Owned Minority Business with GSA Advantage Certification. We have offices in VA; MD & Offshore development centers in India. We have successfully executed 100+ projects for clients ranging from small business and non-profits to Fortune 50 companies and federal, state and local agencies.
I am Kishore from TechnoGen Inc, looking for InfoSec Engineer for one of our clients. Below is the job description for your review.
Please let me know if you would be interested and share your updated resume.
You can reach me /
InfoSec Engineer
Client location : Melville, NY (3 days onsite per week in Melville, NY)
12+ Months Contract
Scope of Work (not limited to)
Security Member who would report to Security InfoSec director.
Formulation of security policy and its deployment to each department
External scanning and reporting of DMZ public sites using an external vendor (IIJA)
FW Management and Correlation Analysis (SIEM) and Reporting Utilizing External Vendor (NTTA)
Management of patch application status and promotion of vulnerability response (each team is responsible for understanding the situation and managing the application status)
Triage and response/reporting in the event of a security incident
Additional security-related inquiries
Expected Must Qualifications
If possible, bilingual personnel with a deep understanding of Japan business culture and minimum-security knowledge
Those who can analyze practical aspects, define deficiencies, and make recommendations to the director.
A person who can proactively assist or lead the activities that security team members are currently dealing with and reduce the current workload on everyone.
A person who has the skills to define the requirements of the Managed Service and provide feedback to EA/JA to make up for the areas and shortages that can be handled by the Service from client's standpoint.
Expected Qualifications that impact our decision
Enterprise Security Architecture Understanding & Experience - a comprehensive framework that outlines the structure, policies, and procedures for securing an organization's information systems. It ensures that the security measures align with business objectives and regulatory requirements. A robust ESA provides a layered defense strategy, minimizing vulnerabilities and mitigating risks.
InfoSec Key activities understanding & experience
- Risk Assessment: Identifying, evaluating, and prioritizing risks to the organization's information assets.
- Policy Development: Creating comprehensive security policies and procedures that align with regulatory requirements and best practices.
- Access Control: Implementing measures to ensure that only authorized individuals can access sensitive information.
- Incident Response: Developing and executing plans to handle security breaches effectively, minimizing damage and ensuring quick recovery.
- Security Awareness Training: Educating employees on security best practices, potential threats, and how to respond to security incidents.
- Monitoring and Auditing: Continuously monitoring systems for suspicious activity and conducting regular audits to ensure compliance with security policies.
Security Technology Experience
- Microsoft Sentinel
- Microsoft Defender
- Crowds Strike
- Palo Alto Networks
- Cisco Firepower / ASA
- Cisco Umbrella
- CATO
Zero Trust and SASE: Understanding and Experience
- Implementing multi-factor authentication (MFA) for all users and devices.
- Micro-segmentation to isolate sensitive data and applications.
- Continuous monitoring and analysis of user activities and behaviors.
- Least privilege access to minimize potential attack vectors.
- Integrating security services such as secure web gateways (SWG), cloud access security brokers (CASB), and zero trust network access (ZTNA).
- Implementing software-defined WAN (SD-WAN) for optimized and secure connectivity.
- Deploying and managing SASE solutions to provide seamless and secure access to cloud and on-premises resources.
- Utilizing SASE to enhance network visibility and control, ensuring compliance with security policies.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job...Job Title: Armenian Remote Consecutive Interpreter - On-Demand Location: Remote Job Type: Independent Contractor Experience Level: Experienced A 360 Smart Lingo consecutive, over-the-phone interpreter and video Remote Interpreter plays a crucial role in...
...Do you love the technical aspects of nursing and take pride in being very thorough in... .... The MDS Nurse is responsible for the timely and accurate completion of the Resident Assessment... ...to requirements. This position will be Part-Time MDS Nurseand Part-Time Floor Nurse....
...school diploma or equivalent; additional education or sales training is a plus. ~ Previous experience in cold calling, telemarketing, or sales is preferred. ~ Excellent verbal communication and interpersonal skills. ~ Strong persuasive and negotiation...
...expert team focused on implementing and operating next-generation security solutions for government and commercial clients. Youll use Splunk and integrate it with other state-of-the-art tools like HBSS, Enterprise Security Manager (ESM), Network Security Manager (NSM),...
...dishonesty and other student code of conduct violations to the director. Communicates with Harford Community College IT department and Pearson Vue to report and resolve technical issues. Report the results of testing to supervisors and testing companies. Perform...