06 Jun
DLP/DAM Implimentation
Vacancy expired!
- Five (5) years of experience within the last seven (7) years in a large enterprise environment (5000 employees or more with 500 servers or more) performing all of the following:
- Architecture and administration of McAfee products: HIPS, DLPe, MOVE, TIE, ATD, ATP, ENS, Firewall, Web Control, Application Control, native drive encryption, drive and removable media encryption.
- ePO Architecture and Administration.
- Creating and maintaining EDR policies and rules, standard operating procedures and technical documents.
- Two (2) years of experience within the last four (4) years performing endpoint security malware events analysis and remediation.
- Two (2) years of experience within the last four (4) years performing all of the following:
- TCP/IP networking and firewalls.
- Network security support.
- VPN connectivity.
- System administration.
- Windows and Linux operating systems
- Three (3) years of experience within the last four (4) years performing all the following:
- Planning, designing, implementing, optimizing, and operating malware and OS vulnerability security solutions.
- Cloud Security malware protection in AWS and Azure.
- Patch and configuration management.
- Two (2) years of experience within the last four (3) years performing all the following:
- Upgrading ePO 5.9 to ePO 5.10.
- Implementing and operating McAfee Rouge Detection System.
- Protecting data with security protocols - SSL, IPSE, ACL, SMTP, HTTP, HTTPS, IMAP, POP3 and security policies.
- Diagnosing and remediating malware.
- Two (2) years of experience within the last three (3) years performing all of the following:
- Developing and applying McAfee policy and exclusions.
- Tuning up the policies to protect from newly identified threats.
- Must have all of the following certifications: Certified McAfee Product Security Specialist - ePO.
- Must have one of the following scripting languages: VB Scripting, Python, PowerShell.
- (Mcafee ePO or Mvision Experience)
- Working knowledge of implementing and managing privileged Access Management (PAM)/ Database Activity Monitoring (DAM)/ Data Loss Prevention (DLP), Web Application Firewall (WAF)
- Vulnerability and risk assessment - important components of risk management
- Security assessments of network infrastructure, hosts and applications - another element of risk management
- Forensics - investigation and analysis of how and why a breach or other compromise occurred
- Troubleshooting - the skill to recognize the cause of a problem
- DLP, AV, WAF, EDR and anti-malware - an understanding of the tools used to protect the organization
- TCP/IP, computer networking, routing and switching - an understanding of the fundamentals: the language, protocol and functioning of the internet
- Maintain data and monitor security access and conduct internal security audits
- Analyze security breaches to determine their root cause and recommend/ install appropriate tools and countermeasures
- Windows, UNIX and Linux operating systems, on which most of the business world runs
- Knowledge and understanding of information risk concepts and principles as a means of relating business needs to security controls.
Vacancy expired!