Best Talent Reach (BTR) 3 Jobs Found for "cybersecurity"

Hiring? Post Your Job Here Join Our WhatsApp Channel

Top 10 Earners by Sharing Jobs To Other Platforms
Sort by:

SAP BTP SECURITY IAM CONSULTANT @ SAPSOL

0 Negotiable or Not Mentioned Remote 23 days ago sapsol.com 1289 Views

We are seeking a highly motivated and experienced SAP BTP Security IAM Consultant to join our team on a contract basis. The successful candidate will be responsible for managing and implementing comprehensive security frameworks within the SAP Business Technology Platform, ensuring the integrity and protection of our cloud infrastructure and corporate data assets. This role is crucial for maintaining seamless and secure user access across various applications and services. The position is offered as a contract opportunity, allowing for flexibility while contributing to high-impact security projects. Candidates will be expected to utilize their expertise in Identity and Access Management to design robust authentication and authorization strategies that align with industry best practices. This is a remote role, providing the opportunity to work from any location while maintaining close collaboration with our global technical teams through virtual communication channels. Applicants should submit their current resume to the specified email address for consideration.

Key Requirements

Demonstrated proficiency in SAP Business Technology Platform (BTP) security configurations and administration. Extensive experience with Identity and Access Management (IAM) tools and methodologies within an enterprise environment. Strong understanding of SAP Cloud Identity Authentication Services (IAS) and Identity Provisioning Services (IPS). In-depth knowledge of modern authentication protocols including SAML 2.0, OAuth 2.0, and OpenID Connect. Proven ability to design and implement role-based access control (RBAC) and attribute-based access control (ABAC). Experience in managing and troubleshooting security policies and user permissions in cloud-based landscapes. Familiarity with contract-based IT consulting and the ability to meet project deadlines effectively. Strong analytical skills for identifying potential security vulnerabilities and implementing remediation strategies. Excellent communication and interpersonal skills for effective collaboration with cross-functional stakeholders. Ability to work independently in a remote environment while maintaining high productivity and attention to detail.
Similar Jobs

CYBERSECURITY AND INFORMATION SECURITY INTERN @ INFOSEC NETWORKS

0 Negotiable or Not Mentioned Remote 26 days ago infosecnetworks.com 1676 Views

Infosec Networks is offering a Cybersecurity and Information Security Intern position, which features a structured 6-month program consisting of a 3-month paid training period followed by a 3-month professional internship. This opportunity is designed for students and fresh graduates who are eager to build a career in the cybersecurity industry. The program provides a rare blend of theoretical knowledge and hands-on application, ensuring that participants are well-prepared for the challenges of modern information security. During this period, candidates will have the chance to work on real-world projects and develop practical skills that are highly valued in the tech market. Throughout the internship, successful candidates will engage in critical security activities such as Vulnerability Assessment and Penetration Testing (VAPT), network security monitoring, and incident response. Interns will utilize industry-leading tools like Wireshark, Nmap, and Metasploit to conduct security research and produce professional-grade reports. Participants will benefit from direct mentorship from industry experts and receive an internship certificate upon completion. Furthermore, there is a strong potential for full-time employment opportunities with the company's client base for top-performing individuals. Work locations include remote options open to all, as well as on-site positions in Kollam, India. This role is offered with paid training.

Key Requirements

Vulnerability Assessment and Penetration Testing (VAPT) expertise. Proficiency in network security monitoring and analysis. Ability to perform incident response and threat analysis. Hands-on experience with security tools like Wireshark, Nmap, and Metasploit. Competency in security research and professional reporting. Foundational knowledge of networking protocols including TCP/IP, DNS, and HTTP. Familiarity with Linux environments, specifically Kali Linux. Demonstrated strong interest in ethical hacking and cybersecurity. Candidates must be current students or fresh graduates in a related field. Strong analytical thinking and problem-solving capabilities. Excellent written and verbal communication skills for technical reporting.
Similar Jobs

MOBILE DEVICE VULNERABILITY & CONFIGURATION COMPLIANCE ENGINEER @ MIC TALENT SOLUTIONS

0 Negotiable or Not Mentioned Remote 28 days ago mictalent.solutions 1244 Views

We are seeking a dedicated Mobile Device Vulnerability & Configuration Compliance Engineer to join our team on a contract basis. The primary focus of this role is to manage and secure mobile device environments by identifying vulnerabilities and ensuring all devices meet established configuration compliance standards. You will be responsible for conducting thorough assessments of mobile hardware and software, implementing security patches, and maintaining the integrity of the mobile fleet across the organization. This role involves working with cross-functional teams to integrate security best practices into the mobile lifecycle.

The successful candidate will leverage their expertise in mobile device management (MDM) systems and security protocols to proactively defend against potential threats. You will be expected to monitor industry trends, evaluate new security tools, and provide detailed reporting on compliance status to stakeholders. As a contract professional, you should possess a high degree of technical proficiency and the ability to work independently in a fast-paced environment. This is an excellent opportunity to contribute to a specialized security field and enhance the overall security posture of our mobile operations.

Key Requirements

In-depth knowledge of mobile device management (MDM) platforms. Proven experience in identifying and remediating mobile device vulnerabilities. Familiarity with configuration compliance standards such as CIS and NIST. Experience with iOS and Android operating system security architectures. Ability to perform automated and manual security configuration audits. Proficiency in using vulnerability scanning and assessment tools. Strong understanding of mobile application security and threat modeling. Excellent technical documentation and reporting skills. Solid grasp of network security protocols and encryption standards. Relevant professional certifications such as CISSP, CEH, or CompTIA Mobility+.
Similar Jobs