?? We're #Hiring a Lead Cloud Penetration Tester! This role centers on orchestrating and executing strategic #PurpleTeam exercises that simulate sophisticated cyber-attacks and defense mechanisms. You will also train and mentor junior penetration testers and other team members in advanced purple-teaming methodologies and best practices. Come join our growing team. #Veterans welcome to apply! ?? Must have: ?? Extensive experience in cloud security, including direct experience with large enterprise cloud services such as #AWS, #Azure, and #Microsoft365. ? Effective #communication and #interpersonal skills, with the ability to convey complex technical concepts to both technical and non-technical stakeholders Read more and apply at the link below: https://lnkd.in/e4TJis2q #RemoteJobs #CloudSecurity #Cloud
Maveris的动态
最相关的动态
-
Protecting today's digital environments requires our full gamut of #cybersecurity and cyberspace operations. Join #SAIC as a Cloud Vulnerability Assessment Analyst. https://bit.ly/46q19HQ #cybersecurity #remotework
要查看或添加评论,请登录
-
L2 Cloud Security Engineer: Responsibilities: - Identify and Track Vulnerabilities:?You'll be responsible for identifying the owners of all workloads on GCP and Azure, along with any systems with vulnerabilities or misconfigurations reported during scans. - Analyze and Prioritize Threats:?You'll play a key role in analyzing security scan reports to identify new vulnerabilities, remediate existing ones, and prioritize risks based on potential impact. - Remediate and Document:?Working within agreed timeframes, you'll develop and document clear remediation steps to address vulnerabilities. - Exception Management:?You'll support the process of managing exceptions and identifying false positives within security scans. You'll also work with stakeholders to improve exception management processes and educate them on identified vulnerabilities and misconfigurations. - Triage and Reporting:?You'll initiate the process of assigning vulnerabilities to the appropriate stakeholders and provide daily reports detailing open vulnerabilities by severity, risk, and ownership. - Validation and Tracking:?You'll validate that remediated vulnerabilities and misconfigurations are truly resolved through follow-up scans and verification steps. Additionally, you'll track vulnerable resources to measure the effectiveness of security processes. - Threat Hunting and Process Improvement:?You'll collaborate with the Security Operations Center (SOC) to leverage threat intelligence and native cloud capabilities to identify new misconfiguration use cases. You'll then establish triage workflows and set remediation SLAs for these new vulnerabilities and misconfigurations. Qualifications: - Total years of experience: 7-10 years - Minimum 5-7 years of experience in cloud security, with a focus on GCP and/or Azure. - Strong understanding of cloud security concepts, vulnerabilities, and misconfigurations. - Experience working with security scanning tools and analyzing reports. - Excellent analytical and problem-solving skills. - Effective communication and collaboration skills to work with various stakeholders. - Ability to prioritize tasks and work independently in a fast-paced environment. Please share the resumes to [email protected] Email title: L2 Cloud Security Engineer - Name (XXX) #hiring #cloudSecurity #GCP #Azure #AWS #Cybersecurity
要查看或添加评论,请登录
-
The 28% cybersecurity jobs vacancy rate is preventing organizations from adequately addressing escalating threats. Here's how to address the #talentshortage:
要查看或添加评论,请登录
-
?? ?????????????????? ??????????: ?????? ???????????????????? ???????????? ?? AWS has been silent about a potential ransomware attack, and the signs suggest this could be a serious issue. It’s critical that you take immediate action to protect your data and systems. Don’t wait—secure your assets before it’s too late. Call AWS or Palo Alto Networks today! For more information and resources on this topic, check out this link: Ransomware Alert: AWS Instances at Risk – Immediate Action Required: Source: https://lnkd.in/g4GrvqGw) Feel free to share this post with your network or tag someone who might be interested! ?? Share this now ——— Follow me for more Cloud opportunities and resources, Sai Venkat P. #AWS #CloudComputing #JobOpportunity #HiringNow #TechJobs #CareerGrowth #JoinUs #LinkedIn #AWS #CSA #Assessment #Interview #Amazonian #Amazon #InterviewTips #JobApplication #CareerGrowth #JobSearch #TechCareers #InterviewPreparation #GoogleCloud #CloudComputing #CloudCredits #FreeCredits #CloudTechnology #IndianTech #TechCommunity #StartupIndia #DigitalIndia #TechInnovation #CloudSolutions #BusinessGrowth #HRTech #EcommerceSolutions #ChatApplications #FinanceProjects #EnterpriseSolutions #ScalableSolutions #RobustSecurity #CuttingEdgeTechnology #TechOffers #InnovateAndGrow #IndiaTech #CloudEnthusiasts #TechOpportunities #certifications #AWS #Ransomware #CyberSecurity #DataProtection #CloudSecurity
要查看或添加评论,请登录
-
-
??Recent AWS Vulnerabilities: What You Need to Know?? In the past few months, cybersecurity researchers have uncovered critical vulnerabilities within Amazon Web Services (AWS) that pose serious risks, including potential remote code execution (RCE) and data theft. These vulnerabilities, if exploited, could allow attackers to gain unauthorized access to sensitive data or even execute malicious code within AWS environments. As organizations increasingly rely on cloud services, it's crucial to stay informed about these threats and take proactive steps to safeguard your infrastructure. Understanding and mitigating these risks is key to maintaining the security and integrity of your cloud-based operations. For a deep dive into the technical details and impact of these vulnerabilities, I highly recommend reading this insightful article by Ross Holmes. Uncovering Critical AWS Vulnerabilities, RCE and Data Theft: https://lnkd.in/gCaWZVpq. ?? Stay vigilant and ensure your AWS environments are secure! Feel free to share this post with your network or tag someone who might be interested! ?? Share this now ——— Follow me for more Cloud opportunities and resources, Sai Venkat P. #AWS #CloudComputing #JobOpportunity #HiringNow #TechJobs #CareerGrowth #JoinUs #LinkedIn #AWS #CSA #Assessment #Interview #Amazonian #Amazon #InterviewTips #JobApplication #CareerGrowth #JobSearch #TechCareers #InterviewPreparation #GoogleCloud #CloudComputing #CloudCredits #FreeCredits #CloudTechnology #IndianTech #TechCommunity #StartupIndia #DigitalIndia #TechInnovation #CloudSolutions #BusinessGrowth #HRTech #EcommerceSolutions #ChatApplications #FinanceProjects #EnterpriseSolutions #ScalableSolutions #RobustSecurity #CuttingEdgeTechnology #TechOffers #InnovateAndGrow #IndiaTech #CloudEnthusiasts #TechOpportunities #certifications #AWS #Cybersecurity #CloudSecurity #InfoSec #CloudComputing
要查看或添加评论,请登录
-
-
Renewed my Security Operations Analyst certification today. Sounds strange right? A red teamer with a Operations analyst background in Microsoft Sentinel... I humbly believe it is important for anyone that does cloud testing with offensive tooling to understand how those tools come across in logs. Everything from an unmodified toolset on a public github repo such as Azurehound, to making modifications to those toolsets for defense evasion. It's also helpful to point clients in the right direction should their security program fail to detect certain events. If that happens I can't stress enough to have a purple team engagement done in your environment. Detection skillsets in the cloud is sorely needed. Cloud is not going away. #TrustedSec
要查看或添加评论,请登录
-
-
?? AWS Secures Infrastructure with Sonaris ??? At AWS re, AWS revealed Sonaris, an internally developed tool that continuously monitors and blocks malicious attempts to access its resources. Between May 2023 and April 2024, Sonaris blocked over 24 billion attempts to scan data in Amazon S3 and nearly 2.6 trillion attempts to discover vulnerable services in EC2. Sonaris, named after a tool in "Halt and Catch Fire," leverages AWS's global infrastructure as a sensor network to detect and neutralize unauthorized access attempts. This powerful threat detection tool processes service logs and provides mitigation recommendations, integrating with Amazon GuardDuty, AWS WAF, and AWS Shield for proactive defense. David Vance of ESG Global highlights Sonaris's effectiveness due to AWS’s threat intelligence network, MadPot. Despite its potential, AWS has no plans to commercialize Sonaris, instead offering it as a built-in security measure. AWS's commitment to customer security is evident as they continue to innovate and share insights to enhance the overall security of the internet. ?????? ????????????????: ????????????????: We offer contract, contract to hire, direct hire, remote global hiring, SOW projects and managed services. https://lnkd.in/g6bddCHa ???????????? ????????????: We offer U.S. companies the opportunity to hire IT professionals from our India-based talent network. https://lnkd.in/gN2A4c-Y ???????????? ???????????????? ??????????????????????: We offer Web/Mobile Development, UI/UX Design, QA & Automation, API Integration, DevOps services and Product Development. https://lnkd.in/dcKsvxAu ?????? ????????????????: ?????????????????? :An E-commerce platform to sell your products online to a large user base with custom features. https://getzenbasket.com/ https://zenbasket.in/ ?????????? ??????????????: An automated payroll application that helps companies in India process their employees' payroll. https://lnkd.in/d8hyNKpM #AWS #CyberSecurity #CloudSecurity #Sonaris #ThreatDetection #AmazonEC3 #AmazonWebServices #GoogleCloud #MicrosoftAzure #DevOps #Networking #ServerlessComputing #Security #Firewall #Centizen #ZenBasket
要查看或添加评论,请登录
-
Excited to share that I am now Microsoft Certified in Security, Compliance, and Identity Fundamentals (SC-900) This validates my fundamental understanding of security, compliance, and identity concepts, including identity management, compliance solutions, and threat protection within Microsoft & Azure environment. #microsoft #azure
要查看或添加评论,请登录
-
-
As an Azure Security Consultant, your primary focus is to protect Azure environments from external and internal threats. This involves conducting security assessments, implementing robust security controls, ensuring compliance with industry standards, and responding effectively to security incidents. By leveraging your expertise in Azure security, you play a crucial role in helping organizations mitigate risks, maintain data privacy, and build resilient cloud infrastructures. https://lnkd.in/gP2Jsz4v #AzureSecurityExpertise #VulnerabilityManagement #SecuritySolutions #SecurityAssessment #ThreatAnalysis #SecurityRecommendations #RemediationPrioritization #SecurityControls #AzureSecurityServices #SecurityAutomation #DevSecOps
要查看或添加评论,请登录