Blue Yonder
Lead Cloud Infrastructure Vulnerability Analyst
Blue Yonder, Dallas, Texas, United States, 75215
Role:
Lead Cloud Infrastructure Vulnerability Analyst Location:
Dallas, TX or Scottsdale, AZ (will work remotely) Overview: Blue Yonder is a Leading AI-driven Global Supply Chain Solutions Software Product Company and one of Glassdoor's "Best Places to Work". Seeking an
Lead Cloud Infrastructure Vulnerability Analyst
who would be responsible for leading Cloud Security Posture Management (CSPM), identifying security vulnerabilities including misconfigurations across cloud infrastructures, including Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). This candidate would also be responsible for Cloud Workload Protection (CWP), to provide continuous discovery and monitoring of vulnerabilities in the workloads deployed in the cloud infrastructure. Candidate will be directly responsible for vulnerability management and threat management of the overall infrastructure and information assets. Scope: Core responsibilities to include assessing and promoting remediation for all the assets in the Infrastructure as a Service (IaaS) and Software as a Service (SaaS). Candidate will be a key member of the centralized information security team. What you'll do: Discover and continuously monitor for vulnerabilities in the public cloud infrastructure, cloud workloads including dockers, Kubernetes, and containers. Create golden images for virtual machines, dockers, and containers to be spun up for the business. Identify gaps in Identity and Access Management (IAM) in Public Cloud. Perform vulnerability scans and report findings for On-prem and Cloud networks. Publish the vulnerability status reports to senior management and track remediation. Define and participate in implementation of On-prem and Cloud architecture and security controls. Proactive identification of threats and risk remediation. Discover the assets in the cloud infrastructure to identify and continuously monitor for security vulnerabilities and misconfigurations. Maintain security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs. Upgrade security systems by monitoring security environment; identifying security gaps; evaluating and implementing enhancements. Participate in and assist with incident response team, as appropriate. Generate metrics for the Management as needed. Prepare system security reports by collecting, analyzing, and summarizing data and trends. What we are looking for: Required Qualifications 8 to 12+ years of proven experience in Information Security and/or Vulnerability Management. 5+ years of public cloud security infrastructure experience within Azure, AWS or GCP. Must have experience with at least one of the following CSPM (Cloud Security Management) tools; Prisma Cloud (Palo Alto Networks), Wiz, AWS Security Hub, Microsoft Defender for Cloud, Check Point Cloud Guard, Lacework OR Orca Security. Strong understanding of Threat Sources/Feeds like CISA, Threat Intelligence, and the latest Vulnerabilities like Log4J, Spring4shell. Bachelor's degree in Information Security, MIS or Computer Science. Preferred Qualifications Certifications such as CCSK, CCSP, GCSA, Microsoft Certified Azure Security Engineer Associate, CISSP or equivalent. Thorough understanding of Identity and Access Management best practices in Public cloud. Deep and diverse experience architecting and implementing network security designs. Expert in network security, system security and endpoint security. Thorough understanding of security vulnerabilities and misconfigurations in the cloud infrastructure. Thorough understanding of native cloud solutions like dockers, containers, Kubernetes, VDIs, cloud storage, cloud infrastructure. Familiarity with security frameworks and regulatory requirements such as NIST, ISO 27001/2, and SSAE-18. Proven experience with products dealing with vulnerability management services which include Qualys, Nessus, Nexpose. Practical experience with the development, implementation, and management of security related technologies (i.e., SIEM, WAF, AV, Firewalls, Internet-facing services). Excellent customer service including strong written and oral communication skills. Knowledge of security network devices (firewalls, switches, SIEM, Antivirus, cryptography) and other security networking hardware/software tools. Demonstrated understanding of information security concepts, standards, practices, including but not limited to firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management and event monitoring/reporting. Results focused and attention to detail.
#J-18808-Ljbffr
Lead Cloud Infrastructure Vulnerability Analyst Location:
Dallas, TX or Scottsdale, AZ (will work remotely) Overview: Blue Yonder is a Leading AI-driven Global Supply Chain Solutions Software Product Company and one of Glassdoor's "Best Places to Work". Seeking an
Lead Cloud Infrastructure Vulnerability Analyst
who would be responsible for leading Cloud Security Posture Management (CSPM), identifying security vulnerabilities including misconfigurations across cloud infrastructures, including Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). This candidate would also be responsible for Cloud Workload Protection (CWP), to provide continuous discovery and monitoring of vulnerabilities in the workloads deployed in the cloud infrastructure. Candidate will be directly responsible for vulnerability management and threat management of the overall infrastructure and information assets. Scope: Core responsibilities to include assessing and promoting remediation for all the assets in the Infrastructure as a Service (IaaS) and Software as a Service (SaaS). Candidate will be a key member of the centralized information security team. What you'll do: Discover and continuously monitor for vulnerabilities in the public cloud infrastructure, cloud workloads including dockers, Kubernetes, and containers. Create golden images for virtual machines, dockers, and containers to be spun up for the business. Identify gaps in Identity and Access Management (IAM) in Public Cloud. Perform vulnerability scans and report findings for On-prem and Cloud networks. Publish the vulnerability status reports to senior management and track remediation. Define and participate in implementation of On-prem and Cloud architecture and security controls. Proactive identification of threats and risk remediation. Discover the assets in the cloud infrastructure to identify and continuously monitor for security vulnerabilities and misconfigurations. Maintain security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs. Upgrade security systems by monitoring security environment; identifying security gaps; evaluating and implementing enhancements. Participate in and assist with incident response team, as appropriate. Generate metrics for the Management as needed. Prepare system security reports by collecting, analyzing, and summarizing data and trends. What we are looking for: Required Qualifications 8 to 12+ years of proven experience in Information Security and/or Vulnerability Management. 5+ years of public cloud security infrastructure experience within Azure, AWS or GCP. Must have experience with at least one of the following CSPM (Cloud Security Management) tools; Prisma Cloud (Palo Alto Networks), Wiz, AWS Security Hub, Microsoft Defender for Cloud, Check Point Cloud Guard, Lacework OR Orca Security. Strong understanding of Threat Sources/Feeds like CISA, Threat Intelligence, and the latest Vulnerabilities like Log4J, Spring4shell. Bachelor's degree in Information Security, MIS or Computer Science. Preferred Qualifications Certifications such as CCSK, CCSP, GCSA, Microsoft Certified Azure Security Engineer Associate, CISSP or equivalent. Thorough understanding of Identity and Access Management best practices in Public cloud. Deep and diverse experience architecting and implementing network security designs. Expert in network security, system security and endpoint security. Thorough understanding of security vulnerabilities and misconfigurations in the cloud infrastructure. Thorough understanding of native cloud solutions like dockers, containers, Kubernetes, VDIs, cloud storage, cloud infrastructure. Familiarity with security frameworks and regulatory requirements such as NIST, ISO 27001/2, and SSAE-18. Proven experience with products dealing with vulnerability management services which include Qualys, Nessus, Nexpose. Practical experience with the development, implementation, and management of security related technologies (i.e., SIEM, WAF, AV, Firewalls, Internet-facing services). Excellent customer service including strong written and oral communication skills. Knowledge of security network devices (firewalls, switches, SIEM, Antivirus, cryptography) and other security networking hardware/software tools. Demonstrated understanding of information security concepts, standards, practices, including but not limited to firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management and event monitoring/reporting. Results focused and attention to detail.
#J-18808-Ljbffr