Microsoft Cloud Transformation / Azure is an advantage
Skills:
Responsibilities
- Communicates clearly and concisely, both orally and in writing
- Ability to establish cross-functional, collaborative relationships with business and technology partners
- Enables team members to understand “why” security controls are important to mitigate enterprise risks
- Ensures application and infrastructure architectural solutions are stable, secure, and compliant with required standards and practices
- Implements security monitoring across all platforms to ensure continuous availability and operational continuity of critical systems
- Demonstrated experience implementing and managing high capacity, redundant, and mission critical environments
- Upholds company policies, and legal/regulatory requirements,
- Implements and maintains system configurations and baselines to support secure application development software control best practices and standards
- Provides support to team members in order to achieve partners, business, and customer results
- Demonstrated ability to work successfully in a fast-paced and cross-functional team environment
- Strong technical background and understanding in the areas of enterprise infrastructure and information security.
Requirements
- BS degree in Information Technology, Computer Science, or a related field
- experience with cloud services – AWS and Azure is preferred
- 2+ years of experience in system administration, network administration, and systems engineering
- 2+ years supporting Linux operating systems, both server and client
- 2+ years supporting Microsoft Windows operating systems, both server and client
- 2+ years of experience with network administration and database administration
- 2+ years utilizing logging, monitoring, and alerting solutions, and/or similar solutions as a system administrator
- 2+ years utilizing configuration management solutions as a system administrator
- Experience with highly virtualized environments and cloud technologies
- Strong understanding of the business impact of security tools, technologies and policies. Ability to develop and articulate a compelling business case for recommended actions.