Pyramid Consulting Groupother related Employment listings - Warrendale, PA at Geebo

Pyramid Consulting Group

Duties:
Lead the delivery of a number of security products for the Security Operations group under ISG.
Establish and document security requirements and use cases for the security products in scope for delivery.
Work closely with project managers on outlining the key tasks, refining delivery plans.
Act as a technical SME on resolution of conflicts around security requirements, broader IT impact and end-user experience for business users.
Provide assistance to implementation of relevant security policy changes.
Play an active part in acceptance testing and production deployment.
Provide relevant documentation and support required for the operational and business handover prior to go-live.
Skills:
Experience delivering and configuring operational security products such as SIEM, Vulnerability management, PKI management and Application Whitelisting solutions.
Strong experience with Azure and Office 365 platform capabilities.
Experience working in Windows and Linux environments and ability to administer and debug changes.
Experience working with virtual server and desktop environments such as VMware and Citrix.
Industry recognized technical certifications are desirable (CISSP, CCSP, CompTIA Security+, GIAC security essentials).
Microsoft technical certifications are desirable (Azure Solutions Architect, Azure Security Engineer, 365 Security Administrator, MCSE).
Familiarity with security and privacy regulations impacting financial services such as SOX and GDPR.
Excellent written and verbal communications skills.
About the Company:
Pyramid Consulting Group.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.