V Group Inc. ยท 5 hours ago
Information Technology Security Architect
Maximize your interview chances
Insider Connection @V Group Inc.
Get 3x more responses when you reach out via email instead of LinkedIn.
Responsibilities
Strong understanding of security principles, including secure coding practices, vulnerability management, threat modeling, and risk assessment.
Strong experience with containerization technologies such as Docker and container orchestration tools like Kubernetes (Redhat OpenShift preferred).
Demonstrable experience on securing containerized environments and integrate security into container workflows.
Understanding of regulatory compliance requirements (e.g., HIPAA, PCI DSS) and experience implementing controls to meet these requirements.
In addition to these technical skills and experiences possessing relevant certifications such as certified Ethical Hacker (CEH), or AWS Certified Security Specialty in security and DevOps practices.
Knowledgeable of OSI networking model. Hands-on experience with design and configuration of network security on layer 3, 4, and 7, Application of these in a data center environment is highly desired.
Risk Management - must be able to Identify gaps through risk management, and assist in the development of mitigation strategies.
Experience documenting vulnerability assessment results in a accurate, clear, actionable, and available way to appropriate personnel.
Strong understanding of security principles, including secure coding practices, vulnerability management, threat modeling, and risk assessment.
Expertise in using Copado for Salesforce deployment automation and release management.
Knowledge of common security frameworks such as OWASP Top 10 and CIS Benchmarks.
Experience using GitHub Actions for CI/CD pipelines and GitHub Security features like code scanning and secret scanning.
Understanding of regulatory compliance requirements (e.g., HIPAA, PCI DSS) and experience implementing controls to meet these requirements.
Industrial experience w/ DevSecOps concept such as static code analysis, dependency bot, and container hardening. Experience with integration of these.
Knowledgeable of OSI networking model. Hands-on experience with design and configuration of network security on layer 3, 4, and 7. Application of these
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Strong understanding of security principles, including secure coding practices, vulnerability management, threat modeling, and risk assessment.
Strong experience with containerization technologies such as Docker and container orchestration tools like Kubernetes (Redhat OpenShift preferred).
Demonstrable experience on securing containerized environments and integrate security into container workflows.
Understanding of regulatory compliance requirements (e.g., HIPAA, PCI DSS) and experience implementing controls to meet these requirements.
In addition to these technical skills and experiences possessing relevant certifications such as certified Ethical Hacker (CEH), or AWS Certified Security Specialty in security and DevOps practices.
Knowledgeable of OSI networking model. Hands-on experience with design and configuration of network security on layer 3, 4, and 7, Application of these in a data center environment is highly desired.
Risk Management - must be able to Identify gaps through risk management, and assist in the development of mitigation strategies.
Experience documenting vulnerability assessment results in a accurate, clear, actionable, and available way to appropriate personnel.
Strong understanding of security principles, including secure coding practices, vulnerability management, threat modeling, and risk assessment.
Expertise in using Copado for Salesforce deployment automation and release management.
Knowledge of common security frameworks such as OWASP Top 10 and CIS Benchmarks.
Experience using GitHub Actions for CI/CD pipelines and GitHub Security features like code scanning and secret scanning.
Understanding of regulatory compliance requirements (e.g., HIPAA, PCI DSS) and experience implementing controls to meet these requirements.
Industrial experience w/ DevSecOps concept such as static code analysis, dependency bot, and container hardening. Experience with integration of these.
Knowledgeable of OSI networking model. Hands-on experience with design and configuration of network security on layer 3, 4, and 7.
Preferred
Redhat OpenShift preferred.
Company
V Group Inc.
Since 1999, V Group Inc.
H1B Sponsorship
V Group Inc. has a track record of offering H1B sponsorships. Please note that this does not
guarantee sponsorship for this specific role. Below presents additional info for your
reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2023 (1)
2021 (2)
2020 (1)
Funding
Current Stage
Growth StageCompany data provided by crunchbase