Senior PKI Security Engineer in Atlanta, GA 30354 (Hybrid)

0 views
Skip to first unread message

Patrick Jane

unread,
Feb 22, 2025, 7:48:00 AMFeb 22
to avanishit...@gmail.com

Hello,

 

Greetings!

 

This is Avanish from NLB Services. We are a global recruitment company with a specialization in hiring IT professionals.  One of our clients is seeking a Senior PKI Security Engineer in Atlanta, GA 30354 (Hybrid).

 

Position: Senior PKI Security Engineer

Location: Atlanta, GA 30354 (Hybrid)

Type: Contract

 

Job Description:

 

Summary:-

Security professionals with extensive hands-on experience on PKI technology and market trends, assess the impact of emerging security threats on the enterprise risk level, recommend technology direction and/or adjustments to incorporate in the business plans. Consults with other members of team, client, and end users to identify PKI requirements and develop requirements documentation.


Professional Summary:-

  • High performing and self-motivated, extensive professional experience in designing, implementing and managing PKI and security solutions.
  • Solid understanding of PKI concepts and security properties.
  • Support PKI-based products (including Web servers and certification authorities) and Common PKI-based protocols (including SSL and TLS, HTTPs, or LDAPs).
  • Experience with certificate authority (CA) implementation in compliance with the Federal PKI (FPKI) Common Policy Authority.
  • Review, patch, the Red Hat Certificate System source code for defects.
  • Develop Red Hat Certificate System source code to implement new capability.
  • Strong expertise in PKI Engineering Support and troubleshooting.
  • Experience with HSM design and implementation.
  • Working knowledge with OSI layer 2-7 security tactics and different kinds of attacks.
  • Demonstrated abilities in working with team to deliver projects to clients within specified timeframe and as per specifications.

 

Responsibilities:-

  • Support and mature Delta’s PKI (Public Key Infrastructure) program, including strategy, governance, implementation, operations, and continuous alignment with compliance and regulatory requirements.
  • Engage with system owners, business teams, and IT stakeholders in strategic discussions to provide best in class PKI security strategy and industry guidance to maximize long-term business objectives.


Technical Skills Details:-

  • Good working experience with scripting platforms (PowerShell, Batch, Json, Python, YAML, etc)
  • Expert in PKI design, implementation, administration, and provisioning in AWS. Extensive experience in AWS PKI services: KMS, CloudHSM, ACM, CloudFront, Secrets Manager, CloudTrail
  • Experience with PKI-based products (including Web servers and certification authorities) and Common PKI-based protocols (including SSL and TLS, HTTPs, or LDAPs).
  • A solid understanding of Public Key Infrastructure (PKI) including technology, standards, and implementations, with experience managing, configuring, or supporting a PKI certificate authority
  • Experience with certificate authority (CA) implementation in compliance with the Federal PKI (FPKI) Common Policy Authority.
  • Conduct technical research and set cloud security direction and strategy
  • Experience in automating certificate renewal and certificate life cycle management.
  • Experience with Microsoft's PKI Technologies and latest Windows and Linux server platforms.
  • Experience with integration of Venafi with Microsoft PKI Technologies and Public PKI Providers.
  • Experience on IBM Mainframe platforms Encryption (TKE, UKO, SGKLM, etc).
  • Experience in areas such as identity management, provisioning, authentication, authorization, certification/governance, monitoring along, including HSPD-12 compliance.
  • Experience developing and implementing IT Contingency Plans.
  • Strong communication skills.
  • Strong attention to detail.
  • Keen diagnostic and problem solving skills.


Technical/Professional Certifications & Skills (Preferred)

  • Bachelor’s Degree in Information Security, Computer Science, or related field.
  • 5+ years of professional experience in PKI, Venafi, digital certificates management, IBM-Mainframe, Scripting and Information Security domains.
  • Experience with Agile software development methodologies.
  • Preferred one or more certifications: CISSP, AWS Cloud Certificates, CISM or other Cyber Security related certification.

 

Responsibilities:-

  • Responsible for the design, testing, evaluation, implementation, support, management, and deployment of security systems/devices used to safeguard the organization’s information assets.
  • Also responsible for analysing the information security environment and assisting with the development of security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure.
  • Works with the technical team to recover data after a security breach.
  • Configures and installs firewalls and intrusion detection systems.
  • Develops automation scripts to handle and track incidents.
  • Investigates intrusion incidents, conducts forensic investigations and mounts incident responses.
  • Delivers technical reports and formal papers on test findings.
  • Installs firewalls, data encryption, and other security measures.
  • Maintains access by providing information, resources, and technical support.
  • Ensures authorized access by investigating improper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements.
  • Updates job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations.
  • Accomplishes information systems and organization mission by completing related results as needed.
  • Builds, deploys, and tracks security measurements for computer systems and networks.
  • Mitigates security vulnerabilities by implementing applicable solutions and tools.
  • Performs vulnerability testing, risk analyses, and security assessments.
  • Collaborates with colleagues on authentication, authorization, and encryption solutions.
  • Tests security solutions using industry standard analysis criteria.
  • Responds to information security issues during each stage of a project’s lifecycle.
  • Performs risk assessments and testing of data processing systems.
  • Establishes system controls by developing framework for controls and levels of access; recommending improvements
  • Establishes computer and terminal physical security by developing standards, policies, and procedures; coordinates with facilities security; recommends improvements.
  • Safeguards computer files by performing regular backups; developing procedures for source code management and disaster preparedness; recommends improvements.
  • Determines the sensitivity of the data in order to recommend the appropriate security needs.
  • Develops proposals for, and consider cost effective equipment options to satisfy security needs.
  • Communicates with the technical team, management team and users companywide if data security is breached.
  • Designs infrastructure to alert the technical team of detected vulnerabilities.
  • Evaluates new technologies and processes that enhance security capabilities.
  • Supervises changes in software, hardware, facilities, telecommunications and user needs.
  • Defines, implements, and maintains corporate security policies.
  • Analyses and advises on new security technologies and program conformance.
  • Creates, tests, and implements network disaster recovery plans.
  • Recommends security enhancements and purchases.
  • Trains staff on network and information security procedures.
  • Develops security awareness by providing orientation, educational programs, and on-going communication.
  • Recommends modifications in legal, technical and regulatory areas that affect IT security.

 

Thanks & Regards,

Avanish Pandey

---------------------------------------

Next Level Business Services, Inc.

avanish...@recruiter.nlbtech.com

(904) 290-8616  || LinkedIn

 

Reply all
Reply to author
Forward
0 new messages