Description

Job Description :

GCP Organization Policy
GCP IAM(Identity and Access Management) Policy
GCP Security Command Center
SAMA Regulation
Hands on Security Implementation(MFA, SSO, GCDS, Cloud Armor)
Job Summary

Looking out for Resource experience with Google Cloud Platform Security .Having fair understanding of technology and Subject Matter Level Expertise.
Years of experience needed –

5+ years on IT Security and minimum 3+ years in GCP cloud security
Technical Skills:

Requires overall understanding of Security services related processes and technologies
Cloud Security
Data Security
Intrusion system
Anti-virus and anti-spyware console
Audit principles and associated compensating controls
Identity & Access Management
Experience with GCP Cloud functions
Hands on experience in managing the GCP security controls
Must have basic understanding on with Python and Terraform.
Hands-on configuration and management experience on native Security controls in GCP ( GCP malware solution, GCP KMS, Cloud Armor and Google Security Command Centre)
Analyze, troubleshoot, and investigate security-related, information systems’ anomalies based on security platform reporting, network traffic, log files, host-based and automated security s.
In-depth knowledge of data protection strategies, network and system vulnerabilities; security tool sets including security event management tools
Provide SIRT support as needed in response to information security related events.
Participate in continuous improvement processes
Doing Threat Management by working on different kind of attacks, Malwares, Viruses, web application attack based on OWASP
Maintain and update relevant system and process documentation and develop ad-hoc reports as needed.
Plans security systems by evaluating network and security technologies
Prepares system security reports by collecting, analyzing, and summarizing data and trends
Knowledge of PCI, ISO 27002 and other security standards and framework. Good for the candidate to have knowledge of SAMA Compliance.
Assist the development of security tool requirements, trials, and evaluations, as well as security operations procedures and processes
Monitors industry security updates, technologies and best practices to improve security management
Certifications Needed:

Good to have any Security Certification.
 

Education

Any Graduate