ApTaskother related Employment listings - Edison, NJ at Geebo

ApTask

About Client:
The Client is a leading global IT services and consulting company, providing a wide range of services to clients in various industries, including banking, financial services, retail, manufacturing, healthcare, and more.
It is one of the largest employers in the IT industry and has a vast and diverse workforce.
The company places a strong emphasis on employee training and development.
Client is known for its commitment to innovation and invests in research and development to stay at the forefront of technological advancements.
It offers a comprehensive set of services, including:
IT Services:
Application development, maintenance, and testing.
Consulting:
Business consulting, IT strategy, and digital transformation.
Business Process Outsourcing (BPO):
Outsourcing of business processes to improve efficiency.
Enterprise Solutions:
Implementation and support of enterprise-level software solutions.
Digital Services:
Services related to digital technologies, such as analytics, cloud, and IoT.
Salary Range:
$140K-$150K/Annum
Job Description:
Security Architecture:
Develop security architecture and guiding principles to support information technology initiatives with a focus on cloud.
Oversee and drive the design and implementation of security architecture controls in support of compliance requirements.
Support security architecture and guiding principles and apply to information technology initiatives.
Deliver technical guidance related to enhancing the security posture of information systems solutions.
Assist the design and implementation of security architecture controls to meet compliance requirements.
Multi Cloud Security Design and develop public cloud specific security policies, standards and procedures - Identity and Access Management (SSO, SAML), Firewall Management, Encryption Key Management, Security Incident and Event Management (SIEM), etc.
, in partnership with Enterprise Architecture, Infrastructure, DevOps and Application Development teams.
Identify and validate security controls for cloud services.
Analyze threats and current security controls to identify gaps in current defensive posture.
Design security controls for multi-tier business solutions including the design of application-level access and entitlement management, data tenancy and isolation, encryption, and logging.
Researches and creates a comprehensive strategy for cloud-native security (i.
e.
, data classification and categorization; data segmentation; server access control; resources-based access control and access control lists; user identity access management and attestation; data-at-rest encryption; data-in-transit encryption; encryption key management, logging, auditing, and anomaly detection; and role-based access control).
Assists in the integration of development pipelines with secure configuration parameters to remove or reduce known threat vectors and vulnerabilities in infrastructure-as-code (IaC) and continuous integration/continuous delivery (CI/CD) build configurations and release automation.
IAM Develop IAM technology roadmaps in support of customer vision and strategy.
Drive Zero Trust Architecture principles and Passwordless design.
Develop proof-of-concept prototypes and initial implementation models.
Monitor implementation activity to ensure architecture and design principles are upheld.
Ensure implementation solutions support architecture objectives (e.
g.
, availability, scalability, performance, security, etc.
), as appropriate.
Vulnerability Management Vulnerability Assessment:
Identify and evaluate security vulnerabilities in current and future products, assess their severity, and propose mitigation strategies.
Network Security Develop and maintain network security strategy, aligning it with business goals and compliance requirements.
Design and implement network security architecture, including firewalls, intrusion detection/prevention systems, VPNs and other security technologies.
Research, evaluate, and recommend security solutions, products, and technologies that can enhance the network's security posture.
Partner and conduct security audits and penetration tests to assess the network's security and identify vulnerabilities.
About ApTask:
ApTask is a leading global provider of workforce solutions and talent acquisition services, dedicated to shaping the future of work.
As an African American-owned and Veteran-certified company, ApTask offers a comprehensive suite of services, including staffing and recruitment solutions, managed services, IT consulting, and project management.
With a focus on excellence, collaboration, and innovation, ApTask provides unparalleled opportunities for professional growth and development.
As a member of the ApTask team, you will have the chance to connect businesses with top-tier professionals, optimize workforce performance, and drive success across diverse industries.
Join us at ApTask and be part of our mission to empower organizations to thrive while fostering a diverse and inclusive work environment.
Applicants may be required to attend interviews in person or by video conference.
In addition, candidates may be required to present their current state or government issued ID during each interview.
Candidate Data Collection
Disclaimer:
At ApTask, we prioritize safeguarding your privacy.
As part of our recruitment process, certain Personally Identifiable Information (PII) may be requested by our clients for verification and application purposes.
Rest assured, we strictly adhere to confidentiality standards and comply with all relevant data protection laws.
Please note that we only collect the necessary information as specified by each client and do not request sensitive details during the initial stages of recruitment.
If you have any concerns or queries about your personal information, please feel free to contact our compliance team at businessexcellence@aptask.
com.
About the Company:
ApTask.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.