People Prime Worldwide connects organizations with top-tier cybersecurity talent to protect their digital assets. Our expertise in network, application, cloud, and data security. We offer professionals skilled in advanced technologies like firewalls, intrusion detection systems, encryption, and identity management. Focused on mitigating cyber threats and ensuring robust security, our candidates are equipped to manage and safeguard your information systems.
Configuration, management, and troubleshooting of hardware and software firewalls...
Firewalls Configuration, management, and troubleshooting of hardware and software firewalls (e.g., Cisco ASA, Palo Alto, Fortinet).
Intrusion Detection Systems (IDS)/Intrusion Prevention Systems (IPS) Deployment and management of IDS/IPS solutions (e.g., Snort, Suricata).
Virtual Private Networks (VPNs) Setup and maintenance of VPN solutions (e.g., IPsec, SSL VPN).
Installation, configuration, and management of endpoint protection solutions...
Antivirus and Anti-malware - Installation, configuration, and management of endpoint protection solutions (e.g., Symantec, McAfee).
Endpoint Detection and Response (EDR) - Use of EDR tools for threat hunting and incident response (e.g., CrowdStrike, Carbon Black).
Mobile Device Management (MDM) Configuration and management of MDM solutions (e.g., VMware Workspace ONE, Microsoft Intune).
Implementation of multi-factor authentication (MFA) and single sign-on (SSO)...
Authentication Protocols - Implementation of multi-factor authentication (MFA) and single sign-on (SSO) (e.g., OAuth, SAML).
User and Access Management - Management of user identities and permissions (e.g., Active Directory, LDAP).
Configuration and use of SIEM tools for collecting and analyzing security logs...
Log Management and Analysis - Configuration and use of SIEM tools for collecting and analyzing security logs (e.g., Splunk, IBM QRadar).
Incident Response - Techniques for detecting, analyzing, and responding to security incidents using SIEM platforms.
Managing security configurations and compliance in cloud environments (e.g., AWS Security Hub...
Cloud Security Posture Management (CSPM) - Managing security configurations and compliance in cloud environments (e.g., AWS Security Hub, Microsoft Azure Security Center).
Cloud Access Security Brokers (CASB) - Implementing and managing CASB solutions to monitor cloud service usage (e.g., Netskope, McAfee MVISION).
Practices for secure coding and application security (e.g., OWASP Top Ten...
Secure Software Development - Practices for secure coding and application security (e.g., OWASP Top Ten, Secure Coding Standards).
Web Application Firewalls (WAF) - Deployment and configuration of WAFs to protect web applications (e.g., AWS WAF, Cloudflare).
Identifying vulnerabilities in applications to protect against threats. Tools include...
Identifying vulnerabilities in applications to protect against threats. Tools includes:
Encryption - Implementing encryption protocols for data at rest and in transit (e.g., AES, TLS/SSL).
Data Loss Prevention (DLP) - Configuring DLP solutions to prevent unauthorized data access and leakage (e.g., Symantec DLP, Forcepoint).
Utilizing TIPs to gather and analyze threat intelligence (e.g., ThreatConnect, Anomali)...
Threat Intelligence Platforms (TIPs) - Utilizing TIPs to gather and analyze threat intelligence (e.g., ThreatConnect, Anomali).
Threat Hunting - Techniques for proactively searching for threats within an environment (e.g., use of YARA rules, OSINT).