Ask IT Consulting
Skype Interview for Information Security Architect in Columbia, SC
Ask IT Consulting, Columbia, South Carolina, us, 29228
Skype Interview for Information Security Architect in Columbia, SC
Full-time This is Amrita Sharma with Ask ITC Inc., backed by a $500 million Microtek group company. We provide an industry-leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owed enterprise committed to delivering the highest quality and ensuring customer satisfaction. Position:
CL - Information Systems Architect - Consultant Location:
Columbia, SC, 29210 Duration:
10+ months Skills: Information security principles and practices IT Security Security Information Architecture Application Security Risk and vulnerability assessments Role-Based Access Control (RBAC) Security Information and Event Management (SIEM) systems development and configuration Tenable Security Center administration Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web applications, databases, strong authentication, operating systems, and network security protocols and procedures Data discovery and Data Loss Prevention (DLP) Identity Access Management (IAM) All your information will be kept confidential according to EEO guidelines.
#J-18808-Ljbffr
Full-time This is Amrita Sharma with Ask ITC Inc., backed by a $500 million Microtek group company. We provide an industry-leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owed enterprise committed to delivering the highest quality and ensuring customer satisfaction. Position:
CL - Information Systems Architect - Consultant Location:
Columbia, SC, 29210 Duration:
10+ months Skills: Information security principles and practices IT Security Security Information Architecture Application Security Risk and vulnerability assessments Role-Based Access Control (RBAC) Security Information and Event Management (SIEM) systems development and configuration Tenable Security Center administration Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web applications, databases, strong authentication, operating systems, and network security protocols and procedures Data discovery and Data Loss Prevention (DLP) Identity Access Management (IAM) All your information will be kept confidential according to EEO guidelines.
#J-18808-Ljbffr