Data Analyst with cryptographic standards// 2Positions Reston, VA Hybrid 3Days/Week

Overview

Hybrid
Depends on Experience
Accepts corp to corp applications
Contract - W2
Contract - Independent
Contract - 12 Month(s)

Skills

Strong understanding of cryptographic standards and their use (Encryption
Hashing
Digital Certificates
Digital Signature
etc).

Job Details

Data Analyst with cryptographic standards// 2Positions Reston, VA Hybrid 3Days/Week

Reston, VA

Duration: Long term

Description:

The Data Encryption Analyst is responsible for implementing a cryptographic inventory process that includes collecting cryptographic configuration settings from network(s) and applications to identify the use of weak settings, engage respective asset owners, follow-up and track configuration updates.
The Data Encryption Analyst is also responsible for gathering requests for guidance from application teams and working with a cross functional subject matter expert (SMEs) to identify possible solutions and provide guidance.
The person preferably has hands-on experience in configuring TLS, including tasks like obtaining a certificate from a trusted CA, installing it on the system, defining cipher suites, and ensuring proper TLS handshake.
Prior experience with encryption key management, including implementing policies, monitoring compliance, and ensuring secure handling of cryptographic materials, is preferred.
Required Skills:
2-3 years of experience in collecting encryption configuration settings from a variety of network and application security tools, correlate, analyze, and provide actionable insights.
Strong understanding of cryptographic standards and their use (Encryption, Hashing, Digital Certificates, Digital Signature, etc).
Knowledge of data classification, encryption, and key management.
Experience in working with any of the following tools: ExtraHop, Nessus, Tenable, Wiz, Splunk, or any other security monitoring tools.
Strong analytical skills using Excel or Power BI, and problem-solving skills with attention to detail.
Excellent communication and documentation abilities.
Working experience in cybersecurity, data security, or data protection operations.
Nice to Have:
Thorough understanding of the Public Key Infrastructure (PKI), secure encryption algorithms, modes, and the Transport Layer Security (TLS).
Understanding of symmetric and asymmetric encryption and respective use cases.
Familiarity with cryptographic services in AWS, Azure, and Google Cloud.
Use of scripting languages (e.g., Python) for data manipulation and automation.
Certifications in information security.

Kiran Kumar

Key Business Solutions, Inc.

|| Office: || Fax: || Email: || Website: ||

Gtalk:

Note: This email is not intended to be a solicitation. Please accept our apologies and reply in the subject heading with REMOVE to be removed from our Mailing list.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.