Overview
Skills
Job Details
Data Analyst with cryptographic standards// 2Positions Reston, VA Hybrid 3Days/Week
Reston, VA
Duration: Long term
Description:
The Data Encryption Analyst is responsible for implementing a cryptographic inventory process that includes collecting cryptographic configuration settings from network(s) and applications to identify the use of weak settings, engage respective asset owners, follow-up and track configuration updates.
The Data Encryption Analyst is also responsible for gathering requests for guidance from application teams and working with a cross functional subject matter expert (SMEs) to identify possible solutions and provide guidance.
The person preferably has hands-on experience in configuring TLS, including tasks like obtaining a certificate from a trusted CA, installing it on the system, defining cipher suites, and ensuring proper TLS handshake.
Prior experience with encryption key management, including implementing policies, monitoring compliance, and ensuring secure handling of cryptographic materials, is preferred.
Required Skills:
2-3 years of experience in collecting encryption configuration settings from a variety of network and application security tools, correlate, analyze, and provide actionable insights.
Strong understanding of cryptographic standards and their use (Encryption, Hashing, Digital Certificates, Digital Signature, etc).
Knowledge of data classification, encryption, and key management.
Experience in working with any of the following tools: ExtraHop, Nessus, Tenable, Wiz, Splunk, or any other security monitoring tools.
Strong analytical skills using Excel or Power BI, and problem-solving skills with attention to detail.
Excellent communication and documentation abilities.
Working experience in cybersecurity, data security, or data protection operations.
Nice to Have:
Thorough understanding of the Public Key Infrastructure (PKI), secure encryption algorithms, modes, and the Transport Layer Security (TLS).
Understanding of symmetric and asymmetric encryption and respective use cases.
Familiarity with cryptographic services in AWS, Azure, and Google Cloud.
Use of scripting languages (e.g., Python) for data manipulation and automation.
Certifications in information security.
Kiran Kumar
Key Business Solutions, Inc.
|| Office: || Fax: || Email: || Website: ||
Gtalk:
Note: This email is not intended to be a solicitation. Please accept our apologies and reply in the subject heading with REMOVE to be removed from our Mailing list.