Back to Job Search

PKI Engineer

  • Location: Plano, Collin, Texas, 75024
  • Job Type:Contract

Posted 4 days ago

Long term contract in Plano, TX for a PKI Engineer.
Job Responsibilities:
  • Operate PKI in compliance with WebTrust.
  • Monitor and troubleshoot Gemalto/SafeNet HSM on day-to-day basis.
  • Monitor and troubleshoot Microsoft Windows CA on day-to-day basis.
  • Work with Infrastructure team on configuration management.
  • Work with development team on integrating new/updated PKI services.
  • Automation of tasks related to cybersecurity such as correlations, alerting, analysis, and event review processes.
Overall Program Contribution:
  • Develop the PKI Program specific outline for the connected cars security program.
  • Identify, research and propose concepts and architectural areas of need specific to the PKI domain.
  • Create, maintain and align the company’s security policies and standards with industry best practices and business needs in the adoption PKI and data protection technologies.
  • Development of technical security strategies related to PKI infrastructure.
  • Development of technical security architectures related to PKI infrastructure.
  • Development of technical security standards related to PKI infrastructure.
  • Administration, development and support.
  • Bachelor’s degree or higher, in Computer Science, Engineering or related discipline, or equivalent professional experience.
  • Deep knowledge of Key Generation/Management/Key Ceremony.
  • Secure Storage of Keys (HSM).
  • Knowledge of multi-tier CA for PKI (must have).
  • Hands-on experience in setting up, troubleshooting Gemalto/SafeNet HSM.
  • Hands-on knowledge in setting up Microsoft CA (must have).
  • Experience in setting up monitoring using SNMP, SCOM, Netcool, Kafka etc.
  • Experience in some scripting languages like PowerShell, Unix Shell, Perl, etc.
  • Integration of various tools and datasets to enhance detective and preventive control sets.
  • Codified security principles for cloud (X-as-a-Service) systems integrated directly into application designs and blueprints/formations.
  • Data exchanges with internal and external security intelligence platforms.
  • Unique, custom software solutions to achieve security goals when COTS or OSS solutions are not available or viable.
  • Software development experience/expertise to compliment product security and application security initiatives.
  • Systems analysis and software development efforts that align with Agile-related approaches.