This TalentCloud seeks experts who can be responsible for implementing end-to-end security for the IoT solution from device access to encrypted connectivity and IoT cloud to application security. Additional responsibilities and characteristics include:
- Implementing best in class IoT security including firewalls, encryption strategies/implementation, authentication, and password encryption
- Creating and implementing ongoing security monitoring real-time monitoring applications
- Defining security architecture
- Selecting encryption methods
- Defining access security
- Defining security approach for devices, connectivity, IoT platform, data storage, and applications
Required Skills
- Proven experience in implementing security architectures for web & mobile applications
- Understand the 4 core IoT components: devices, connectivity, IoT platforms, and applications
- Understand how security is implemented on each of the 4 IoT elements and associated applications like storage
- Understand security, data encryption, and encryption protocols
- Understand device and user authentication approaches
- Understand security and hacking threats for all aspects of an IoT solution
- Understand how attack vectors can be used to breach an IoT solution
- Experience in implementing connected device security including connectivity intrusions, data encryption, VPN, and security approaches of cellular and wireless connectivity technologies
- Experience in Implementing cloud or web platform security solution
- Creating and implementing security documentation and ongoing process to monitor overall security of IoT solution
- Cybersecurity training and 2 at least certifications
- Ability to describe and implement security approach/architecture for the four components of IoT
Preferred Skills
- Ability to describe the current state of hackings and how to defend against them
- Describe recent hacking attempts and how your solution would have defended the system
- Show how a security architecture you designed kept hackers away
- Proven implementation of security architecture for device & web or mobile application
- Cloud or Enterprise security training and certification for relevant platforms
- Computer Engineering degree with an added focus on cybersecurity and security methods