This TalentCloud seeks experts who can be responsible for implementing end-to-end security for the IoT solution from device access to encrypted connectivity and IoT cloud to application security. Additional responsibilities and characteristics include:
- Implementing best in class IoT security including firewalls, encryption strategies/implementation, authentication, and password encryption
 - Creating and implementing ongoing security monitoring real-time monitoring applications
 - Defining security architecture
 - Selecting encryption methods
 - Defining access security
 - Defining security approach for devices, connectivity, IoT platform, data storage, and applications
 
Required Skills
- Proven experience in implementing security architectures for web & mobile applications
 - Understand the 4 core IoT components: devices, connectivity, IoT platforms, and applications
 - Understand how security is implemented on each of the 4 IoT elements and associated applications like storage
 - Understand security, data encryption, and encryption protocols
 - Understand device and user authentication approaches
 - Understand security and hacking threats for all aspects of an IoT solution
 - Understand how attack vectors can be used to breach an IoT solution
 - Experience in implementing connected device security including connectivity intrusions, data encryption, VPN, and security approaches of cellular and wireless connectivity technologies
 - Experience in Implementing cloud or web platform security solution
 - Creating and implementing security documentation and ongoing process to monitor overall security of IoT solution
 - Cybersecurity training and 2 at least certifications
 - Ability to describe and implement security approach/architecture for the four components of IoT
 
Preferred Skills
- Ability to describe the current state of hackings and how to defend against them
 - Describe recent hacking attempts and how your solution would have defended the system
 - Show how a security architecture you designed kept hackers away
 - Proven implementation of security architecture for device & web or mobile application
 - Cloud or Enterprise security training and certification for relevant platforms
 - Computer Engineering degree with an added focus on cybersecurity and security methods