Job Description
Roles and Responsibilities Summary:
1) Candidate should have 6-8 Years experience in Information Security / Cyber Security.
2) Candidate should have good experience in SOC Administration.
3) Candidate should have good working experience on Threat Detection & Response.
4) Candidate should have experience in security architecture & engineering.
1) The candidate will be supporting the security solutions.
2) The Candidate will be working on technical assessment of security solutions.
3) The Candidate will supporting for designing of security solutions.
2) The Candidate will be working on technical assessment of security solutions.
3) The Candidate will supporting for designing of security solutions.
Responsibilities:
1. Manage Security posture of IFTAS, handle complex solution designing across all components of Cybersecurity.
2. Manage vendor relationships for technical, design, projects and implementation.
3. Responsible for Examine and investigate security incidents.
4.Identify and detail information risk, governance and compliance concepts and principles.
5.Monitor, evaluate, and advise on information security issues related to systems, data, network and workflow to ensure security controls are appropriate and operating as intended.
6.Manage and perform internal & external penetration tests, application & network vulnerability assessment scans, and security risk assessment reviews.
7.Ability to develop processes for different SOC functions – SIEM, SOC, PIM, WAF and Vulnerability Management.
8.Strong problem-solving skills to troubleshoot, be able to understand technically assigned tasks and follow documented procedures.
9.Provide business support of security applications for identity, authorization, and policy management in a multi-tiered infrastructure
10.Implement risk management procedures, perform security threat assessments, manage user identities and access, and drive compliance of security policies.
2. Manage vendor relationships for technical, design, projects and implementation.
3. Responsible for Examine and investigate security incidents.
4.Identify and detail information risk, governance and compliance concepts and principles.
5.Monitor, evaluate, and advise on information security issues related to systems, data, network and workflow to ensure security controls are appropriate and operating as intended.
6.Manage and perform internal & external penetration tests, application & network vulnerability assessment scans, and security risk assessment reviews.
7.Ability to develop processes for different SOC functions – SIEM, SOC, PIM, WAF and Vulnerability Management.
8.Strong problem-solving skills to troubleshoot, be able to understand technically assigned tasks and follow documented procedures.
9.Provide business support of security applications for identity, authorization, and policy management in a multi-tiered infrastructure
10.Implement risk management procedures, perform security threat assessments, manage user identities and access, and drive compliance of security policies.
Education:
BE./ B.Tech/M.Tech (Computer Science/IT)
Experience:
2) Candidate should have good experience in SOC Administration.
3) Candidate should have good working experience on Threat Detection & Response.
4) Candidate should have experience in security architecture & engineering.
Certifications:
1) CISM, CISSP, CEH, SIEM (IBM QRadar, LogRhythm, SPLUNK, Azure Sentinel).- Mandatory
2)OSCP or any cybersecurity course will be added advantage
Knowledge:
1.Knowledge on SIEM,SOAR,UEBA,NBAD (Packet Capturing),PIM, Threat & Vulnerability Management
2.Knowledge of Windows and Linux systems, Active Directory Architecture, EDR, Data Governance, Vulnerability Management, SIEM systems, Network security Device - IPS, Next generation firewall, vulnerability management, and IAM.
3.Strong understanding of governance, risk and compliance frameworks such as NIST and CIS.
4.Knowledge of Windows and Linux systems, Active Directory Architecture, EDR, Data Governance, Vulnerability Management, SIEM solution, Network security Device - IPS, Next generation firewall, vulnerability management, and IAM.
5.Strong understanding of governance, risk and compliance frameworks such as NIST and CIS.
6.Must have intermediate knowledge of IT security policies, Privileged Access Management standards, and best practices.
3.Strong understanding of governance, risk and compliance frameworks such as NIST and CIS.
4.Knowledge of Windows and Linux systems, Active Directory Architecture, EDR, Data Governance, Vulnerability Management, SIEM solution, Network security Device - IPS, Next generation firewall, vulnerability management, and IAM.
5.Strong understanding of governance, risk and compliance frameworks such as NIST and CIS.
6.Must have intermediate knowledge of IT security policies, Privileged Access Management standards, and best practices.
Technical Skills:
Primary Mandatory Skills:
Handle complex solution designing across all components of Cybersecurity.
Manage vendor relationships for technical, design, projects and implementation.
Secondary Desirable Skills:
Ability to develop processes for different SOC functions – SIEM, SOC, PIM, WAF and Vulnerability Management.
Handle complex solution designing across all components of Cybersecurity.
Manage vendor relationships for technical, design, projects and implementation.
Secondary Desirable Skills:
Ability to develop processes for different SOC functions – SIEM, SOC, PIM, WAF and Vulnerability Management.
Key Skills
Education
UG:B.Tech/B.E. in Any Specialization
PG:M.Tech in Computers
Company Profile
Indian Financial Technology And Allied Services
IFTAS
https://www.iftas.in/careers/
Company Info
X
View Contact Details+
Contact Company:Indian Financial Technology And Allied Services
Website:http://careers.iftas.in
Salary:
Not Disclosed by Recruiter
Industry:
Functional Area:
Role Category:
IT Security
Role:
Cyber Security
Employment Type:
Full Time, Permanent