Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Job Location | Bangalore |
Education | Not Mentioned |
Salary | Not Disclosed |
Industry | Telecom / ISP |
Functional Area | General / Other Software |
EmploymentType | Full-time |
The Cyber Security and Data Protection resource deals with advanced, complex, and ever changing threats which could affect the Syniverse brand and/or business operations. Demonstrates a strong self-managed individual delivering against enterprise level cyber security programs. Drive delivery for the implementation, monitoring, and continuous improvement of Security Operations Centers (SOCs) and Cyber Fusion Center, Vulnerability Management, Incident Handling & Response and Data Protection practices Contributes to the development and organization of Cyber Security and Data Protection program management, threat intelligence, defense monitoring and vulnerability management. Ability to establish metrics and reporting for both technical and non-technical stakeholders. Operates one or more Cyber functions including leveraging a follow the sun model supporting established SOCs and Cyber Fusion Center, Vulnerability Management, Incident Handling & Response and Data Protection practices Reviews and evaluates Cyber Security and Data Protection process for the department or organization, provides technical and policy enforcement for Cyber Security and Data Protection operation, makes recommendations on security approaches, maintains knowledge of the latest technologies in information security, develops and maintains Cyber Security and Data Protection procedures and policies for team, evaluates and audits Cyber Security and Data Protection processes and recommends process improvements.Principal Duties and Responsibilities:For this section, group the bullets together with a % in front. The lowest % should be a 10% grouping. For each functional title the percentages should total 100%.25%tEnforces Cyber Security and Data Protection Efforts tOperate Individual and/or cross-functional team activities, providing leadership, guidance and consultation to the team, as needed to address issues. tExecutes project plan(s) and resource requirements tSupports and enforces a team model to ensure the Syniverse brand and/or business operations. tOperates a follow the sun model for SOCs. tProvides recommendations to reduce the threat landscape by improving the vulnerability management program. tProvides recommendations to continuously enhance Incident Response capabilities25%tIdentify Needs, Develop, and Maintain Critical Security information tEnhance threat intelligence leveraging technology and information available from both internal and external sources. tCultivate team knowledge and skill sets to develop and respond to cyber threats tMonitors and safeguards data in real time tEnsure and maintain good relationships exist within Syniverse20%tResolve Security Issues tSOCs are capable of receiving events from monitored systems and routing todedicated personnel for review. tContribute to the success of forensics capabilities. tExtend proactive monitoring of enterprise network and systems. tAddress identified and confirmed security events in a timely manner. tWork with other groups to ensure continuity and coverage of the enterprise30%tDelivery tOperationalizes core Cyber Security and Data Protection functions tEstablish and manage responsible program measurement (e.g.KPIs). tAnalyzes and assesses vulnerabilities in the infrastructure (software, hardware, networks), tInvestigates available tools and countermeasures to remedy the detected vulnerabilities, and recommends solutions and best practices tAnalyzes and assesses damage to the data/infrastructure as a result of security incidents, examines available recovery tools and processes tTests for compliance with security policies and procedures tMay assist in the creation, implementation, and/or management of security solutions.100%tTotal Time (Must Equal 100%)Job Requirements:Knowledge Requirements tModerate to Advanced understanding of Cyber Security and Data Protection tModerate to Advanced telecommunications and wireless industry knowledge tModerate to Advanced written and oral communication skills tModerate to Advanced analytical skills tWorking knowledge of Project Management discipline and process tCertification as a CISSP, CISA and/or CFE, or GIAC certification(s) (desired) tOrganization, leadership and facilitation skills tModerate to Advanced influence skills tModerate to Advanced -level troubleshooting skills tModerate to Advanced Knowledge of Security Policies/Practices tLimited to Moderate Security Application knowledge tModerate to Advanced industry knowledge tModerate to Advanced knowledge in SOC operations, Vulnerability Management, Incident Handling & Response and Data Protection practices tModerate to Advanced level of awareness of current attack vectorsExperience Requirements tBS in Computer Science, Information Systems, related field or equivalent work experience t3-5 years experience as a security practitioner preferred tTechnology experience with the followingotVulnerability management tools, SIEM, advanced cyber security tools, Firewall and router configuration, switches, secure network architecture, VPNs, PKI, Portals, Cisco, network monitoring technologies, Solaris, AIX , HP-UX, Red Hat Linux, Checkpoint, IPSEC, SSL, SSH, VPN, Ethernet Token Ring, WAP, SMTP, FTP, Frame Relay, WAN, ATM, FDDI, DSL, ISDN, HP Openview, Radius, F5, Nessus, security tools and facilities Disclaimer Statement: The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. It is not designed to be utilized as a comprehensive list of all duties, responsibilities, and qualifications required of employees assigned to this job.Additional Information,
Keyskills :
firewallsnetworkingtroubleshootingred hat linuxsecure network architecturetoken ringhp openviewframe relaycyber securitycisco