Description
We are looking for an experienced Cybersecurity Practices professional to join our team in India. The ideal candidate will be responsible for safeguarding our organization's information systems and ensuring compliance with security standards. You will play a crucial role in identifying vulnerabilities, implementing security measures, and responding to incidents.
Responsibilities
- Develop and implement cybersecurity policies and practices to protect organizational assets.
- Conduct risk assessments and audits to identify vulnerabilities in systems and processes.
- Monitor network traffic for suspicious activities and respond to security incidents promptly.
- Collaborate with IT teams to ensure security measures are integrated into all technology solutions.
- Provide training and awareness programs for staff on cybersecurity best practices.
- Stay updated on the latest cybersecurity threats and technologies to continuously improve defenses.
- Prepare and present reports on security status, incidents, and strategies to stakeholders.
Skills and Qualifications
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.5-15 years of experience in cybersecurity or a related field.Strong understanding of security frameworks (e.g., NIST, ISO 27001).Experience with firewalls, intrusion detection systems, and security information and event management (SIEM) tools.Proficiency in risk assessment and management techniques.Knowledge of networking protocols and security practices.Familiarity with regulatory compliance requirements (e.g., GDPR, PCI-DSS).Certifications such as CISSP, CISM, or CEH are preferred.Excellent analytical and problem-solving skills.Strong communication and interpersonal skills for effective collaboration.Education
Bachelor Of Computer Application (B.C.A), Bachelor Of Technology (B.Tech / B.E), Master in Computer Application (M.C.A), Post Graduate Diploma in Computer Applications (PGDCA), Masters in Technology (M.Tech / M.E)
Skills Required
Penetration Testing, Risk Assessment, Incident Response, Network Security, Threat Intelligence, Vulnerability Management, Malware Analysis, Cloud Security