Responsibilities : Job Description
- Ability to identify, propose, design and run the operational and security risk Controls.
- Sound understanding of various cybersecurity controls and their relevance to handle various threat scenarios.
- Proactively identify security gaps and propose recommendations to enhance the security controls through remediation procedures.
- Identify data model (attribute / fields) from security logs to perform audit and checks.
- Device efficient processes to enforce security controls and ensure their effectiveness.
- Effective communication with the stakeholders project team, security SPOCs and other cross functional teams.
- Ability to assess the maturity level of existing new controls and improve control effectiveness by implementing necessary action items.
- Evaluate the Security and Risk Assessment for the infrastructure and / or applications to propose relevant recommendations.
- Recognizes problems by identifying abnormalities, reporting discrepancies
- Good reporting / communication skills and ability to convey technical or complex security topics to management is simple and effective manner. Experience on designing reports using tools like Power BI or Tableau or Pandas / Xlwings / Plotydash is added advantage
Profile Required : Profile Required :
Bachelor’s degree in Computer Science, Information Technology, Cyber Security, or a related fieldExperience : 6 + yrsCybersecurity : - Risk analysis : Intermediate to ExpertSecurity audit and framework (ISO 27001, NIST, PCI-DSS) : Intermediate to ExpertPentest knowledge (OWASP, methodology, hacking) : Intermediate to ExpertEthical hacking and control effectiveness testing : Intermediate to ExpertPublic Cloud infrastructure & security (AWS, Azure) : IntermediateSecurity and Code Audit reviews : - Understanding of infrastructure and application security controls in cloud and on-premise like Amazon Web Application Firewall, Amazon Guard Duty, Amazon Inspector, AWS IAM Access Analyzer, AWS cloud Trail, AWS Shield, Amazon Macie, AWS Config, AWS security Hub, Integration with 3rd party tools : Intermediate to ExpertScripting knowledge (python, Git, Pandas…) : IntermediateSystem and OS administration & hardening- Application Security : Intermediate to ExpertLinux / windows administration : IntermediateLinux / windows security and hardening : Intermediate to ExpertVulnerability management standards : StandardWhy Join Us
“We are committed to creating a diverse environment and are proud to be an equal opportunity employer. All qualified applicants receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status”.