Cyber Security
Requirements
- Qualifications : BE / M.Tech / MSc (IT, Mathematics) / MCA
- Key Responsibilities :
- Develop and implement cybersecurity policies, frameworks, and security best practices.
- Monitor, analyze, and mitigate security threats to ensure a secure IT infrastructure.
- Conduct risk assessments, vulnerability scanning, and penetration testing.
- Ensure compliance with regulatory and industry security standards (ISO 27001, NIST, GDPR, etc.).
- Provide incident response and forensic analysis in the event of security breaches.
- Develop security awareness programs and training sessions for internal teams.
- Collaborate with stakeholders and IT teams to integrate security strategies into business operations.
- Stay updated on emerging cybersecurity technologies and innovations to enhance security resilience.
- Experience & skills :
- Minimum 4 years of experience as a technical consultant in cybersecurity.
- Successfully delivered at least three cybersecurity projects.
- Extensive experience in hardware and software security solutions, network security, and IT infrastructure protection.
- Strong knowledge of security frameworks, compliance standards, and threat intelligence.
- Proven expertise in data protection, software encryption, and cybersecurity risk assessment.
- Ability to develop and maintain internal security logs and provide incident response support.
- Proficiency in providing web-portal security support and troubleshooting.
- Expertise in monitoring security performance metrics and ensuring system integrity.
- Strong understanding of emerging cybersecurity threats, vulnerabilities, and mitigation strategies.
- Exceptional interpersonal and communication skills with the ability to conduct in-house training to enhance cybersecurity awareness.
- Experience with SIEM tools, IDS / IPS, firewalls, and endpoint security solutions.
- Strong understanding of cloud security, encryption protocols, and access management.
- Ability to work in fast-paced and high-security environments.
- Strong problem-solving and analytical skills to address complex security challenges.
- Preferred Certifications :
- Candidates with the following certifications will be given preference :
▪Certified Ethical Hacker (CEH)
▪Certified Information Systems Security Professional (CISSP)
▪Certified Information Security Manager (CISM)
▪CompTIA Security+ or CompTIA Advanced Security Practitioner (CASP)
▪GIAC Security Certifications (GSEC, GCIH, GPEN, etc.)
▪EC-Council Certified Security Analyst (ECSA)
▪Certified Cloud Security Professional (CCSP), ▪ISO 27001 Lead Auditor / Implementer