2. Job Roles & Responsibilities:
Use and apply encryption technology; penetration and vulnerability analysis of various security technologies; and information technology security research in the analysis of requirements, design, implementation, testing and security maintenance.
Responsible for IT project domain governance, reviewing policies and implementations and adjudication issues for system under development.
Protects system by defining access privileges, control structures, and resources.
Configure & managing latest cyber security appliances like WAF, DB Application Level Firewalls, DAM, Defacement Monitor, SSL VPN Concentrators, SIEM, DLP, SIEM, SCCM, UTM Appliances, SYSLOG Servers.
Carrying out information security vulnerability audit of Network, Servers, Database and (web, desktop, mobile) Applications on regular intervals.
Determines security violations and inefficiencies by conducting periodic audits.
Recognize problems by identifying abnormalities; reporting violations
Upgrade system by implementing and maintaining security controls.
Experience in carrying out forensic analysis of the hacked devices, malware and forensic audit of logs. Should be proficient in sandboxed testing environment.
3. Required Skills & Experience, Qualification
3.1 Skills & Experience:
Minimum 4-5 years of experience infosec management in SOC environment, Information risk and security related initiatives/ projects.
Excellent technical knowledge of mainstream OS and a wide range of security technologies, OWASP vulnerabilities (XSS, Buffer Overflow, SQL Injection, etc) and their mitigation strategies.
Hand-on experience in Vulnerability Assessment and Penetration Testing, Firewall, IPS, VPN, Gateway security solutions (proxy, web filtering), Encryption & Security Protocols (SSL/TLS, Kerberos, IPSec, VPN), Single Sign-On (SSO) with AD or LDAP.
Hands-on experience in System & Network Hardening.
Should have hands-on experience of digital forensics and cyber incident investigation.
3.2 Desired Qualification:
BE/ B.Tech/ MCA from a recognized university.
Should be CISM/ CHFI/ LPT/ CISSP certified.
Salary: Not Disclosed by Recruiter
Desired Candidate Profile
UG:B.Tech/B.E. - Any Specialization
PG:MCA - Computers
Doctorate:Doctorate Not Required
NISG ( National Institute of Smart Government)