Responsibilities
Consulting & advisory assignments, all the way from business process consulting and problem definition, solution definition, roadmap to cost estimates for remediation. You will be pivotal to problem definition and discovery of the overall solution and execute projects singlehandedly or part of a team to deliver the agreed deliverables. As a thought leader in your domain, you will be the key advisor to cyber security architectures, controls, processes, policies, compliances, and maturity reviews. You will anchor business pursuit initiatives, client training, in-house capability building etc. You will have the opportunity to shape value-adding consulting solutions that enable our clients to meet the changing needs of the global landscape. •Towards this, you need to develop strong understanding of the Infosys service offerings in the space, get to the heart of customer business problem, understand the customer strategy, technology/tools landscape and ecosystem, diagnose key focus areas, understand the outcomes expected thereby designing and executing innovative consulting solutions •You are expected to accomplish this working collaboratively with applicable teams and stakeholders across delivery/sales/solutioning/consulting, as well as customer •You will drive developing and enhancing reusables including best practices, case studies, templates – as relevant to the services being offered •Will actively lead contributions to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers
Technical Requirements
Proven knowledge and hands on experience in designing (and delivering) cybersecurity solutions around the functions listed above across more than 2-3 subdomains of security tools and techniques in the area of infrastructure security (Anti-DDoS, Firewall, NIPS, WAF, NDR, NSPM, EDR, EPP, Deception, SASE, ZTNA etcData Security (DLP, DAM, PKI, Key Mgmt., Certificate Mgmt., DSPM, Data Masking, Encryption etc. ), Application Security ( SAST, DAST, SCA, IAST etc.) , Cloud Security( e.g. CNAPP, CASB, SSPM, Native Security from AWS, AZURE, GCP etc.) , Zero Trust Architecture, OT Security, Security Incident Management(e.g. SIEM, SOAR, SOC etc.) , Identity & Access Management ( e.g. IDP, RBAC, SSO, MFA, Conditional access, PAM,PIM etc.) Governance Risk & Compliance (E.g., Risk Management, TPRM, Control Testing, IT Audits & Assessments, Compliance Management etc.),
Preferred Skills
Application Security
Cloud Security
GRC
OT Security
SOC
Blockchain Security
Vulnerability Management
Network Security
AWS DevOps
Application Security->Nessus
Application Security->Wireshark
Application Security->Burpsuite
Application Security->Devsecops
Cloud Security->AWS Security
Cloud Security->Azure Security
Data Security->Data Classification
Data Security->Data Encryption
Data Security->Public Key Infrastructure(PKI)
Data Security->IBM Guardium
GRC->Risk Assessment
GRC->RSA Archer(e-GRC)
IDAM->Oracle Identity Manager(OIM)
IDAM->Oracle Access Manager(OAM)
IDAM->CA Siteminder(CA Identity Suite)
IDAM->Sailpoint
IDAM->Cyberark
IDAM->Ping/Federate
IDAM->IBM Security Identity manager(ISIM)
IDAM->Okta
Infrastructure Security->Antivirus
Infrastructure Security->Symantec Endpoint(SEP)
Infrastructure Security->Malware Analysis
Infrastructure Security->Email Security
OT Security->OT Security
Security Incident and Event Management(SIEM)->QRadar
Security Incident and Event Management(SIEM)->Arcsight
Security Incident and Event Management(SIEM)->RSA Envision
Security Incident and Event Management(SIEM)->Logrythm
SOC->Security Operations Center(SOC/SIEM)
SOC->Security Monitoring
SOC->Breach Response
Devops->Google Cloud Ptatform (GCP)
Security testing->Cloud Security
Tools->Splunk
Network Security->Firewalls->Checkpoint
Network Security->Firewalls->Web Application Firewall(WAF)
Network Security->Proxy->Blue Coat
Network Security->Firewalls->Juniper-Firewalls
Network Security->Load Balancer->F5
Network Security->Firewalls->Palo Alto
Tools->Service Now->ServiceNow-Security
Additional Responsibilities
• Excellent written and verbal communication with expertise in stakeholder management at the highest level e.g., CXO’s • Dynamic and compelling presentation skills while convincing the customer stakeholders. • Creation of consulting and advisory frameworks, blueprints & knowledge base documents • Excellent cross cultural skills working seamlessly with a globally distributed workforce and customers • Strong attention to detail and outstanding analytical and problem solving skills • Self starter able to independently drive and execute the work meeting quality and timeline commitments, multi tasking across multiple medium/large complexity proposals as needed • A firm commitment to keeping up to date with the latest cyber security trends, technologies, threats, partners, and a desire to learn in an ever-evolving landscape • A high degree of initiative and flexibility, High customer orientation and High quality awareness • Thought leadership & Strategic thinking to drive large customer advisory and consulting engagements • Leadership skills to manage and motivate diverse, high-performance teams • Drive and deliver engagement single handedly or lead a team of competent cyber consultants
Educational Requirements
Intergrated course BCA+MCA,Bachelor of Engineering,BCA,BSc,MCA,Bachelor Of Technology