Responsibilities
Develop and implement comprehensive cyber security maturity model for enterprise IT or OT environment for evaluating overall security posture. Advise best method of protecting the enterprise network, data, applications, and information systems from any potential cyber threats Research on cyber security criteria, emerging security trends and solutions and validate the complimentary policies and processes are aligned with solutions Calculate cost estimations on product, people, and processes to remediate any security gaps Plan, design and recommend, robust enterprise security architectures, processes, policies, procedures for customers IT projects Provide technical reports and present to the enterprise CXOs based on advisory engagement results. Provide professional guidance and advisory to enterprise security teams & CISO’s on cyber strategy and roadmap
Technical Requirements
infrastructure security e.gAnti-DDoS, Firewall, NIPS, WAF, NDR, NSPM, EDR, EPP, Deception, SASE, ZTNA etcData Security (e.g. DLP, DAM, PKI, Key Mgmt., Certificate Mgmt., DSPM, Data Masking, Encryption etc, Application Securitye.g. SAST, DAST, SCA, IAST etc, Cloud Security e.gCNAPP, CASB, SSPM, Native Security from AWS, AZURE, GCP etc.Zero Trust Architecture, OT Security, Security Incident Managemente.g. SIEM, SOAR, SOC etc.Identity & Access Management e.g. IDP, RBAC, SSO, MFA, Conditional access, PAM,PIM etc. Governance Risk & Compliance Eg Risk Management, TPRM, Control Testing, IT Audits & Assessments, Compliance Management etc
Preferred Skills
Application Security
Cloud Security
GRC
OT Security
SOC
Blockchain Security
Vulnerability Management
Network Security
AWS DevOps
Application Security->Nessus
Application Security->Wireshark
Application Security->Burpsuite
Application Security->Devsecops
Cloud Security->AWS Security
Cloud Security->Azure Security
Data Security->Data Classification
Data Security->Data Encryption
Data Security->Public Key Infrastructure(PKI)
Data Security->IBM Guardium
GRC->Risk Assessment
GRC->RSA Archer(e-GRC)
IDAM->Oracle Identity Manager(OIM)
IDAM->Oracle Access Manager(OAM)
IDAM->CA Siteminder(CA Identity Suite)
IDAM->Sailpoint
IDAM->Cyberark
IDAM->Ping/Federate
IDAM->IBM Security Identity manager(ISIM)
IDAM->Okta
Infrastructure Security->Antivirus
Infrastructure Security->Symantec Endpoint(SEP)
Infrastructure Security->Malware Analysis
Infrastructure Security->Email Security
OT Security->OT Security
Security Incident and Event Management(SIEM)->QRadar
Security Incident and Event Management(SIEM)->Arcsight
Security Incident and Event Management(SIEM)->RSA Envision
Security Incident and Event Management(SIEM)->Logrythm
SOC->Security Operations Center(SOC/SIEM)
SOC->Security Monitoring
SOC->Breach Response
Devops->Google Cloud Ptatform (GCP)
Security testing->Cloud Security
Tools->Splunk
Network Security->Firewalls->Checkpoint
Network Security->Firewalls->Web Application Firewall(WAF)
Network Security->Proxy->Blue Coat
Network Security->Firewalls->Juniper-Firewalls
Network Security->Load Balancer->F5
Network Security->Firewalls->Palo Alto
Tools->Service Now->ServiceNow-Security
Additional Responsibilities
Not Available
Educational Requirements
Intergrated course BCA+MCA,Bachelor of Engineering,BCA,BSc,MCA,Bachelor Of Technology