Responsibilities
          Develop and implement comprehensive cyber security maturity model for enterprise IT or OT environment for evaluating overall security posture.  Advise best method of protecting the enterprise network, data, applications, and information systems from any potential cyber threats  Research on cyber security criteria, emerging security trends and solutions and validate the complimentary policies and processes are aligned with solutions Calculate cost estimations on product, people, and processes to remediate any security gaps Plan, design and recommend, robust enterprise security architectures, processes, policies, procedures for customers IT projects Provide technical reports and present to the enterprise CXOs based on advisory engagement results.  Provide professional guidance and advisory to enterprise security teams & CISO’s on cyber strategy and roadmap
         Technical Requirements
          infrastructure security e.gAnti-DDoS, Firewall, NIPS, WAF, NDR, NSPM, EDR, EPP, Deception, SASE, ZTNA etcData Security (e.g. DLP, DAM, PKI, Key Mgmt., Certificate Mgmt., DSPM, Data Masking, Encryption etc, Application Securitye.g. SAST, DAST, SCA, IAST etc, Cloud Security e.gCNAPP, CASB, SSPM, Native Security from AWS, AZURE, GCP etc.Zero Trust Architecture, OT Security, Security Incident Managemente.g. SIEM, SOAR, SOC etc.Identity & Access Management e.g. IDP, RBAC, SSO, MFA, Conditional access, PAM,PIM etc. Governance Risk & Compliance Eg Risk Management, TPRM, Control Testing, IT Audits & Assessments, Compliance Management etc 
         Preferred Skills
          Application Security 
 Cloud Security 
 GRC 
 OT Security 
 SOC 
 Blockchain Security 
 Vulnerability Management 
 Network Security 
 AWS DevOps 
 Application Security->Nessus 
 Application Security->Wireshark 
 Application Security->Burpsuite 
 Application Security->Devsecops 
 Cloud Security->AWS Security 
 Cloud Security->Azure Security 
 Data Security->Data Classification 
 Data Security->Data Encryption 
 Data Security->Public Key Infrastructure(PKI) 
 Data Security->IBM Guardium 
 GRC->Risk Assessment 
 GRC->RSA Archer(e-GRC) 
 IDAM->Oracle Identity Manager(OIM) 
 IDAM->Oracle Access Manager(OAM) 
 IDAM->CA Siteminder(CA Identity Suite) 
 IDAM->Sailpoint 
 IDAM->Cyberark 
 IDAM->Ping/Federate 
 IDAM->IBM Security Identity manager(ISIM) 
 IDAM->Okta 
 Infrastructure Security->Antivirus 
 Infrastructure Security->Symantec Endpoint(SEP) 
 Infrastructure Security->Malware Analysis 
 Infrastructure Security->Email Security 
 OT Security->OT Security 
 Security Incident and Event Management(SIEM)->QRadar 
 Security Incident and Event Management(SIEM)->Arcsight 
 Security Incident and Event Management(SIEM)->RSA Envision 
 Security Incident and Event Management(SIEM)->Logrythm 
 SOC->Security Operations Center(SOC/SIEM) 
 SOC->Security Monitoring 
 SOC->Breach Response 
 Devops->Google Cloud Ptatform (GCP) 
 Security testing->Cloud Security 
 Tools->Splunk 
 Network Security->Firewalls->Checkpoint 
 Network Security->Firewalls->Web Application Firewall(WAF) 
 Network Security->Proxy->Blue Coat 
 Network Security->Firewalls->Juniper-Firewalls 
 Network Security->Load Balancer->F5 
 Network Security->Firewalls->Palo Alto 
 Tools->Service Now->ServiceNow-Security 
Additional Responsibilities
         Not Available
         Educational Requirements
         Intergrated course BCA+MCA,Bachelor of Engineering,BCA,BSc,MCA,Bachelor Of Technology