hireejobs
Hyderabad Jobs
Banglore Jobs
Chennai Jobs
Delhi Jobs
Ahmedabad Jobs
Mumbai Jobs
Pune Jobs
Vijayawada Jobs
Gurgaon Jobs
Noida Jobs
Oil & Gas Jobs
Banking Jobs
Construction Jobs
Top Management Jobs
IT - Software Jobs
Medical Healthcare Jobs
Purchase / Logistics Jobs
Sales
Ajax Jobs
Designing Jobs
ASP .NET Jobs
Java Jobs
MySQL Jobs
Sap hr Jobs
Software Testing Jobs
Html Jobs
IT Jobs
Logistics Jobs
Customer Service Jobs
Airport Jobs
Banking Jobs
Driver Jobs
Part Time Jobs
Civil Engineering Jobs
Accountant Jobs
Safety Officer Jobs
Nursing Jobs
Civil Engineering Jobs
Hospitality Jobs
Part Time Jobs
Security Jobs
Finance Jobs
Marketing Jobs
Shipping Jobs
Real Estate Jobs
Telecom Jobs

Cyber Security Analyst II

3.00 to 5.00 Years   Bangalore   21 Jan, 2022
Job LocationBangalore
EducationNot Mentioned
SalaryNot Disclosed
IndustryTelecom / ISP
Functional AreaGeneral / Other Software
EmploymentTypeFull-time

Job Description

The Cyber Security and Data Protection resource deals with advanced, complex, and ever changing threats which could affect the Syniverse brand and/or business operations. Demonstrates a strong self-managed individual delivering against enterprise level cyber security programs. Drive delivery for the implementation, monitoring, and continuous improvement of Security Operations Centers (SOCs) and Cyber Fusion Center, Vulnerability Management, Incident Handling & Response and Data Protection practices Contributes to the development and organization of Cyber Security and Data Protection program management, threat intelligence, defense monitoring and vulnerability management. Ability to establish metrics and reporting for both technical and non-technical stakeholders. Operates one or more Cyber functions including leveraging a follow the sun model supporting established SOCs and Cyber Fusion Center, Vulnerability Management, Incident Handling & Response and Data Protection practices Reviews and evaluates Cyber Security and Data Protection process for the department or organization, provides technical and policy enforcement for Cyber Security and Data Protection operation, makes recommendations on security approaches, maintains knowledge of the latest technologies in information security, develops and maintains Cyber Security and Data Protection procedures and policies for team, evaluates and audits Cyber Security and Data Protection processes and recommends process improvements.Principal Duties and Responsibilities:For this section, group the bullets together with a % in front. The lowest % should be a 10% grouping. For each functional title the percentages should total 100%.25%tEnforces Cyber Security and Data Protection Efforts tOperate Individual and/or cross-functional team activities, providing leadership, guidance and consultation to the team, as needed to address issues. tExecutes project plan(s) and resource requirements tSupports and enforces a team model to ensure the Syniverse brand and/or business operations. tOperates a follow the sun model for SOCs. tProvides recommendations to reduce the threat landscape by improving the vulnerability management program. tProvides recommendations to continuously enhance Incident Response capabilities25%tIdentify Needs, Develop, and Maintain Critical Security information tEnhance threat intelligence leveraging technology and information available from both internal and external sources. tCultivate team knowledge and skill sets to develop and respond to cyber threats tMonitors and safeguards data in real time tEnsure and maintain good relationships exist within Syniverse20%tResolve Security Issues tSOCs are capable of receiving events from monitored systems and routing todedicated personnel for review. tContribute to the success of forensics capabilities. tExtend proactive monitoring of enterprise network and systems. tAddress identified and confirmed security events in a timely manner. tWork with other groups to ensure continuity and coverage of the enterprise30%tDelivery tOperationalizes core Cyber Security and Data Protection functions tEstablish and manage responsible program measurement (e.g.KPIs). tAnalyzes and assesses vulnerabilities in the infrastructure (software, hardware, networks), tInvestigates available tools and countermeasures to remedy the detected vulnerabilities, and recommends solutions and best practices tAnalyzes and assesses damage to the data/infrastructure as a result of security incidents, examines available recovery tools and processes tTests for compliance with security policies and procedures tMay assist in the creation, implementation, and/or management of security solutions.100%tTotal Time (Must Equal 100%)Job Requirements:Knowledge Requirements tModerate to Advanced understanding of Cyber Security and Data Protection tModerate to Advanced telecommunications and wireless industry knowledge tModerate to Advanced written and oral communication skills tModerate to Advanced analytical skills tWorking knowledge of Project Management discipline and process tCertification as a CISSP, CISA and/or CFE, or GIAC certification(s) (desired) tOrganization, leadership and facilitation skills tModerate to Advanced influence skills tModerate to Advanced -level troubleshooting skills tModerate to Advanced Knowledge of Security Policies/Practices tLimited to Moderate Security Application knowledge tModerate to Advanced industry knowledge tModerate to Advanced knowledge in SOC operations, Vulnerability Management, Incident Handling & Response and Data Protection practices tModerate to Advanced level of awareness of current attack vectorsExperience Requirements tBS in Computer Science, Information Systems, related field or equivalent work experience t3-5 years experience as a security practitioner preferred tTechnology experience with the followingotVulnerability management tools, SIEM, advanced cyber security tools, Firewall and router configuration, switches, secure network architecture, VPNs, PKI, Portals, Cisco, network monitoring technologies, Solaris, AIX , HP-UX, Red Hat Linux, Checkpoint, IPSEC, SSL, SSH, VPN, Ethernet Token Ring, WAP, SMTP, FTP, Frame Relay, WAN, ATM, FDDI, DSL, ISDN, HP Openview, Radius, F5, Nessus, security tools and facilities Disclaimer Statement: The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. It is not designed to be utilized as a comprehensive list of all duties, responsibilities, and qualifications required of employees assigned to this job.Additional Information,

Keyskills :
firewallsnetworkingtroubleshootingred hat linuxsecure network architecturetoken ringhp openviewframe relaycyber securitycisco

Cyber Security Analyst II Related Jobs

© 2019 Hireejobs All Rights Reserved