Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Job Location | Bangalore |
Education | Not Mentioned |
Salary | Not Disclosed |
Industry | Telecom / ISP |
Functional Area | General / Other Software |
EmploymentType | Full-time |
This position exists primarily to perform secured user access administration, provides advanced assistance to internal and external customers in security-related problem solving and issue analysis, operates security controls and monitors functions of same, and leads in audit evidence development. The Security Administrator II implements an information security process for the department or organization, provides technical leadership for security administration, makes recommendations on security software for evaluation, maintains knowledge of the latest technologies in information security, assists in writing security procedures and policies for enterprise, evaluates Security processes and recommends process improvements. Principal Duties and Responsibilities tManage Individual Projects otParticipate in needs assessment and requirements gathering. otContribute to development of project plan(s) and resource requirements. otPerform all scheduled work activities per established plans. otReport plan activities to ensure plans are on track. otLead in tests and validation of completed plans to ensure requirements are met. tProvide secured user access administration on all supported platforms otReceive access request from user and analyze the request to determine level of access necessary. otTake appropriate action to complete the request and notify the customer. otGenerate and securely communicate initial passwords. otRevoke user access when required tDevelop, update and maintain Information Security documentation otGather and organize data. otDesign and develop the documentation. otPerform reviews and edits. otPublish and distribute documentation tAssist in solving customer security issues otReceive customer requests and analyze to determine appropriate actions necessary. otPerform a security review, investigation and/or interview if necessary. otCollaborate with peers and provide leadership in providing solutions or alternatives. otCommunicate with customer and acquire approval of the solution or alternative. otProcess the request and assist in solution implementation if necessary. tDevelop Automated Functions otIdentify repetitive functions and analyze the logical steps required. otAssist in determining automation processes, automation and testing. otAssist in troubleshoot and debugging, if necessary. tAssist with Proactive Risk Assessment, Security Reviews and Consulting otReceive and analyze request. otAssist in performing review and/or assessment. otAssist in obtaining customer concurrence and approval of solutions. otAssist in the implementation of the solutions, if required.Job Requirements t3+ years of experience managing, architecting, and/or supporting security infrastructure across various technologies and disciplines tPlatform knowledge (Tandem, Unix, Windows, Network, Mainframe, Radius) tStrong written and oral communication skills tAnalytical skills tStrong knowledge of MS Office tWorking knowledge of Project Management discipline and process tOrganization skills tLeadership skills tFacilitation skills tInfluence skills tTroubleshooting skills tKnowledge of Security Policies/Practices tSecurity Application knowledge tIndustry knowledge tUse of Technical Reference Material tBasic Scripting skills tAbility to use logic concepts tBasic Browser knowledge,
Keyskills :
access controlfirewallfirewallslanproxy serverms officemusic makingproblem solvingrisk assessmentneeds assessmentsecurity controls