| Hyderabad Jobs |
| Banglore Jobs |
| Chennai Jobs |
| Delhi Jobs |
| Ahmedabad Jobs |
| Mumbai Jobs |
| Pune Jobs |
| Vijayawada Jobs |
| Gurgaon Jobs |
| Noida Jobs |
| Hyderabad Jobs |
| Banglore Jobs |
| Chennai Jobs |
| Delhi Jobs |
| Ahmedabad Jobs |
| Mumbai Jobs |
| Pune Jobs |
| Vijayawada Jobs |
| Gurgaon Jobs |
| Noida Jobs |
| Oil & Gas Jobs |
| Banking Jobs |
| Construction Jobs |
| Top Management Jobs |
| IT - Software Jobs |
| Medical Healthcare Jobs |
| Purchase / Logistics Jobs |
| Sales |
| Ajax Jobs |
| Designing Jobs |
| ASP .NET Jobs |
| Java Jobs |
| MySQL Jobs |
| Sap hr Jobs |
| Software Testing Jobs |
| Html Jobs |
| Job Location | Bengaluru/ Bangalore (Karnataka) |
| Education | BE/ B.Tech (Engineering) |
| Salary | As per Industry Standards |
| Industry | Software Services, Internet/Dot com/ISP |
| Functional Area | IT Software : Software Products & Services |
| EmploymentType | Full-time |
Data Security AnalystBe a Data security analyst and provide First line of defense to the organization.Implement / assess security baselines for Data security solutions.Perform security reviews and identify security gaps in security architecture / tools resulting in recommendations for inclusion in the risk mitigation strategy.Monitor and Evaluate Systems compliance with Information technology security resilience, and dependability requirements.Assess the effectiveness of security controls to ensure compliance with organizational security policies and procedures, standards, and security requirements applicable to the system.Work closely with IT team, corporate functions, Legal & Business Team by highlighting importance of the security practices and control and guide them in remediation of gaps identified.Understand the vulnerabilities from alerts, advisories and bulletins for Identity & Access management and govern the remedial actions.Document the findings from security assessments and report them to the stakeholders.Qualification
Keyskills :
data security solutions cloud platforms expertise security control assessment risk mitigation strategy analytical problem solving information technology access management dlp cissp cism security architecture cisa