Requires overall understanding of Security services related processes and technologies:
Azure Cloud
Azure native security
Data Security
Log Indexing and Correlation platform & SIRT
Threat Intelligence & Forensics
Intrusion system
Antivirus and antispyware console
Audit principles and associated compensating controls
Cloud Security
Identity & Access Management
In depth knowledge of Security Architecture design and implementation
Hands on experience on Azure Cloud security
Assist the development of security tool requirements trials and evaluations as well as security operations procedures and processes.
Develop and maintain global policies standards and procedures to include helping to manage our business partners setting expectations on roles and responsibilities
Assist Client to define Security requirements based upon Business needs and their Information Security Policy
Designing and implementing the security measures needed to protect data stored on public clouds against unauthorized access including secure authentication methods encryption access control lists intrusion detection systems firewalls and other measures
Designing and developing security architectures that align with an organizations strategic goals
Working with security specialists to design new security protocols as needed then testing them to ensure that they work as intended
Installing and maintaining security software on company servers computers and mobile devices used by employees
Analyzing threats to an organizations security and designing solutions to mitigate those threats
Recommending and implementing new security measures as needed to keep data safe
Identifying new security threats and recommending ways to address them
Plans security systems by evaluating network and security technologies
Prepares system security reports by collecting analyzing and summarizing data and trends
Knowledge of PCI ISO 27002 and o security standards and framework
Designs security models reviews and approves security configuration and installation of Security devices
Analyze troubleshoot and investigate securityrelated information systems anomalies based on security platform reporting network traffic log files hostbased and automated security alerts
Ensure and enforce security controls in the area of Networks and Applications to drive policy compliance and risk mitigation
Controlling and managing access rights to the information system and assets that manage these information repositories
Securityrelated Incident handling and registration
Assist the development of security tool requirements trials and evaluations as well as security operations procedures and processes
Improving and maintaining secure development standard
Providing standard gap analysis services to internal business and technology partners.
Ability to seek out vulnerabilities in IT infrastructures
Protects system by defining access privileges control structures and resources
Recognizes problems by identifying abnormalities reporting violations
Implements security improvements by assessing current situation; evaluating trends; anticipating requirements
Determines security violations and inefficiencies by conducting periodic audits
Indepth knowledge of data protection strategies network and system vulnerabilities; security tool sets including security event management tools
Provide SIRT support as needed in response to information security related events.
Participate in continuous improvement processes
Doing Threat Management by working on different kind of attacks Malwares Viruses web application attack based on OWASP
Maintain and update relevant system and process documentation and develop adhoc reports as needed.
Assist the development of security tool requirements trials and evaluations as well as security operations procedures and processes
Monitors industry security updates technologies and best practices to improve security management
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.